SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion
Detection and Classification
- URL: http://arxiv.org/abs/2311.12074v1
- Date: Sun, 19 Nov 2023 23:49:08 GMT
- Title: SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion
Detection and Classification
- Authors: Xuemei Li, Huirong Fu
- Abstract summary: We develop two distinct models for CAN intrusion detection: CAN-SecureBERT and CAN-LLAMA2.
Can-LLAMA2 model surpasses the state-of-the-art models by achieving an exceptional performance 0.999993 in terms of balanced accuracy, precision detection rate, F1 score, and a remarkably low false alarm rate of 3.10e-6.
- Score: 2.824211356106516
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Numerous studies have proved their effective strength in detecting Control
Area Network (CAN) attacks. In the realm of understanding the human semantic
space, transformer-based models have demonstrated remarkable effectiveness.
Leveraging pre-trained transformers has become a common strategy in various
language-related tasks, enabling these models to grasp human semantics more
comprehensively. To delve into the adaptability evaluation on pre-trained
models for CAN intrusion detection, we have developed two distinct models:
CAN-SecureBERT and CAN-LLAMA2. Notably, our CAN-LLAMA2 model surpasses the
state-of-the-art models by achieving an exceptional performance 0.999993 in
terms of balanced accuracy, precision detection rate, F1 score, and a
remarkably low false alarm rate of 3.10e-6. Impressively, the false alarm rate
is 52 times smaller than that of the leading model, MTH-IDS (Multitiered Hybrid
Intrusion Detection System). Our study underscores the promise of employing a
Large Language Model as the foundational model, while incorporating adapters
for other cybersecurity-related tasks and maintaining the model's inherent
language-related capabilities.
Related papers
- Predictor-Corrector Enhanced Transformers with Exponential Moving Average Coefficient Learning [73.73967342609603]
We introduce a predictor-corrector learning framework to minimize truncation errors.
We also propose an exponential moving average-based coefficient learning method to strengthen our higher-order predictor.
Our model surpasses a robust 3.8B DeepNet by an average of 2.9 SacreBLEU, using only 1/3 parameters.
arXiv Detail & Related papers (2024-11-05T12:26:25Z) - Comparing Unidirectional, Bidirectional, and Word2vec Models for
Discovering Vulnerabilities in Compiled Lifted Code [5.4141465747474475]
This research investigates the application of unidirectional transformer-based embeddings, specifically GPT-2.
Our study reveals that embeddings from GPT-2 model significantly outperform those from bidirectional models of BERT and RoBERTa.
arXiv Detail & Related papers (2024-09-26T03:48:47Z) - Real-Time Anomaly Detection and Reactive Planning with Large Language Models [18.57162998677491]
Foundation models, e.g., large language models (LLMs), trained on internet-scale data possess zero-shot capabilities.
We present a two-stage reasoning framework that incorporates the judgement regarding potential anomalies into a safe control framework.
This enables our monitor to improve the trustworthiness of dynamic robotic systems, such as quadrotors or autonomous vehicles.
arXiv Detail & Related papers (2024-07-11T17:59:22Z) - Semantic Image Attack for Visual Model Diagnosis [80.36063332820568]
In practice, metric analysis on a specific train and test dataset does not guarantee reliable or fair ML models.
This paper proposes Semantic Image Attack (SIA), a method based on the adversarial attack that provides semantic adversarial images.
arXiv Detail & Related papers (2023-03-23T03:13:04Z) - An Empirical Study of Deep Learning Models for Vulnerability Detection [4.243592852049963]
We surveyed and reproduced 9 state-of-the-art deep learning models on 2 widely used vulnerability detection datasets.
We investigated model capabilities, training data, and model interpretation.
Our findings can help better understand model results, provide guidance on preparing training data, and improve the robustness of the models.
arXiv Detail & Related papers (2022-12-15T19:49:34Z) - Supervised Contrastive ResNet and Transfer Learning for the In-vehicle
Intrusion Detection System [0.22843885788439797]
We propose a novel deep learning model called supervised contrastive (SupCon) ResNet to handle multiple attack identification on the CAN bus.
The model improves the overall false-negative rates of four types of attack by four times on average, compared to other models.
The model achieves the highest F1 score at 0.9994 on the survival dataset by utilizing transfer learning.
arXiv Detail & Related papers (2022-07-18T05:34:55Z) - Adaptive Memory Networks with Self-supervised Learning for Unsupervised
Anomaly Detection [54.76993389109327]
Unsupervised anomaly detection aims to build models to detect unseen anomalies by only training on the normal data.
We propose a novel approach called Adaptive Memory Network with Self-supervised Learning (AMSL) to address these challenges.
AMSL incorporates a self-supervised learning module to learn general normal patterns and an adaptive memory fusion module to learn rich feature representations.
arXiv Detail & Related papers (2022-01-03T03:40:21Z) - Adversarial GLUE: A Multi-Task Benchmark for Robustness Evaluation of
Language Models [86.02610674750345]
Adversarial GLUE (AdvGLUE) is a new multi-task benchmark to explore and evaluate the vulnerabilities of modern large-scale language models under various types of adversarial attacks.
We apply 14 adversarial attack methods to GLUE tasks to construct AdvGLUE, which is further validated by humans for reliable annotations.
All the language models and robust training methods we tested perform poorly on AdvGLUE, with scores lagging far behind the benign accuracy.
arXiv Detail & Related papers (2021-11-04T12:59:55Z) - Black-box Adversarial Attacks on Network-wide Multi-step Traffic State
Prediction Models [4.353029347463806]
We propose an adversarial attack framework by treating the prediction model as a black-box.
The adversary can oracle the prediction model with any input and obtain corresponding output.
To test the attack effectiveness, two state of the art, graph neural network-based models (GCGRNN and DCRNN) are examined.
arXiv Detail & Related papers (2021-10-17T03:45:35Z) - SafeAMC: Adversarial training for robust modulation recognition models [53.391095789289736]
In communication systems, there are many tasks, like modulation recognition, which rely on Deep Neural Networks (DNNs) models.
These models have been shown to be susceptible to adversarial perturbations, namely imperceptible additive noise crafted to induce misclassification.
We propose to use adversarial training, which consists of fine-tuning the model with adversarial perturbations, to increase the robustness of automatic modulation recognition models.
arXiv Detail & Related papers (2021-05-28T11:29:04Z) - Firearm Detection via Convolutional Neural Networks: Comparing a
Semantic Segmentation Model Against End-to-End Solutions [68.8204255655161]
Threat detection of weapons and aggressive behavior from live video can be used for rapid detection and prevention of potentially deadly incidents.
One way for achieving this is through the use of artificial intelligence and, in particular, machine learning for image analysis.
We compare a traditional monolithic end-to-end deep learning model and a previously proposed model based on an ensemble of simpler neural networks detecting fire-weapons via semantic segmentation.
arXiv Detail & Related papers (2020-12-17T15:19:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.