Deep Transfer Learning Based Intrusion Detection System for Electric
Vehicular Networks
- URL: http://arxiv.org/abs/2107.05172v1
- Date: Mon, 12 Jul 2021 03:06:49 GMT
- Title: Deep Transfer Learning Based Intrusion Detection System for Electric
Vehicular Networks
- Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman and Kawsar Ahmed
- Abstract summary: The risk of IVN devices has still been insecure and vulnerable due to the complex data-intensive architectures.
Traditional machine learning-based IDS has to update to cope with the security requirements of the current environment.
This manuscript proposes a deep transfer learning-based IDS model for IVN along with improved performance in comparison to several other existing models.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Controller Area Network (CAN) bus works as an important protocol in the
real-time In-Vehicle Network (IVN) systems for its simple, suitable, and robust
architecture. The risk of IVN devices has still been insecure and vulnerable
due to the complex data-intensive architectures which greatly increase the
accessibility to unauthorized networks and the possibility of various types of
cyberattacks. Therefore, the detection of cyberattacks in IVN devices has
become a growing interest. With the rapid development of IVNs and evolving
threat types, the traditional machine learning-based IDS has to update to cope
with the security requirements of the current environment. Nowadays, the
progression of deep learning, deep transfer learning, and its impactful outcome
in several areas has guided as an effective solution for network intrusion
detection. This manuscript proposes a deep transfer learning-based IDS model
for IVN along with improved performance in comparison to several other existing
models. The unique contributions include effective attribute selection which is
best suited to identify malicious CAN messages and accurately detect the normal
and abnormal activities, designing a deep transfer learning-based LeNet model,
and evaluating considering real-world data. To this end, an extensive
experimental performance evaluation has been conducted. The architecture along
with empirical analyses shows that the proposed IDS greatly improves the
detection accuracy over the mainstream machine learning, deep learning, and
benchmark deep transfer learning models and has demonstrated better performance
for real-time IVN security.
Related papers
- A Cutting-Edge Deep Learning Method For Enhancing IoT Security [0.0]
This paper proposes an innovative design of the Internet of Things (IoT) Environment Intrusion Detection System (or IDS) using Deep Learning-integrated Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks.
Our model, based on the CICIDS 2017 dataset, achieved an accuracy of 99.52% in classifying network traffic as either benign or malicious.
arXiv Detail & Related papers (2024-06-18T08:42:51Z) - Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices [38.16309790239142]
Intrusion Detection Systems (IDSs) have played a significant role in detecting and preventing cyber-attacks within traditional computing systems.
The limited computational resources available on Internet of Things (IoT) devices make it challenging to deploy conventional computing-based IDSs.
We propose a hybrid CNN architecture composed of a lightweight CNN and bidirectional LSTM (BiLSTM) to enhance the performance of IDS on the UNSW-NB15 dataset.
arXiv Detail & Related papers (2024-06-04T20:36:21Z) - Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach [38.38311259444761]
We introduce a new deep learning-based technique for detecting DDoS attacks.
We propose a new dual-space prototypical network that leverages a unique dual-space loss function.
This approach capitalizes on the strengths of representation learning within the latent space.
arXiv Detail & Related papers (2024-06-04T03:22:52Z) - Deep Learning Algorithms Used in Intrusion Detection Systems -- A Review [0.0]
This review paper studies recent advancements in the application of deep learning techniques, including CNN, Recurrent Neural Networks (RNN), Deep Belief Networks (DBN), Deep Neural Networks (DNN), Long Short-Term Memory (LSTM), autoencoders (AE), Multi-Layer Perceptrons (MLP), Self-Normalizing Networks (SNN) and hybrid models, within network intrusion detection systems.
arXiv Detail & Related papers (2024-02-26T20:57:35Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Visual Prompting Upgrades Neural Network Sparsification: A Data-Model Perspective [64.04617968947697]
We introduce a novel data-model co-design perspective: to promote superior weight sparsity.
Specifically, customized Visual Prompts are mounted to upgrade neural Network sparsification in our proposed VPNs framework.
arXiv Detail & Related papers (2023-12-03T13:50:24Z) - Effective Intrusion Detection in Highly Imbalanced IoT Networks with
Lightweight S2CGAN-IDS [48.353590166168686]
Internet of Things (IoT) networks contain benign traffic far more than abnormal traffic, with some rare attacks.
Most existing studies have been focused on sacrificing the detection rate of the majority class in order to improve the detection rate of the minority class.
We propose a lightweight framework named S2CGAN-IDS to expand the number of minority categories in both data space and feature space.
arXiv Detail & Related papers (2023-06-06T14:19:23Z) - Adversarial training with informed data selection [53.19381941131439]
Adrial training is the most efficient solution to defend the network against these malicious attacks.
This work proposes a data selection strategy to be applied in the mini-batch training.
The simulation results show that a good compromise can be obtained regarding robustness and standard accuracy.
arXiv Detail & Related papers (2023-01-07T12:09:50Z) - An Online Ensemble Learning Model for Detecting Attacks in Wireless
Sensor Networks [0.0]
We develop an intelligent, efficient, and updatable intrusion detection system by applying an important machine learning concept known as ensemble learning.
In this paper, we examine the application of different homogeneous and heterogeneous online ensembles in sensory data analysis.
Among the proposed novel online ensembles, both the heterogeneous ensemble consisting of an Adaptive Random Forest (ARF) combined with the Hoeffding Adaptive Tree (HAT) algorithm and the homogeneous ensemble HAT made up of 10 models achieved higher detection rates of 96.84% and 97.2%, respectively.
arXiv Detail & Related papers (2022-04-28T23:10:47Z) - Dependable Intrusion Detection System for IoT: A Deep Transfer
Learning-based Approach [0.0]
This manuscript proposes a deep transfer learning-based dependable IDS model that outperforms several existing approaches.
It includes effective attribute selection, which is best suited to identify normal and attack scenarios for a small amount of labeled data.
It also includes a dependable deep transfer learning-based ResNet model, and evaluating considering real-world data.
arXiv Detail & Related papers (2022-04-11T02:46:22Z) - Deep Transfer Learning: A Novel Collaborative Learning Model for
Cyberattack Detection Systems in IoT Networks [17.071452978622123]
Federated Learning (FL) has recently become an effective approach for cyberattack detection systems.
FL can improve learning efficiency, reduce communication overheads and enhance privacy for cyberattack detection systems.
Challenges in implementation of FL in such systems include unavailability of labeled data and dissimilarity of data features in different IoT networks.
arXiv Detail & Related papers (2021-12-02T05:26:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.