In-Vehicle Network Attack Detection Across Vehicle Models: A Supervised-Unsupervised Hybrid Approach

被引:0
|
作者
Nakamura S. [1 ]
Takeuchi K.
Kashima H.
Kishikawa T. [2 ]
Haga T.
Sasaki T.
机构
[1] Graduate School of Informatics, Kyoto University
来源
Transactions of the Japanese Society for Artificial Intelligence | 2022年 / 37卷 / 05期
关键词
absence of source-domain data; anomaly detection; domain adaptation; intrusion detection; transfer learning;
D O I
10.1527/tjsai.37-5_C-M42
中图分类号
学科分类号
摘要
Recent studies have demonstrated that the injection of malicious messages into in-vehicle networks can cause unintended operation of the controls of vehicles, which has been highlighted as one of the most serious and urgent issues that threaten the safety of automobiles. Attempts have been made to use supervised and unsupervised machine learning for automatic, data-driven intrusion detection. However, previous approaches considered only the detection and classification of attacks on a target car based on the data of the same model of car; they are relatively ineffective when the objective is to handle new car models for which not many data are yet available. In this paper, we address the task of detecting and classifying malicious messages injected into in-vehicle networks by transferring “knowledge” from different car models for which ample data exist. In our proposed approach to the dataset of new car models a pretrained classification model that was supervised-trained on the data of previous car models is combined it with an unsupervised detector that uses only the normal data from the target car. The advantage of the proposed approach is that it does not require past data and therefore is applicable to various scenarios. The results of our experiments using in-vehicle CAN messages datasets collected from three different cars show the effectiveness of the proposed approach. © 2022, Japanese Society for Artificial Intelligence. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [21] Adaptive OSEK Network Management for in-vehicle network fault detection
    Suwatthikul, Jittiwut
    McMurran, Ross
    Jones, R. Peter
    2007 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY, PROCEEDINGS, 2007, : 1 - +
  • [22] In-Vehicle Network Anomaly Detection Based on a Graph Attention Network
    Luo, Feng
    Luo, Cheng
    Wang, Jiajia
    Li, Zhihao
    SAE INTERNATIONAL JOURNAL OF CONNECTED AND AUTOMATED VEHICLES, 2025, 8 (04):
  • [23] Intrusion Detection on the In-Vehicle Network Using Machine Learning
    Sharmin, Shaila
    Mansor, Hafizah
    2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 26 - 31
  • [24] Risk Assessment Approach of In-Vehicle Network Information Security
    Wanh, Jian
    Zhang, Shaowei
    Chen, Hengwei
    Wang, Pengcheng
    CICTP 2022: INTELLIGENT, GREEN, AND CONNECTED TRANSPORTATION, 2022, : 1957 - 1968
  • [25] CAN Signal Extinction-based DoS Attack on In-Vehicle Network
    Lee, Yousik
    Woo, Samuel
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [26] Supervised contrastive ResNet and transfer learning for the in-vehicle intrusion detection system
    Hoang, Thien-Nu
    Kim, Daehee
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [27] A Lightweight In-Vehicle Alcohol Detection Using Smart Sensing and Supervised Learning
    Abu Al-Haija, Qasem
    Krichen, Moez
    COMPUTERS, 2022, 11 (08)
  • [28] An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network
    Kim, Taeguen
    Kim, Jiyoon
    You, Ilsun
    ELECTRONICS, 2023, 12 (17)
  • [29] Research and application on hybrid in-vehicle network in automotive control systems
    Kan, Zongting
    Xu, Li
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON FLUID POWER TRANSMISSION AND CONTROL, 2009, : 394 - 398
  • [30] Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network
    Han, Mee Lan
    Kwak, Byung Il
    Kim, Huy Kang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2941 - 2956