CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network

被引:81
作者
Longari, Stefano [1 ]
Valcarcel, Daniel Humberto Nova [1 ]
Zago, Mattia [2 ]
Carminati, Michele [1 ]
Zanero, Stefano [1 ]
机构
[1] Politecn Milan, Dipartimento Elettron Informaz & Bioingn, I-20133 Milan, Italy
[2] Univ Murcia, Dept Informat Engn & Commun, Murcia 30003, Spain
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
关键词
Network security; intrusion detection system; controller area network; deep learning; unsupervised learning; INTRUSION DETECTION SYSTEM;
D O I
10.1109/TNSM.2020.3038991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automotive security has gained significant traction in the last decade thanks to the development of new connectivity features that have brought the vehicle from an isolated environment to an externally facing domain. Researchers have shown that modern vehicles are vulnerable to multiple types of attacks leveraging remote, direct and indirect physical access, which allow attackers to gain control and affect safety-critical systems. Conversely, Intrusion Detection Systems (IDSs) have been proposed by both industry and academia to identify attacks and anomalous behaviours. In this article, we propose CANnolo, an IDS based on Long Short-Term Memory (LSTM)-autoencoders to identify anomalies in Controller Area Networks (CANs). During a training phase, CANnolo automatically analyzes the CAN streams and builds a model of the legitimate data sequences. Then, it detects anomalies by computing the difference between the reconstructed and the respective real sequences. We experimentally evaluated CANnolo on a set of simulated attacks applied over a real-world dataset. We show that our approach outperforms the state-of-the-art model by improving the detection rate and precision.
引用
收藏
页码:1913 / 1924
页数:12
相关论文
共 59 条
[1]  
Andress J., 2014, The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, V2nd, P69
[2]  
[Anonymous], 2017, DEEP LEARNING ANOMAL
[3]  
[Anonymous], 2014, Controller Area Network (CAN) overview
[4]  
[Anonymous], 2015, ACS SYM SER
[5]  
[Anonymous], 1991, CAN SPEC VERS 2 0
[6]  
Checkoway S., 2011, P USENIX SEC S SAN F
[7]   Error Handling of In-vehicle Networks Makes Them Vulnerable [J].
Cho, Kyong-Tak ;
Shin, Kang G. .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1044-1055
[8]  
Choi W., 2016, Identifying ECUs using inimitable characteristics of signals in controller area networks
[9]  
Dagan T., 2016, P ESCAR EUROPE
[10]  
Dosari M. S. A., 2016, UNSUPERVISED ANOMALY