CAN Intrusion Detection System Based on Data Augmentation and Improved Bi-LSTM

被引:0
|
作者
Zhao, Haihang [1 ]
Cheng, Anyu [2 ]
Wang, Yi [3 ]
Wang, Shanshan [1 ]
Wang, Hongrong [4 ]
机构
[1] CQUPT, Sch Commun & Informat Engn, Chongqing, Peoples R China
[2] CQUPT, Coll Automat, Chongqing, Peoples R China
[3] Product Cybersecur Privacy Off, Continental Automot Singapore, Singapore, Singapore
[4] China Automot Engn Res Inst Co Ltd, Chongqing, Peoples R China
关键词
IDS; CAN; ADASYN; Bi-LSTM; Attention Mechanism;
D O I
10.1109/APCCAS62602.2024.10808253
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Controller Area Network (CAN) protocol, as the core communication protocol for vehicular networks, is susceptible to various cyber attacks due to its openness and lack of security measures. Moreover, the severe imbalance between normal and abnormal (attack) data in vehicular communication, with a ratio of 13:1, makes detecting attack behaviors extremely challenging. First, to address the data imbalance issue, this paper proposes a data augmentation method using the Adaptive Synthetic Sampling (ADASYN) technique to enhance and balance the dataset. Then, to detect CAN bus intrusions, an improved Bi-LSTM model is proposed, which introduces a self-attention mechanism to capture critical information from CAN messages, enhancing the model's ability to detect intrusions in CAN messages. Finally, experimental results show that, compared to Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), ResNet, and EfficientNet, our method achieves an accuracy, precision, and F1 score of 0.9970, 0.9880, and 0.9888, respectively, with a model size of 2.6MB.
引用
收藏
页码:198 / 202
页数:5
相关论文
共 50 条
  • [41] Attention-based Bi-LSTM Model for Anomalous HTTP Traffic Detection
    Yu, Yuqi
    Liu, Guannan
    Yan, Hanbing
    Li, Hong
    Guan, Hongchao
    2018 15TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT (ICSSSM), 2018,
  • [42] Deep attention based optimized Bi-LSTM for improving geospatial data ontology
    Sambandam, Palaniappan
    Yuvaraj, D.
    Padmakumari, P.
    Swaminathan, Subbiah
    DATA & KNOWLEDGE ENGINEERING, 2023, 144
  • [43] Sql injection detection algorithm based on Bi-LSTM and integrated feature selection
    Qin, Qiurong
    Li, Yueqin
    Mi, Yajie
    Shen, Jinhui
    Wu, Kexin
    Wang, Zhenzhao
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04):
  • [44] An improved multi-modal framework for fake news detection using NLP and Bi-LSTM
    Alsuwat, Emad
    Alsuwat, Hatim
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [45] Recongnition of Distracted Driving Behavior Based on Improved Bi-LSTM Model and Attention Mechanism
    Wang, Zhanfeng
    Yao, Lisha
    IEEE ACCESS, 2024, 12 : 67711 - 67725
  • [46] Intrusion Detection System After Data Augmentation Schemes Based on the VAE and CVAE
    Liu, Chang
    Antypenko, Ruslan
    Sushko, Iryna
    Zakharchenko, Oksana
    IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (02) : 1000 - 1010
  • [47] Activity location recognition from mobile phone data using improved HAC and Bi-LSTM
    Jiang, Haihang
    Yang, Fei
    Su, Weijie
    Yao, Zhenxing
    Dai, Zhuang
    IET INTELLIGENT TRANSPORT SYSTEMS, 2022, 16 (10) : 1364 - 1379
  • [48] An Intrusion Detection System Model Based on Bidirectional LSTM
    Alsyaibani, Omar Muhammad Altoumi
    Utami, Ema
    Hartanto, Anggit Dwi
    3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 13 - 18
  • [49] Hybrid Distance-based, CNN and Bi-LSTM System for Dictionary Expansion
    Szakacs, Bela Benedek
    Meszaros, Tamas
    INFOCOMMUNICATIONS JOURNAL, 2020, 12 (04): : 6 - 13
  • [50] Bus Load Forecasting Method of Power System Based on VMD and Bi-LSTM
    Tang, Jiajie
    Zhao, Jie
    Zou, Hongliang
    Ma, Gaoyuan
    Wu, Jun
    Jiang, Xu
    Zhang, Huaixun
    SUSTAINABILITY, 2021, 13 (19)