Skip to main content

Intelligent Vehicle Knowledge Representation and Anomaly Detection Using Neural Knowledge DNA

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 879))

Included in the following conference series:

  • 482 Accesses

Abstract

The anomaly detection and its knowledge expression of the intelligent vehicle are studied. includes Detection rules are divided into simple rules based on features or statistical characteristics and complex sequence rules based on neural networks. The former can effectively detect the specific CAN command and flooding, replay attacks, the latter uses neural networks to learn the characteristics of CAN commands, which can effectively detect the complex attacks. The simple detection rules are standardized by SOEKS knowledge expression and the complex detection rules storage in Neural Knowledge DNA framework. With this unified knowledge expression, the detection rules can be shared and inherited easily. A secure gateway for intelligent vehicle is also designed. The gateway is placed between the external network and the vehicle bus network and it prevent all suspicious external data. The simulations of real car data prove the feasibility of the methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kusuma, A., Liu, R., Choudhury, C., Montgomery, F.: Analysis of the driving behaviour at weaving section using multiple traffic surveillance data. Transp. Res. Procedia 3, 51–59 (2014)

    Article  Google Scholar 

  2. Li, L., You, S., Yang, C., Yan, B., Song, J., Chen, Z.: Driving-behavior-aware stochastic model predictive control for plug-in hybrid electric buses. Appl. Energy 162(1), 868–879 (2016)

    Article  Google Scholar 

  3. Enev, M., Takakuwa, A., Koscher, K., Kohno, T.: Automobile driver fingerprinting. Proc. Priv. Enhancing Technol. 2016(1), 34–50 (2016)

    Article  Google Scholar 

  4. Abut, H., et al.: Data collection with “uyanik”: too much pain; but gains are coming (2007). https://www.researchgate.net/publication/237728452. Accessed 30 May 2014

  5. Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54(4), 1115–1126 (2015)

    Article  Google Scholar 

  6. Bariah, L., Shehada, D., Salahat, E., et al.: Recent advances in VANET security: a survey. In: Vehicular Technology Conference, pp. 1–7. IEEE Computer Society, Washington, DC (2016)

    Google Scholar 

  7. Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for VANET. Int. J. Netw. Secur. Appl. 5(5), 95–105 (2013)

    Google Scholar 

  8. Sari, A., Onursal, O., Akkaya, M.: Review of the security issues in vehicular ad hoc networks (VANET). Int. J. Commun. Netw. Syst. Sci. 8(13), 552–566 (2015)

    Google Scholar 

  9. Thing, V.L.L., Wu, J.: Autonomous vehicle security: a taxonomy of attacks and defences. In: 2016 IEEE International Conference on Internet of Things, pp. 164–170. IEEE Computer Society, Washington, DC (2017)

    Google Scholar 

  10. Schweppe, H., Roudier, Y.: Security and privacy for in-vehicle networks. In: International Workshop on Vehicular Communications, Sensing, and Computing. pp. 12–17. IEEE Computer Society, Washington, DC (2012)

    Google Scholar 

  11. Oguma, H., Yoshioka, A., Nishikawa, M., et al.: New attestation based security architecture for in-vehicle communication. In: Global Telecommunications Conference, pp. 1–6. IEEE Computer Society, Washington, DC (2008)

    Google Scholar 

  12. Woo, S., Jo, H.J., Kim, I.S., et al.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 17(8), 2248–2261 (2016)

    Article  Google Scholar 

  13. Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of the 25th USENIX Security Symposium, pp. 911–927. USENIX Association, Berkeley (2016)

    Google Scholar 

  14. Jaynes, M., Dantu, R., Varriale, R., et al.: Automating ECU identification for vehicle security. In: IEEE International Conference on Machine Learning and Applications, pp. 632–635. IEEE Computer Society, Washington, DC (2017)

    Google Scholar 

  15. Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS One 1(6), e0155781 (2016)

    Article  Google Scholar 

  16. Kang, M.J., Kang, J.W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: Vehicular Technology Conference. pp. 1–5, IEEE Computer Society, Washington, DC (2016)

    Google Scholar 

  17. Zhang, H., Li, F., Wang, J., et al.: Adding intelligence to cars using the neural knowledge DNA. Cybern. Syst. 48(3), 267–273 (2017)

    Article  Google Scholar 

  18. Sanín, C., Szczerbicki, E.: Using set of experience in the process of transforming information into knowledge. Int. J. Enterp. Inf. Syst. 2(2), 45–62 (2006)

    Article  Google Scholar 

  19. Sanín, C., Szczerbicki, E.: Towards the construction of decisional DNA: a set of experience knowledge structure java class within an ontology system. Cybern. Syst. 38, 859–878 (2007)

    Article  Google Scholar 

  20. Zhang, H., Li, F., Wang, J., et al.: Experience-oriented intelligence for Internet of Things. Cybern. Syst. 3, 162–181 (2017)

    Article  Google Scholar 

  21. Valasek, C., Miller, C.: Adventures in automotive networks and control units. Technical White Paper, 99 (2013). http://www.ioactive.com/pdfs/IOActive_Adventures_in_Automotive_Networks_and_Control_Units.pdf

Download references

Funding

This work was supported by Department of Science and Technology of Sichuan Province under No. 2018ZR0067 and 2018ZR0220.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, J., Zhang, H., Li, F., Wang, Z., Zhao, J. (2018). Intelligent Vehicle Knowledge Representation and Anomaly Detection Using Neural Knowledge DNA. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3095-7_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3094-0

  • Online ISBN: 978-981-13-3095-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics