[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Detecting CAN Bus Intrusion by Applying Machine Learning Method to Graph Based Features

  • Conference paper
  • First Online:
Intelligent Systems and Applications (IntelliSys 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 296))

Included in the following conference series:

Abstract

Modern vehicle is considered as a system vulnerable to attacks because it is connected to the outside world via a wireless interface. Although, connectivity provides more convenience and features to the passengers, however, it also becomes a pathway for the attackers targeting in-vehicle networks. Research in vehicle security is getting attention as in-vehicle attacks can impact human life safety as modern vehicle is connected to the outside world. Controller area network (CAN) is used as a legacy protocol for in-vehicle communication, However, CAN suffers from vulnerabilities due to lack of authentication, as the information about sender is missing in CAN message. In this paper, a new CAN intrusion detection system (IDS) is proposed, the CAN messages are converted to temporal graphs and CAN intrusion is detected using machine learning algorithms. Seven graph-based properties are extracted and used as features for detecting intrusions utilizing two machine learning algorithms which are support vector machine (SVM) & k-nearest neighbors (KNN). The performance of the IDS was evaluated over three CAN bus attacks are denial of service (DoS), fuzzy & spoofing attacks on real vehicular CAN bus dataset. The experimental results showed that using graph-based features, an accuracy of 97.92% & 97.99% was achieved using SVM & KNN algorithms respectively, which is better than using traditional machine learning CAN bus features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 199.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alshammari, A., Zohdy, M., Debnath, D., Corser, G.: Classification approach for intrusion detection in vehicle systems. Wirel. Eng. Technol. 9, 79–94 (2018)

    Article  Google Scholar 

  2. Alves, M., Pereira, M., Ramos, H.: CAN protocol: a laboratory prototype for field bus applications (2009)

    Google Scholar 

  3. Avatefipour, O., et al.: An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7, 127580–127592 (2019)

    Article  Google Scholar 

  4. Avatefipour, O., Hafeez, A., Tayyab, M., Malik, H.: Linking received packet to the transmitter through physical-fingerprinting of controller area network (2017)

    Google Scholar 

  5. Barletta, V., Caivano, D., Nannavecchia, A., Scalera, M.: Intrusion detection for in-vehicle communication networks: an unsupervised Kohonen SOM approach. Future Internet 12, 119 (2020)

    Article  Google Scholar 

  6. Berg, J., Dickhaut, J., Mccabe, K.: Trust, reciprocity, and social history. Games Econ. Behav. 10, 122–142 (1995)

    Article  Google Scholar 

  7. Broster, I., Burns, A.: An analysable bus-guardian for event-triggered communication (2003)

    Google Scholar 

  8. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces (2011)

    Google Scholar 

  9. Ducoffe, G, Dragan, F.: A story of diameter, radius, and (almost) helly property. Networks (2020)

    Google Scholar 

  10. Eppstein, D.: Diameter and treewidth in minor-closed graph families. Algorithmica 27, 275–291 (2000)

    Article  MathSciNet  Google Scholar 

  11. Hafeez, A.: A robust, reliable and deployable framework for In-vehicle security (2020)

    Google Scholar 

  12. Hafeez, A., Malik, H., Avatefipour, O., Rongali, P., Zehra, S.: Comparative study of can-bus and flexray protocols for in-vehicle communication (2017)

    Google Scholar 

  13. Hafeez, A., Ponnapali, S., Malik, H.: Exploiting channel distortion for transmitter identification for in-vehicle network security. Sae Int. J. Transp. Cybersecurity Priv. 3 (2019)

    Google Scholar 

  14. Hafeez, A., Tayyab, M., Zolo, C., Awad, S.: Finger printing of engine control units by using frequency response for secure in-vehicle communication (2018)

    Google Scholar 

  15. Hafeez, A., Topolovec, K., Awad, S.: ECU fingerprinting through parametric signal modeling and artificial neural networks for in-vehicle security against spoofing attacks (2019)

    Google Scholar 

  16. Hafeez, A., Topolovec, K., Zolo, C., Sarwar, W.: State of the Art Survey on Comparison of CAN. FlexRay, LIN Protocol and Simulation of LIN Protocol (2020)

    Google Scholar 

  17. Hafeez, A., Rehman, K., Malik, H.: State of the Art Survey on Comparison of Physical Fingerprinting-Based Intrusion Detection Techniques for In-Vehicle Security (2020)

    Google Scholar 

  18. Hanselmann, M., Strauss, T., Dormann, K., Ulmer, H.: CANet: an unsupervised intrusion detection system for high dimensional CAN bus data. Ieee Access 8, 58194–58205 (2020)

    Article  Google Scholar 

  19. Hossain, M., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: LSTM-based intrusion detection system for in-vehicle can bus communications. IEEE Access 8, 185489–185502 (2020)

