GAN model using field fuzz mutation for in-vehicle CAN bus intrusion detection

被引:1
|
作者
Li Z. [1 ]
Jiang W. [1 ]
Liu X. [1 ]
Tan K. [2 ]
Jin X. [1 ]
Yang M. [1 ]
机构
[1] School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin
[2] School of Cyberspace Science, Harbin Institute of Technology, Harbin
关键词
controller area network bus; cyber security; FAMGAN; fuzz testing; generation adversarial network; in-vehicle network; intrusion detection;
D O I
10.3934/mbe.2022330
中图分类号
学科分类号
摘要
Controller area network (CAN) are widely used in smart vehicles to realize information interactions between electronic control units and other devices in vehicles. Owing to an increase in external communication interfaces, the cybersecurity of in-vehicle CAN bus networks is threatened. In-vehicle CAN intrusion detection systems with high detection rates and low false-negative rates have become important security protection measures for automotive networks. The boundary of the current machine learning-based in-vehicle CAN bus intrusion detection algorithm to determine the anomalous behavior triggered by CAN messages is unclear, and a validity check is required after the intrusion detection algorithm is designed. To solve the low coverage rate problem in the process of validating intrusion detection algorithms, an in-vehicle CAN fuzz-testing message generation model, the fieldassociative mutation generation adversarial network (FAMGAN), is proposed. To improve the defects of high randomness in generating messages in traditional fuzz-testing algorithms, FAMGAN adopts field division based on a conditional random field and the field association method based on the Apriori algorithm. Experiments were conducted on a real car using a code-built intrusion detection algorithm. The results demonstrate that FAMGAN can efficiently generate anomalous CAN messages and evaluate the performance of an in-vehicle CAN intrusion detection algorithm. © 2022 American Institute of Mathematical Sciences. All rights reserved.
引用
收藏
页码:6996 / 7018
页数:22
相关论文
共 50 条
  • [41] CANBERT: A Language-based Intrusion Detection Model for In-vehicle Networks
    Nwafor, Ebelechukwu
    Olufowobi, Habeeb
    [J]. 2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 294 - 299
  • [42] Attacker Identification and Intrusion Detection for In-Vehicle Networks
    Ning, Jing
    Wang, Jiadai
    Liu, Jiajia
    Kato, Nei
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1927 - 1930
  • [43] Intrusion detection system using SOEKS and deep learning for in-vehicle security
    Lulu Gao
    Fei Li
    Xiang Xu
    Yong Liu
    [J]. Cluster Computing, 2019, 22 : 14721 - 14729
  • [44] In-Vehicle Network Intrusion Detection and Explanation Using Density Ratio Estimation
    Tanaka, Daiki
    Yamada, Makoto
    Kashima, Hisashi
    Kishikawa, Takeshi
    Haga, Tomoyuki
    Sasaki, Takamitsu
    [J]. 2019 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2019, : 2238 - 2243
  • [45] Intrusion detection system using SOEKS and deep learning for in-vehicle security
    Gao, Lulu
    Li, Fei
    Xu, Xiang
    Liu, Yong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14721 - 14729
  • [46] In-vehicle network intrusion detection using deep convolutional neural network
    Song, Hyun Min
    Woo, Jiyoung
    Kim, Huy Kang
    [J]. VEHICULAR COMMUNICATIONS, 2020, 21
  • [47] CAN Bus Intrusion Detection Based on Auxiliary Classifier GAN and Out-of-distribution Detection
    Zhao, Qingling
    Chen, Mingqiang
    Gu, Zonghua
    Luan, Siyu
    Zeng, Haibo
    Chakrabory, Samarjit
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2022, 21 (04)
  • [48] T-Shaped CAN Feature Integration With Lightweight Deep Learning Model for In-Vehicle Network Intrusion Detection
    Huan, Sha
    Zhang, Xiaoyi
    Shang, Wenli
    Cao, Haitao
    Li, Heng
    Yang, Yuanjia
    Liu, Wenbai
    [J]. IEEE Transactions on Intelligent Transportation Systems, 2024, 25 (12) : 21183 - 21196
  • [49] Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN
    Kim, Wansoo
    Lee, Jungho
    Lee, Yousik
    Kim, Yoenjin
    Chung, Jingyun
    Woo, Samuel
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [50] MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle Networks
    Desta, Araya Kibrom
    Ohira, Shuji
    Arai, Ismail
    Fujikawa, Kazutoshi
    [J]. 2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, : 54 - 60