MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet
of Vehicles
- URL: http://arxiv.org/abs/2105.13289v1
- Date: Wed, 26 May 2021 17:36:35 GMT
- Title: MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet
of Vehicles
- Authors: Li Yang, Abdallah Moubayed, Abdallah Shami
- Abstract summary: A hybrid intrusion detection system (IDS) is proposed to detect both known and unknown attacks on vehicular networks.
The proposed system can detect various types of known attacks with 99.99% accuracy on the CAN-intrusion-dataset.
The average processing time of each data packet on a vehicle-level machine is less than 0.6 ms.
- Score: 12.280524044112708
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Modern vehicles, including connected vehicles and autonomous vehicles,
nowadays involve many electronic control units connected through intra-vehicle
networks to implement various functionalities and perform actions. Modern
vehicles are also connected to external networks through vehicle-to-everything
technologies, enabling their communications with other vehicles,
infrastructures, and smart devices. However, the improving functionality and
connectivity of modern vehicles also increase their vulnerabilities to
cyber-attacks targeting both intra-vehicle and external networks due to the
large attack surfaces. To secure vehicular networks, many researchers have
focused on developing intrusion detection systems (IDSs) that capitalize on
machine learning methods to detect malicious cyber-attacks. In this paper, the
vulnerabilities of intra-vehicle and external networks are discussed, and a
multi-tiered hybrid IDS that incorporates a signature-based IDS and an
anomaly-based IDS is proposed to detect both known and unknown attacks on
vehicular networks. Experimental results illustrate that the proposed system
can detect various types of known attacks with 99.99% accuracy on the
CAN-intrusion-dataset representing the intra-vehicle network data and 99.88%
accuracy on the CICIDS2017 dataset illustrating the external vehicular network
data. For the zero-day attack detection, the proposed system achieves high
F1-scores of 0.963 and 0.800 on the above two datasets, respectively. The
average processing time of each data packet on a vehicle-level machine is less
than 0.6 ms, which shows the feasibility of implementing the proposed system in
real-time vehicle systems. This emphasizes the effectiveness and efficiency of
the proposed IDS.
Related papers
- AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN) [4.081467217340597]
The Controller Area Network (CAN) bus is a central system for managing in-vehicle communication between the electronic control units (ECUs)
CAN protocol poses security challenges due to inherent vulnerabilities, lacking encryption and authentication, which, combined with an expanding attack surface, necessitates robust security measures.
This paper considers the latest ROAD dataset, containing stealthy and sophisticated injections.
arXiv Detail & Related papers (2024-08-30T12:26:23Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in
The Internet of Vehicles [7.795462813462946]
Intrusion Detection Systems (IDSs) that can identify malicious cyber-attacks have been developed.
We propose a novel ensemble IDS framework named Leader Class and Confidence Decision Ensemble (LCCDE)
LCCDE is constructed by determining the best-performing ML model among three advanced algorithms.
arXiv Detail & Related papers (2022-08-05T22:30:34Z) - Federated Deep Learning Meets Autonomous Vehicle Perception: Design and
Verification [168.67190934250868]
Federated learning empowered connected autonomous vehicle (FLCAV) has been proposed.
FLCAV preserves privacy while reducing communication and annotation costs.
It is challenging to determine the network resources and road sensor poses for multi-stage training.
arXiv Detail & Related papers (2022-06-03T23:55:45Z) - Anomaly Detection in Intra-Vehicle Networks [0.0]
Modern vehicles are connected to a range of networks, including intra-vehicle networks and external networks.
With the loopholes in the existing traditional protocols, cyber-attacks on the vehicle network are rising drastically.
This paper discusses the security issues of the CAN bus protocol and proposes an Intrusion Detection System (IDS) that detects known attacks.
arXiv Detail & Related papers (2022-05-07T03:38:26Z) - COOPERNAUT: End-to-End Driving with Cooperative Perception for Networked
Vehicles [54.61668577827041]
We introduce COOPERNAUT, an end-to-end learning model that uses cross-vehicle perception for vision-based cooperative driving.
Our experiments on AutoCastSim suggest that our cooperative perception driving models lead to a 40% improvement in average success rate.
arXiv Detail & Related papers (2022-05-04T17:55:12Z) - A Transfer Learning and Optimized CNN Based Intrusion Detection System
for Internet of Vehicles [10.350337750192997]
In this paper, a transfer learning and ensemble learning-based IDS is proposed for Internet of Vehicles (IoV) systems.
The proposed IDS has demonstrated over 99.25% detection rates and F1-scores on two public benchmark IoV security datasets.
This shows the effectiveness of the proposed IDS for cyber-attack detection in both intra-vehicle and external vehicular networks.
arXiv Detail & Related papers (2022-01-27T21:24:09Z) - LATTE: LSTM Self-Attention based Anomaly Detection in Embedded
Automotive Platforms [4.286327408435937]
We present a novel anomaly detection framework called LATTE to detect cyber-attacks in Controller Area Network (CAN) based networks within automotive platforms.
Our proposed LATTE framework uses a stacked Long Short Term Memory (LSTM) predictor network with novel attention mechanisms to learn the normal operating behavior at design time.
We evaluate our proposed LATTE framework under different automotive attack scenarios and present a detailed comparison with the best-known prior works in this area.
arXiv Detail & Related papers (2021-07-12T16:32:47Z) - Fine-Grained Vehicle Perception via 3D Part-Guided Visual Data
Augmentation [77.60050239225086]
We propose an effective training data generation process by fitting a 3D car model with dynamic parts to vehicles in real images.
Our approach is fully automatic without any human interaction.
We present a multi-task network for VUS parsing and a multi-stream network for VHI parsing.
arXiv Detail & Related papers (2020-12-15T03:03:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.