Supervised Contrastive ResNet and Transfer Learning for the In-vehicle
Intrusion Detection System
- URL: http://arxiv.org/abs/2207.10814v1
- Date: Mon, 18 Jul 2022 05:34:55 GMT
- Title: Supervised Contrastive ResNet and Transfer Learning for the In-vehicle
Intrusion Detection System
- Authors: Thien-Nu Hoang, Daehee Kim
- Abstract summary: We propose a novel deep learning model called supervised contrastive (SupCon) ResNet to handle multiple attack identification on the CAN bus.
The model improves the overall false-negative rates of four types of attack by four times on average, compared to other models.
The model achieves the highest F1 score at 0.9994 on the survival dataset by utilizing transfer learning.
- Score: 0.22843885788439797
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: High-end vehicles have been furnished with a number of electronic control
units (ECUs), which provide upgrading functions to enhance the driving
experience. The controller area network (CAN) is a well-known protocol that
connects these ECUs because of its modesty and efficiency. However, the CAN bus
is vulnerable to various types of attacks. Although the intrusion detection
system (IDS) is proposed to address the security problem of the CAN bus, most
previous studies only provide alerts when attacks occur without knowing the
specific type of attack. Moreover, an IDS is designed for a specific car model
due to diverse car manufacturers. In this study, we proposed a novel deep
learning model called supervised contrastive (SupCon) ResNet, which can handle
multiple attack identification on the CAN bus. Furthermore, the model can be
used to improve the performance of a limited-size dataset using a transfer
learning technique. The capability of the proposed model is evaluated on two
real car datasets. When tested with the car hacking dataset, the experiment
results show that the SupCon ResNet model improves the overall false-negative
rates of four types of attack by four times on average, compared to other
models. In addition, the model achieves the highest F1 score at 0.9994 on the
survival dataset by utilizing transfer learning. Finally, the model can adapt
to hardware constraints in terms of memory size and running time.
Related papers
- AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN) [4.081467217340597]
The Controller Area Network (CAN) bus is a central system for managing in-vehicle communication between the electronic control units (ECUs)
CAN protocol poses security challenges due to inherent vulnerabilities, lacking encryption and authentication, which, combined with an expanding attack surface, necessitates robust security measures.
This paper considers the latest ROAD dataset, containing stealthy and sophisticated injections.
arXiv Detail & Related papers (2024-08-30T12:26:23Z) - Exploring Highly Quantised Neural Networks for Intrusion Detection in
Automotive CAN [13.581341206178525]
Machine learning-based intrusion detection models have been shown to successfully detect multiple targeted attack vectors.
In this paper, we present a case for custom-quantised literature (CQMLP) as a multi-class classification model.
We show that the 2-bit CQMLP model, when integrated as the IDS, can detect malicious attack messages with a very high accuracy of 99.9%.
arXiv Detail & Related papers (2024-01-19T21:11:02Z) - SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion
Detection and Classification [2.824211356106516]
We develop two distinct models for CAN intrusion detection: CAN-SecureBERT and CAN-LLAMA2.
Can-LLAMA2 model surpasses the state-of-the-art models by achieving an exceptional performance 0.999993 in terms of balanced accuracy, precision detection rate, F1 score, and a remarkably low false alarm rate of 3.10e-6.
arXiv Detail & Related papers (2023-11-19T23:49:08Z) - Enhancing Multiple Reliability Measures via Nuisance-extended
Information Bottleneck [77.37409441129995]
In practical scenarios where training data is limited, many predictive signals in the data can be rather from some biases in data acquisition.
We consider an adversarial threat model under a mutual information constraint to cover a wider class of perturbations in training.
We propose an autoencoder-based training to implement the objective, as well as practical encoder designs to facilitate the proposed hybrid discriminative-generative training.
arXiv Detail & Related papers (2023-03-24T16:03:21Z) - Unsupervised Driving Event Discovery Based on Vehicle CAN-data [62.997667081978825]
This work presents a simultaneous clustering and segmentation approach for vehicle CAN-data that identifies common driving events in an unsupervised manner.
We evaluate our approach with a dataset of real Tesla Model 3 vehicle CAN-data and a two-hour driving session that we annotated with different driving events.
arXiv Detail & Related papers (2023-01-12T13:10:47Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - Comparative Study on Supervised versus Semi-supervised Machine Learning for Anomaly Detection of In-vehicle CAN Network [5.965136243028868]
This study compares fully-supervised machine learning with semi-supervised machine learning methods for CAN message anomaly detection.
XGBoost based model obtained state-of-the-art performance with the best accuracy (98.65%), precision (0.9853), and ROC AUC (0.9585) beating other methods reported in the literature.
arXiv Detail & Related papers (2022-07-21T03:50:21Z) - COOPERNAUT: End-to-End Driving with Cooperative Perception for Networked
Vehicles [54.61668577827041]
We introduce COOPERNAUT, an end-to-end learning model that uses cross-vehicle perception for vision-based cooperative driving.
Our experiments on AutoCastSim suggest that our cooperative perception driving models lead to a 40% improvement in average success rate.
arXiv Detail & Related papers (2022-05-04T17:55:12Z) - CANShield: Signal-based Intrusion Detection for Controller Area Networks [29.03951113836835]
We propose CANShield, a signal-based intrusion detection framework for the CAN bus.
CanShield consists of three modules: a data preprocessing module that handles the high-dimensional CAN data stream at the signal level; a data analyzer module consisting of multiple deep autoencoder networks, each analyzing the time-series data from a different temporal perspective; and an attack detection module that uses an ensemble method to make the final decision.
arXiv Detail & Related papers (2022-05-03T04:52:44Z) - Neurosymbolic hybrid approach to driver collision warning [64.02492460600905]
There are two main algorithmic approaches to autonomous driving systems.
Deep learning alone has achieved state-of-the-art results in many areas.
But sometimes it can be very difficult to debug if the deep learning model doesn't work.
arXiv Detail & Related papers (2022-03-28T20:29:50Z) - Fine-Grained Vehicle Perception via 3D Part-Guided Visual Data
Augmentation [77.60050239225086]
We propose an effective training data generation process by fitting a 3D car model with dynamic parts to vehicles in real images.
Our approach is fully automatic without any human interaction.
We present a multi-task network for VUS parsing and a multi-stream network for VHI parsing.
arXiv Detail & Related papers (2020-12-15T03:03:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.