CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level

نویسندگان

چکیده

Modern vehicles rely on a fleet of electronic control units (ECUs) connected through controller area network (CAN) buses for critical vehicular control. With the expansion advanced connectivity features in automobiles and elevated risks internal system exposure, CAN bus is increasingly prone to intrusions injection attacks. As ordinary attacks disrupt typical timing properties data stream, rule-based intrusion detection systems (IDS) can easily detect them. However, attackers inject false signal/semantic level, while looking innocuous by pattern/frequency messages. The IDS, as well anomaly-based are built merely sequence messages IDs or just binary payload less effective detecting such Therefore, intelligent attacks, we propose CANShield, deep learning-based signal-level framework bus. CANShield consists three modules: preprocessing module that handles high-dimensional stream at signal level parses them into time series suitable learning model; analyzer consisting multiple autoencoder (AE) networks, each analyzing time-series from different temporal scale granularity, finally an attack uses ensemble method make final decision. Evaluation results two high-fidelity signal-based datasets show high accuracy responsiveness

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new SDN-based framework for wireless local area networks

Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...

متن کامل

An Agent-Based Intrusion Detection System for Local Area Networks

Since it is impossible to predict and identify all the vulnerabilities of a network beforehand, and penetration into a system by malicious intruders cannot always be prevented, intrusion detection systems (IDSs) are essential entities to ensure the security of a networked system. To be effective in carrying out their functions, the IDSs need to be accurate, adaptive, and extensible. Given these...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2023

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2023.3303271