GDT-IDS: graph-based decision tree intrusion detection system for controller area network

被引:0
|
作者
Ye, Pengdong [1 ,2 ]
Liang, Yanhua [1 ,2 ]
Bie, Yutao [3 ]
Qin, Guihe [1 ,2 ]
Song, Jiaru [1 ,2 ]
Wang, Yingqing [1 ,2 ]
Liu, Wanning [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, 2699 Qianjin St, Changchun 130012, Jilin, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, 2699 Qianjin St, Changchun 130012, Jilin, Peoples R China
[3] Jilin Univ, Ctr Comp Fundamental Educ, 2699 Qianjin St, Changchun 130012, Jilin, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2025年 / 81卷 / 04期
关键词
Controller area network; Intrusion detection system; Decision tree; Graph density; Time difference; Betweenness centrality; ANOMALY DETECTION; VEHICLE;
D O I
10.1007/s11227-025-07116-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of automotive technology, the security of in-vehicle networks (IVN) has received increasing attention. The controller area network (CAN), widely used for in-vehicle communication, faces significant security risks due to its inherent vulnerabilities. These risks can lead to attacks, data leakage, and abnormal functioning of vehicle systems. Currently, the mainstream security approach is the intrusion detection system (IDS). Graph-based IDSs have been widely studied for their ability to represent the relationships between CAN messages through nodes and edges, providing an intuitive and structured analysis that enables effective detection of various types of attacks. However, existing graph-based methods rely on basic features, such as the number of nodes, edges, and the maximum degree, which are insufficient for capturing the complex characteristics of spoofing and replay attacks, resulting in suboptimal detection accuracy. To address this, we propose a graph-based decision tree IDS, named GDT-IDS, specifically tailored to the characteristics of spoofing and replay attacks. By analyzing these attack types, we introduce three novel graph-based features-time difference, betweenness centrality, and graph density-that significantly enhance detection accuracy. Moreover, our method can perform multi-class classification, effectively handling mixed attack scenarios. The use of a decision tree model ensures the process remains lightweight and interpretable, making it suitable for resource-constrained systems like vehicles.
引用
收藏
页数:30
相关论文
共 50 条
  • [41] G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol
    Park, Sung Bum
    Jo, Hyo Jin
    Lee, Dong Hoon
    IEEE ACCESS, 2023, 11 : 39213 - 39227
  • [42] A Statefull Firewall and Intrusion Detection System Enforced with Secure Logging for Controller Area Network
    Lenard, Teri
    Bolboaca, Roland
    PROCEEDINGS OF THE 2021 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2021, 2021, : 39 - 45
  • [43] SSA-GAT: Graph-Based Self-supervised Learning for Network Intrusion Detection
    Liu, Qian
    Zhang, Hui
    Zhang, Youpeng
    Fan, Lin
    Jin, Xue
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING-ICANN 2024, PT IX, 2024, 15024 : 476 - 491
  • [44] Graph Embedding for Graph Neural Network in Intrusion Detection System
    Dinh-Hau Tran
    Park, Minho
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 395 - 397
  • [45] Analysis of hepatitis dataset by decision tree based on graph-based induction
    Geamsakul, Warodom
    Matsuda, Takashi
    Yoshida, Tetsuya
    Ohara, Kouzou
    Motoda, Hiroshi
    Washio, Takashi
    Yokoi, Hideto
    Takabayashi, Katsuhiko
    NEW FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2007, 3609 : 5 - +
  • [46] Survey of Automotive Controller Area Network Intrusion Detection Systems
    Young, Clinton
    Zambreno, Joseph
    Olufowobi, Habeeb
    Bloom, Gedare
    IEEE DESIGN & TEST, 2019, 36 (06) : 48 - 55
  • [47] A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks
    Zhang, Xing
    Cui, Xiaotong
    Cheng, Kefei
    Zhang, Liang
    2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 366 - 369
  • [48] Intrusion Detection System Using Decision Tree Algorithm
    Kumar, Manish
    Hanumanthappa, M.
    Kumar, T. V. Suresh
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 629 - 634
  • [49] Decision Tree Generation Method in Intrusion Detection System
    Du, Panpan
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 265 - 268
  • [50] IDS-COG - Intrusion Detection System for Cognitive Radio Network
    Gavinho Filho, Joffre
    Carmo, Luiz F. R. C.
    Machado, Raphael
    Pirmez, Luci
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (03): : 1 - 10