Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks

被引:0
|
作者
Lin, Ying-Dar [1 ]
Chan, Wei-Hsiang [1 ]
Lai, Yuan-Cheng [2 ]
Yu, Chia-Mu [3 ]
Wu, Yu-Sung [1 ]
Lee, Wei-Bin [4 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 10607, Taiwan
[3] Natl Yang Ming Chiao Tung Univ, Dept Elect & Elect Engn, Hsinchu 300, Taiwan
[4] Hon Hai Res Inst, Taipei, Taiwan
关键词
Adversarial attack; Machine learning; Intrusion detection; Distance-based optimization; Electronic vehicle;
D O I
10.1016/j.cose.2025.104322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control Area Networks (CAN) face serious security threats recently due to their inherent vulnerabilities and the increasing sophistication of cyberattacks targeting automotive and industrial systems. This paper focuses on enhancing the security of CAN, which currently lack adequate defense mechanisms. We propose integrating Machine Learning-based Intrusion Detection Systems (ML-based IDS) into the network to address this vulnerability. However, ML systems are susceptible to adversarial attacks, leading to misclassification of data. We introduce three defense combination methods to mitigate this risk: adversarial training, ensemble learning, and distance-based optimization. Additionally, we employ a simulated annealing algorithm in distance-based optimization to optimize the distance moved in feature space, aiming to minimize intra-class distance and maximize the inter-class distance. Our results show that the ZOO attack is the most potent adversarial attack, significantly impacting model performance. In terms of model, the basic models achieve an F1 score of 0.99, with CNN being the most robust against adversarial attacks. Under known adversarial attacks, the average F1 score decreases to 0.56. Adversarial training with triplet loss does not perform well, achieving only 0.64, while our defense method attains the highest F1 score of 0.97. For unknown adversarial attacks, the F1 score drops to 0.24, with adversarial training with triplet loss scoring 0.47. Our defense method still achieves the highest score of 0.61. These results demonstrate our method's excellent performance against known and unknown adversarial attacks.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Adversarial ML-Based Secured Cloud Architecture for Consumer Internet of Things of Smart Healthcare
    Samriya, Jitendra Kumar
    Chakraborty, Chinmay
    Sharma, Aditi
    Kumar, Mohit
    Ramakuri, Sravanth Kumar
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 2058 - 2065
  • [42] An Adversarial Attack on ML-Based IoT Malware Detection Using Binary Diversification Techniques
    Mwangi, Maina Bernard
    Cheng, Shin-Ming
    IEEE ACCESS, 2024, 12 : 185172 - 185186
  • [43] Can ML-based Reliability Models Span Quantum Hardware Boundaries?
    Ioannou, Georgios
    Kizhuvettil, Gopika
    Charrwi, Mohammad Walid
    Saeed, Samah Mohamed
    2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, : 607 - 612
  • [44] An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids
    Sen, Oemer
    Malskorn, Philipp
    Glomb, Simon
    Hacker, Immanuel
    Henze, Martin
    Ulbig, Andreas
    2023 IEEE BELGRADE POWERTECH, 2023,
  • [45] XAI enhancing cyber defence against adversarial attacks in industrial applications
    Makridis, Georgios
    Theodoropoulos, Spyros
    Dardanis, Dimitrios
    Makridis, Ioannis
    Separdani, Maria Margarita
    Fatouros, Georgios
    Kyriazis, Dimosthenis
    Koulouris, Panagiotis
    2022 IEEE 5TH INTERNATIONAL CONFERENCE ON IMAGE PROCESSING APPLICATIONS AND SYSTEMS, IPAS, 2022,
  • [46] DroidEye: Fortifying Security of Learning-based Classifier against Adversarial Android Malware Attacks
    Chen, Lingwei
    Hou, Shifu
    Ye, Yanfang
    Xu, Shouhuai
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 782 - 789
  • [47] ML-Based 5G Network Slicing Security: A Comprehensive Survey
    Dangi, Ramraj
    Jadhav, Akshay
    Choudhary, Gaurav
    Dragoni, Nicola
    Mishra, Manas Kumar
    Lalwani, Praveen
    FUTURE INTERNET, 2022, 14 (04):
  • [48] Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks
    Biringa, Chidera
    Baye, Gaspard
    Kul, Gokhan
    PROCEEDINGS OF THE 11TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2022, 2022, : 53 - 57
  • [49] An Efficient ML-based Hardware Trojan Localization Framework for RTL Security Analysis
    Fan, Ruchao
    Tang, Yongming
    Sun, Hao
    Liu, Jiyuan
    Li, He
    2024 ACM/IEEE 6TH SYMPOSIUM ON MACHINE LEARNING FOR CAD, MLCAD 2024, 2024,
  • [50] SeVuc: A study on the Security Vulnerabilities of Capsule Networks against adversarial attacks
    Marchisio, Alberto
    Nanfa, Giorgio
    Khalid, Faiq
    Hanif, Muhammad Abdullah
    Martina, Maurizio
    Shafique, Muhammad
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 96