    Article  Google Scholar 

  20. Hpl, S.: Introduction to the controller area network (CAN). Appl. Rep. Sloa1011-17 (2002)

    Google Scholar 

  21. Islam, R., Refat, R., Yerram, S., Malik, H.: Graph-Based Intrusion Detection System for Controller Area Networks. IEEE Trans. Intell. Transp. Syst. (2020)

    Google Scholar 

  22. Jung, J., Park, K., Cha, J.-S.: Implementation of a network-based distributed system using the CAN protocol. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3681, pp. 1104–1110. Springer, Heidelberg (2005). https://doi.org/10.1007/11552413_157

    Chapter  Google Scholar 

  23. Kang, M., Kang, J.: Intrusion detection system using deep neural network for in-vehicle network security. Plos One 11, e0155781 (2016)

    Google Scholar 

  24. Kowalik, Ł: Approximation scheme for lowest outdegree orientation and graph density measures. In: Asano, T. (ed.) ISAAC 2006. LNCS, vol. 4288, pp. 557–566. Springer, Heidelberg (2006). https://doi.org/10.1007/11940128_56

    Chapter  MATH  Google Scholar 

  25. Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491–3508 (2017)

    Article  Google Scholar 

  26. Markovitz, M., Wool, A.: Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9, 43–52 (2017)

    Google Scholar 

  27. Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Car hacking identification through fuzzy logic algorithms (2017)

    Google Scholar 

  28. Minawi, O., Whelan, J., Almehmadi, A., El-khatib, K.: Machine learning-based intrusion detection system for controller area networks (2020)

    Google Scholar 

  29. Newman, M.: Random graphs with clustering. Phys. Rev. Lett. 103, 058701 (2009)

    Google Scholar 

  30. Noble, W.: What is a support vector machine? Nature Biotechnol. 24, 1565–1567 (2006)

    Article  Google Scholar 

  31. Noldus, R., Vanmieghem, P.: Assortativity in complex networks. J. Complex Netw. 3, 507–542 (2015)

    Article  MathSciNet  Google Scholar 

  32. Peterson, L.: K-nearest neighbor. Scholarpedia 4, 1883 (2009)

    Article  Google Scholar 

  33. Salo, F., Injadat, M., Nassif, A., Shami, A., Essex, A.: Data mining techniques in intrusion detection systems: a systematic literature review. IEEE Access 6, 56046–56058 (2018)

    Article  Google Scholar 

  34. Seo, E., Song, H., Kim, H.: Gids: Gan based intrusion detection system for in-vehicle network (2018)

    Google Scholar 

  35. Song, H., Woo, J., Kim, H.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)

    Google Scholar 

  36. Suthaharan, S.: Machine Learning Models and Algorithms for Big Data Classification. ISIS, vol. 36. Springer, Boston (2016). https://doi.org/10.1007/978-1-4899-7641-3

    Book  MATH  Google Scholar 

  37. Tayyab, M., Hafeez, A., Malik, H.: Spoofing attack on clock based intrusion detection system in controller area networks (2018)

    Google Scholar 

  38. Theissler, A.: Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection. Knowl.-Based Syst. 123, 163–173 (2017)

    Article  Google Scholar 

  39. Ueda, H., Kurachi, R., Takada, H., Mizutani, T., Inoue, M., Horihata, S.: Security authentication system for in-vehicle network. SEI Tech. Rev. 81, 5–9 (2015)

    Google Scholar 

  40. Wu, W., et al.: A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 21, 919–933 (2019)

    Article  Google Scholar 

  41. Yang, L., Moubayed, A., Hamieh, I., Shami, A.: Tree-based intelligent intrusion detection system in internet of vehicles (2019)

    Google Scholar 

  42. Charette, R.: This Car Runs on Code-IEEE Spectrum. IEEE Spectr. Technol. Engineering, And Science News https://spectrumieee.org/green-tech/advanced-cars/this-car-runs-on-code (2009)

  43. Lin, C.: Sangiovanni-vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol (2012)

    Google Scholar 

  44. Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inf. 9, 2034–2042 (2013)

    Article  Google Scholar 

  45. Dinatale, M., Zeng, H., Giusto, P., Ghosal, A.: Understanding and using the Controller Area Network Communication Protocol: Theory and Practice. Springer, New York (2012) https://doi.org/10.1007/978-1-4614-0314-2

Download references

Acknowledgment

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for supporting this work through the project # DRI-KSU-934. This research is also partly supported by National Science Foundation (NSF) under the award # 2035770.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rafi Ud Daula Refat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Refat, R.U.D., Elkhail, A.A., Hafeez, A., Malik, H. (2022). Detecting CAN Bus Intrusion by Applying Machine Learning Method to Graph Based Features. In: Arai, K. (eds) Intelligent Systems and Applications. IntelliSys 2021. Lecture Notes in Networks and Systems, vol 296. Springer, Cham. https://doi.org/10.1007/978-3-030-82199-9_49

Download citation

Publish with us

Policies and ethics