In-Vehicle Network Attack Detection Across Vehicle Models: A Supervised-Unsupervised Hybrid Approach

被引:0
|
作者
Nakamura S. [1 ]
Takeuchi K.
Kashima H.
Kishikawa T. [2 ]
Haga T.
Sasaki T.
机构
[1] Graduate School of Informatics, Kyoto University
关键词
absence of source-domain data; anomaly detection; domain adaptation; intrusion detection; transfer learning;
D O I
10.1527/tjsai.37-5_C-M42
中图分类号
学科分类号
摘要
Recent studies have demonstrated that the injection of malicious messages into in-vehicle networks can cause unintended operation of the controls of vehicles, which has been highlighted as one of the most serious and urgent issues that threaten the safety of automobiles. Attempts have been made to use supervised and unsupervised machine learning for automatic, data-driven intrusion detection. However, previous approaches considered only the detection and classification of attacks on a target car based on the data of the same model of car; they are relatively ineffective when the objective is to handle new car models for which not many data are yet available. In this paper, we address the task of detecting and classifying malicious messages injected into in-vehicle networks by transferring “knowledge” from different car models for which ample data exist. In our proposed approach to the dataset of new car models a pretrained classification model that was supervised-trained on the data of previous car models is combined it with an unsupervised detector that uses only the normal data from the target car. The advantage of the proposed approach is that it does not require past data and therefore is applicable to various scenarios. The results of our experiments using in-vehicle CAN messages datasets collected from three different cars show the effectiveness of the proposed approach. © 2022, Japanese Society for Artificial Intelligence. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [31] HP-LSTM: Hawkes Process-LSTM-Based Detection of DDoS Attack for In-Vehicle Network
    Li, Xingyu
    Li, Ruifeng
    Liu, Yanchen
    FUTURE INTERNET, 2024, 16 (06)
  • [32] Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security
    Na, In-Seop
    Haldorai, Anandakumar
    Naik, Nithesh
    IEEE ACCESS, 2025, 13 : 2215 - 2228
  • [33] In-vehicle network intrusion detection using deep convolutional neural network
    Song, Hyun Min
    Woo, Jiyoung
    Kim, Huy Kang
    VEHICULAR COMMUNICATIONS, 2020, 21
  • [34] Long Short-Term Memory Neural Network-Based Attack Detection Model for In-Vehicle Network Security
    Khan, Zadid
    Chowdhury, Mashrur
    Islam, Mhafuzul
    Huang, Chin-Ya
    Rahman, Mizanur
    IEEE SENSORS LETTERS, 2020, 4 (06)
  • [35] Hybrid Quantum-Classical Neural Network for Cloud-Supported In-Vehicle Cyberattack Detection
    Islam, Mhafuzul
    Chowdhury, Mashrur
    Khan, Sakib
    Khan, Zadid
    IEEE SENSORS LETTERS, 2022, 6 (04)
  • [36] A Novel Hybrid Quantum-Classical Framework for an In-Vehicle Controller Area Network Intrusion Detection
    Salek, M. Sabbir
    Biswas, Pronab Kumar
    Pollard, Jacquan
    Hales, Jordyn
    Shen, Zecheng
    Dixit, Vivek
    Chowdhury, Mashrur
    Khan, Sakib Mahmud
    Wang, Yao
    IEEE ACCESS, 2023, 11 : 96081 - 96092
  • [37] Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN
    Dupont, Guillaume
    den Hartog, Jerry
    Etalle, Sandro
    Lekidist, Alexios
    2019 8TH IEEE INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (IIEEE CCVE), 2019,
  • [38] Transformer-Based Attention Network for In-Vehicle Intrusion Detection
    Nguyen, Trieu Phong
    Nam, Heungwoo
    Kim, Daehee
    IEEE ACCESS, 2023, 11 : 55389 - 55403
  • [39] A Distributed Anomaly Detection System for In-Vehicle Network Using HTM
    Wang, Chundong
    Zhao, Zhentang
    Gong, Liangyi
    Zhu, Likun
    Liu, Zheli
    Cheng, Xiaochun
    IEEE ACCESS, 2018, 6 : 9091 - 9098
  • [40] GIDS: GAN based Intrusion Detection System for In-Vehicle Network
    Seo, Eunbi
    Song, Hyun Min
    Kim, Huy Kang
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 286 - 291