CAN Intrusion Detection System Based on Data Augmentation and Improved Bi-LSTM

被引:0
|
作者
Zhao, Haihang [1 ]
Cheng, Anyu [2 ]
Wang, Yi [3 ]
Wang, Shanshan [1 ]
Wang, Hongrong [4 ]
机构
[1] CQUPT, Sch Commun & Informat Engn, Chongqing, Peoples R China
[2] CQUPT, Coll Automat, Chongqing, Peoples R China
[3] Product Cybersecur Privacy Off, Continental Automot Singapore, Singapore, Singapore
[4] China Automot Engn Res Inst Co Ltd, Chongqing, Peoples R China
关键词
IDS; CAN; ADASYN; Bi-LSTM; Attention Mechanism;
D O I
10.1109/APCCAS62602.2024.10808253
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Controller Area Network (CAN) protocol, as the core communication protocol for vehicular networks, is susceptible to various cyber attacks due to its openness and lack of security measures. Moreover, the severe imbalance between normal and abnormal (attack) data in vehicular communication, with a ratio of 13:1, makes detecting attack behaviors extremely challenging. First, to address the data imbalance issue, this paper proposes a data augmentation method using the Adaptive Synthetic Sampling (ADASYN) technique to enhance and balance the dataset. Then, to detect CAN bus intrusions, an improved Bi-LSTM model is proposed, which introduces a self-attention mechanism to capture critical information from CAN messages, enhancing the model's ability to detect intrusions in CAN messages. Finally, experimental results show that, compared to Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), ResNet, and EfficientNet, our method achieves an accuracy, precision, and F1 score of 0.9970, 0.9880, and 0.9888, respectively, with a model size of 2.6MB.
引用
收藏
页码:198 / 202
页数:5
相关论文
共 50 条
  • [31] An outlier detection method for open-source software running data based on Bi-LSTM network
    Deng, Jiehai
    Li, Weihong
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2024, 74 (04) : 247 - 257
  • [32] The Development of Bi-LSTM Based on Fault Diagnosis Scheme in MVDC System
    Lim, Jae-Sung
    Cho, Haesong
    Kwon, Dohoon
    Hong, Junho
    ENERGIES, 2024, 17 (18)
  • [33] Sandstorm Detection Using Attention Bi-LSTM UNet
    Mahmoud, Amira S.
    El-Morshedy, Rasha M.
    Metwalli, Mohamed R.
    Mostafa, Marwa S.
    JOURNAL OF THE INDIAN SOCIETY OF REMOTE SENSING, 2024, : 1065 - 1076
  • [34] Research on Question Classification Based on Bi-LSTM
    Zhang, Qian
    Mu, Lingling
    Zhang, Kunli
    Zan, Hongying
    Li, Yadi
    CHINESE LEXICAL SEMANTICS, CLSW 2018, 2018, 11173 : 519 - 531
  • [35] Nomadic people optimisation based Bi-LSTM for detection and tracking of tropical cyclone
    S Akila Rajini
    G Tamilpavai
    Journal of Earth System Science, 132
  • [36] Wood broken defect detection with laser profilometer based on Bi-LSTM network
    Xu, Zhezhuang
    Lin, Ye
    Chen, Dan
    Yuan, Meng
    Zhu, Yuhang
    Ai, Zhijie
    Yuan, Yazhou
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 242
  • [37] Nomadic people optimisation based Bi-LSTM for detection and tracking of tropical cyclone
    Rajini, S. Akila
    Tamilpavai, G.
    JOURNAL OF EARTH SYSTEM SCIENCE, 2023, 132 (01)
  • [38] LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications
    Hossain, Md Delwar
    Inoue, Hiroyuki
    Ochiai, Hideya
    Fall, Doudou
    Kadobayashi, Youki
    IEEE ACCESS, 2020, 8 (08) : 185489 - 185502
  • [39] VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection
    Tian, Wuxin
    Shen, Yanping
    Guo, Na
    Yuan, Jing
    Yang, Yanqing
    SENSORS, 2024, 24 (18)
  • [40] Feature Envy Detection based on Bi-LSTM with Self-Attention Mechanism
    Wang, Hongze
    Liu, Jing
    Kang, JieXiang
    Yin, Wei
    Sun, Haiying
    Wang, Hui
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 448 - 457