LATTE: <u>L</u> STM Self- <u>Att</u> ention based Anomaly Detection in <u>E</u> mbedded Automotive Platforms

نویسندگان

چکیده

Modern vehicles can be thought of as complex distributed embedded systems that run a variety automotive applications with real-time constraints. Recent advances in the industry towards greater autonomy are driving to increasingly connected various external (e.g., roadside beacons, other vehicles), which makes emerging highly vulnerable cyber-attacks. Additionally, increased complexity and in-vehicle networks results poor attack visibility, detecting such attacks particularly challenging systems. In this work, we present novel anomaly detection framework called LATTE detect cyber-attacks Controller Area Network (CAN) based within platforms. Our proposed uses stacked Long Short Term Memory (LSTM) predictor network attention mechanisms learn normal operating behavior at design time. Subsequently, scheme (also trained time) is used (as anomalies) runtime. We evaluate our under different scenarios detailed comparison best-known prior works area, demonstrate potential approach.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

3D Gabor Based Hyperspectral Anomaly Detection

Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Anomaly Detection in Nanofibrous Materials by CNN-Based Self-Similarity

Automatic detection and localization of anomalies in nanofibrous materials help to reduce the cost of the production process and the time of the post-production visual inspection process. Amongst all the monitoring methods, those exploiting Scanning Electron Microscope (SEM) imaging are the most effective. In this paper, we propose a region-based method for the detection and localization of ano...

متن کامل

Distributed Anomaly Detection and Prevention for Virtual Platforms

An increasing number of applications are being hosted on cloud based platforms [69]. Cloud platforms are serving as a general computing facility and applications being hosted on these platforms range from simple multitier web applications to complex social networking, eCommerce and Big Data applications. High availability, performance and auto-scaling are key requirements of Cloud based applica...

متن کامل

Transaction-based Anomaly Detection

The increasing complexity of both tele and data communication networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse by inand outsiders is becoming more and more difficult. This paper deals with a new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on the specification of transactions...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions in Embedded Computing Systems

سال: 2021

ISSN: ['1539-9087', '1558-3465']

DOI: https://doi.org/10.1145/3476998