Effective In-vehicle Intrusion Detection via Multi-view Statistical
Graph Learning on CAN Messages
- URL: http://arxiv.org/abs/2311.07056v1
- Date: Mon, 13 Nov 2023 03:49:55 GMT
- Title: Effective In-vehicle Intrusion Detection via Multi-view Statistical
Graph Learning on CAN Messages
- Authors: Kai Wang, Qiguang Jiang, Bailing Wang, Yongzheng Zhang, Yulei Wu
- Abstract summary: In-vehicle network (IVN) is facing a wide variety of complex and changing external cyber-attacks.
Only coarse-grained recognition can be achieved in current mainstream intrusion detection mechanisms.
We propose StatGraph: an Effective Multi-view Statistical Graph Learning Intrusion Detection.
- Score: 9.04771951523525
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: As an important component of internet of vehicles (IoV), intelligent
connected vehicles (ICVs) have to communicate with external networks
frequently. In this case, the resource-constrained in-vehicle network (IVN) is
facing a wide variety of complex and changing external cyber-attacks,
especially the masquerade attack with high difficulty of detection while
serious damaging effects that few counter measures can identify successfully.
Moreover, only coarse-grained recognition can be achieved in current mainstream
intrusion detection mechanisms, i.e., whether a whole data flow observation
window contains attack labels rather than fine-grained recognition on every
single data item within this window. In this paper, we propose StatGraph: an
Effective Multi-view Statistical Graph Learning Intrusion Detection to
implement the fine-grained intrusion detection. Specifically, StatGraph
generates two statistical graphs, timing correlation graph (TCG) and coupling
relationship graph (CRG), based on data streams. In given message observation
windows, edge attributes in TCGs represent temporal correlation between
different message IDs, while edge attributes in CRGs denote the neighbour
relationship and contextual similarity. Besides, a lightweight shallow layered
GCN network is trained based graph property of TCGs and CRGs, which can learn
the universal laws of various patterns more effectively and further enhance the
performance of detection. To address the problem of insufficient attack types
in previous intrusion detection, we select two real in-vehicle CAN datasets
that cover four new attacks never investigated before. Experimental result
shows StatGraph improves both detection granularity and detection performance
over state-of-the-art intrusion detection methods.
Related papers
- Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning [0.2812395851874055]
This paper introduces a novel framework for detecting masquerade attacks in the CAN bus using graph machine learning (ML)
We show that by representing CAN bus frames as message sequence graphs (MSGs) and enriching each node with contextual statistical attributes from time series, we can enhance detection capabilities.
Our method ensures a comprehensive and dynamic analysis of CAN frame interactions, improving robustness and efficiency.
arXiv Detail & Related papers (2024-08-10T04:17:58Z) - EG-ConMix: An Intrusion Detection Method based on Graph Contrastive Learning [4.140068761522124]
We propose an EG-ConMix method based on E-GraphSAGE, incorporating a data augmentation module to fix the problem of data imbalance.
EG-ConMix exhibits significant advantages in terms of training speed and accuracy for large-scale graphs.
arXiv Detail & Related papers (2024-03-24T04:09:48Z) - Multitask Active Learning for Graph Anomaly Detection [48.690169078479116]
We propose a novel MultItask acTIve Graph Anomaly deTEction framework, namely MITIGATE.
By coupling node classification tasks, MITIGATE obtains the capability to detect out-of-distribution nodes without known anomalies.
Empirical studies on four datasets demonstrate that MITIGATE significantly outperforms the state-of-the-art methods for anomaly detection.
arXiv Detail & Related papers (2024-01-24T03:43:45Z) - Network Intrusion Detection with Edge-Directed Graph Multi-Head Attention Networks [13.446986347747325]
This paper proposes novel Edge-Directed Graph Multi-Head Attention Networks (EDGMAT) for network intrusion detection.
The proposed EDGMAT model introduces a multi-head attention mechanism into the intrusion detection model. Additional weight learning is realized through the combination of a multi-head attention mechanism and edge features.
arXiv Detail & Related papers (2023-10-26T12:30:11Z) - BOURNE: Bootstrapped Self-supervised Learning Framework for Unified
Graph Anomaly Detection [50.26074811655596]
We propose a novel unified graph anomaly detection framework based on bootstrapped self-supervised learning (named BOURNE)
By swapping the context embeddings between nodes and edges, we enable the mutual detection of node and edge anomalies.
BOURNE can eliminate the need for negative sampling, thereby enhancing its efficiency in handling large graphs.
arXiv Detail & Related papers (2023-07-28T00:44:57Z) - EDoG: Adversarial Edge Detection For Graph Neural Networks [17.969573886307906]
Graph Neural Networks (GNNs) have been widely applied to different tasks such as bioinformatics, drug design, and social networks.
Recent studies have shown that GNNs are vulnerable to adversarial attacks which aim to mislead the node or subgraph classification prediction by adding subtle perturbations.
We propose a general adversarial edge detection pipeline EDoG without requiring knowledge of the attack strategies based on graph generation.
arXiv Detail & Related papers (2022-12-27T20:42:36Z) - Learning Hierarchical Graph Representation for Image Manipulation
Detection [50.04902159383709]
The objective of image manipulation detection is to identify and locate the manipulated regions in the images.
Recent approaches mostly adopt the sophisticated Convolutional Neural Networks (CNNs) to capture the tampering artifacts left in the images.
We propose a hierarchical Graph Convolutional Network (HGCN-Net), which consists of two parallel branches.
arXiv Detail & Related papers (2022-01-15T01:54:25Z) - Deep Fraud Detection on Non-attributed Graph [61.636677596161235]
Graph Neural Networks (GNNs) have shown solid performance on fraud detection.
labeled data is scarce in large-scale industrial problems, especially for fraud detection.
We propose a novel graph pre-training strategy to leverage more unlabeled data.
arXiv Detail & Related papers (2021-10-04T03:42:09Z) - Unveiling Anomalous Edges and Nominal Connectivity of Attributed
Networks [53.56901624204265]
The present work deals with uncovering anomalous edges in attributed graphs using two distinct formulations with complementary strengths.
The first relies on decomposing the graph data matrix into low rank plus sparse components to improve markedly performance.
The second broadens the scope of the first by performing robust recovery of the unperturbed graph, which enhances the anomaly identification performance.
arXiv Detail & Related papers (2021-04-17T20:00:40Z) - Graph Backdoor [53.70971502299977]
We present GTA, the first backdoor attack on graph neural networks (GNNs)
GTA departs in significant ways: it defines triggers as specific subgraphs, including both topological structures and descriptive features.
It can be instantiated for both transductive (e.g., node classification) and inductive (e.g., graph classification) tasks.
arXiv Detail & Related papers (2020-06-21T19:45:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.