Skip to main content

On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks

  • Conference paper
  • First Online:
  • 860 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13009))

Abstract

Because connected cars typically have several communication capabilities (through 5G, WiFi, and Bluetooth), and third-party applications can be installed on the cars, it would be essential to deploy intrusion detection systems (IDS) to prevent attacks from external attackers or malicious applications. Therefore, many IDS proposals have been presented to protect the controller area network (CAN) in a vehicle. Some studies showed that deep neural network models could be effectively used to detect various attacks on the CAN bus. However, it is still questionable whether such an IDS is sufficiently robust against adversarial attacks that are crafted aiming to target the IDS. In this paper, we present a genetic algorithm to generate adversarial CAN attack messages for Denial-of-Service (DoS), fuzzy, and spoofing attacks to target the state-of-the-art deep learning-based IDS for CAN. The experimental results demonstrate that the state-of-the-art IDS is not effective in detecting the generated adversarial CAN attack messages. The detection rates of the IDS were significantly decreased from 99.27%, 96.40%, and 99.63% to 2.24%, 11.59%, and 0.01% for DoS, fuzzy, and spoofing attacks, respectively.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the USENIX Conference on Security. USENIX Association (2011)

    Google Scholar 

  2. Everett, C.E., McCoy, D.: OCTANE (open car testbed and network experiments): bringing cyber-physical security research to researchers and students. In: Workshop on Cyber Security Experimentation and Test (CSET). USENIX Association (2013)

    Google Scholar 

  3. Farsi, M., Ratcliff, K., Barbosa, M.: An overview of controller area network. Comput. Control Eng. J. 10(3), 113–120 (1999)

    Article  Google Scholar 

  4. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)

  5. Ibitoye, O., Abou-Khamis, R., Matrawy, A., Shafiq, M.O.: The threat of adversarial attacks on machine learning in network security-a survey. arXiv preprint arXiv:1911.02621 (2019)

  6. Kalutarage, H.K., Al-Kadri, M.O., Cheah, M., Madzudzo, G.: Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus. In: Proceedings of the ACM Computer Science in Cars Symposium (2019)

    Google Scholar 

  7. Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS one 11(6), e0155781 (2016)

    Google Scholar 

  8. Kemmerer, R., Vigna, G.: Intrusion detection: a brief history and overview. Computer 35(4), 27–30 (2002)

    Google Scholar 

  9. Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)

  10. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle (2015)

    Google Scholar 

  11. Park, T.J., Han, C.S., Lee, S.H.: Development of the electronic control unit for the rack-actuating steer-by-wire using the hardware-in-the-loop simulation system. Mechatronics 15(8), 899–918 (2005)

    Article  Google Scholar 

  12. Seo, E., Song, H.M., Kim, H.K.: GIDS: Gan based intrusion detection system for in-vehicle network. In: Annual Conference on Privacy, Security and Trust (PST) (2018)

    Google Scholar 

  13. Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)

    Google Scholar 

  14. Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23(5), 828–841 (2019)

    Article  Google Scholar 

  15. Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.A.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: AAAI conference on artificial intelligence (2017)

    Google Scholar 

  16. Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)

  17. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: Proceedings of the IEEE International Conference on Data Science and Advanced Analytics (DSAA) (2016)

    Google Scholar 

  18. Yu, F., Li, D.F., Crolla, D.: Integrated vehicle dynamics control—state-of-the art review. In: Proceedings of the Vehicle Power and Propulsion Conference. IEEE (2008)

    Google Scholar 

Download references

Acknowledgement

This research was supported by the IITP grant (IITP-2019-0-01343), the High-Potential Individuals Global Training Program (2020-0-01550), and the National Research Foundation of Korea (NRF) grant (No. 2019R1C1C1007118) funded by the Korea government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyoungshick Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Choi, J., Kim, H. (2021). On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https://doi.org/10.1007/978-3-030-89432-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-89432-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-89431-3

  • Online ISBN: 978-3-030-89432-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics