Skip to main content

Anomaly Detection System of Controller Area Network (CAN) Bus Based on Time Series Prediction

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13202))

Included in the following conference series:

Abstract

With the development of intelligent networked vehicles, the research on the safety of in-vehicle networks has gradually become a hot spot. CAN (controller area network) is the most widely used in-vehicle network bus, and its safety problem has become the most critical problem to be solved in the development process of intelligent networked vehicles. This paper aims at the in-vehicle can be used in intelligent networked vehicles Bus network, its communication characteristics and security problems are analyzed and dissected. Meanwhile, with the increase in demand for in-vehicle network communication applications, the corresponding attacks have also increased year by year. Therefore, this paper only increases the anomaly detection of in-vehicle application log in the anomaly detection of CAN bus, aiming to detect the abnormal behavior of vehicles in an all-around way. To solve the field data lacking's problem, we collect a data set containing several types of data from multiple channels, including different types of attack can bus messages. Due to the different elements in the message having different effects on the classification results, the attention mechanism is introduced to give different weights to different messages and log data segments, which increases the effect of classification detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gao, Y., Iqbal, S., et al.: Performance and power analysis of high-density multi-GPGPU architectures: a preliminary case study. In: IEEE 17th HPCC (2015)

    Google Scholar 

  2. Zhao, H., Chen, M., et al.: A novel pre-cache schema for high performance android system. Futur. Gener. Comput. Syst. 56, 766–772 (2016)

    Article  Google Scholar 

  3. Qiu, M., Xue, C., Shao, Z., Sha, E.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE Conference, pp. 1–6 (2007)

    Google Scholar 

  4. Qiu, L., Gai, K., Qiu, M.: Optimal big data sharing approach for tele-health in cloud computing. In: IEEE SmartCloud, pp. 184–189 (2016)

    Google Scholar 

  5. Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) Smart Blockchain, vol. 11373, pp. 159–166. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05764-0_17

    Chapter  Google Scholar 

  6. Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59–67 (2020)

    Article  Google Scholar 

  7. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)

    Google Scholar 

  8. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA, vol. 2015 (2015)

    Google Scholar 

  9. Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2015)

    Google Scholar 

  10. Szilagyi, C., Koopman, P.: Low cost multicast authentication via validity voting in time-triggered embedded control networks. In: Proceedings of 5th Workshop on Embedded Systems Security, p. 10. ACM (2010)

    Google Scholar 

  11. Lin, C.-W., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. In: Proceedings International Conference on Cyber Security. IEEE (2012)

    Google Scholar 

  12. Groza, B., Murvay, S.: Efficient protocols for secure broad cast in controller area networks. IEEE Trans. Ind. Inform. 9(4), 2034–2042 (2013)

    Article  Google Scholar 

  13. Jaynes, M., Dantu, R., Varriale, R., Evans, N.: Automating ecu identifification for vehicle security. In: 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 632–635 (2016)

    Google Scholar 

  14. Moore, M.R., Bridges, R.A., Combs, F.L., Starr, M.S., Prowell, S.J.: Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. In: ACM Proceedings of CISRC, p. 11 (2017)

    Google Scholar 

  15. Moore, M.R., Bridges, R.A., Combs, F.L., Ander son, A.L.: Data-driven extraction of vehicle states from CAN bus traffific for cyber protection and safety. Consumer Electronics Magazine (to appear). https://goo.gl/8LUvNH

  16. Miller, C., Valasek, C.: Adventures in automotive networks and control units. Def Con 21, 260–264 (2013)

    Google Scholar 

  17. Cho, K.-T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1044–1055. ACM (2016)

    Google Scholar 

  18. Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. IEEE GLOBECOM Conference, pp. 1–5 (2008)

    Google Scholar 

  19. Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)

    Google Scholar 

  20. Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) Smart Computing and Communication, pp. 236–247. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52015-5_24

    Chapter  Google Scholar 

  21. Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)

    Google Scholar 

  22. Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks – practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) Computer Safety, Reliability, and Security, pp. 235–248. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87698-4_21

    Chapter  Google Scholar 

  23. Hoppe, T., Kiltz, S., Dittmann, J.: Applying intrusion detection to automotive it-early in sights and remaining challenges. J. Inf. Assur. Secur. (JIAS) 4(6), 226–235 (2009)

    Google Scholar 

  24. Gmiden, M., Gmiden, M.H., Trabelsi, H.: An intrusion detection method for securing in-vehicle CAN bus. In: Proceedings of Sciences and Techniques of Automatic Control and Computer Engineering. IEEE (2016)

    Google Scholar 

  25. Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network. In: 2016 International Conference on Information Networking (ICOIN), pp. 63–68. IEEE (2016)

    Google Scholar 

  26. Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: USENIX Security Symposium, pp. 911–927 (2016)

    Google Scholar 

  27. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: Proceedings of Sciences and Techniques of Automatic Control and Computer Engineering. IEEE (2016)

    Google Scholar 

  28. Dupont, G., Hartog, J.D., Etalle, S., Lekidis, A.: Evaluation framework for network intrusion detection systems for in-vehicle CAN

    Google Scholar 

Download references

Acknowledgements

This work was supported by the 2020 Industrial Internet Innovation and Development Project-the Key Project of Intelligent Connected Vehicle Safety Inspection Platform (Tender No. TC200H01S), and the Beijing Advanced Innovation Center for Big Data and Brain Computing, and supported by Project of Comprehensive Protection Platform for Industrial Enterprise Network Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tan, X., Zhang, C., Li, B., Ge, B., Liu, C. (2022). Anomaly Detection System of Controller Area Network (CAN) Bus Based on Time Series Prediction. In: Qiu, M., Gai, K., Qiu, H. (eds) Smart Computing and Communication. SmartCom 2021. Lecture Notes in Computer Science, vol 13202. Springer, Cham. https://doi.org/10.1007/978-3-030-97774-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-97774-0_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-97773-3

  • Online ISBN: 978-3-030-97774-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics