Skip to main content
Log in

Intrusion detection system using SOEKS and deep learning for in-vehicle security

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the continuous development of the intelligent vehicle, vehicle security events occur frequently, therefore, the vehicle information security is particularly important. In this paper, the in-vehicle security measures are analyzed, especially the current situation of in-vehicle intrusion detection system, which are mainly aimed at specific vehicles and are not enough to meet the need of vehicle security. Then, a new in-vehicle intrusion detection mechanism is proposed based on deep learning and the set of experience knowledge structure (SOEKS), which is a knowledge representation structure. Utilizing SOEKS and information entropy to increase the versatility of intrusion detection for different vehicle. In practice, the more precise model for specific vehicle can formed by training a large amount of specific vehicle data through deep learning. It is demonstrated with experimental results that the proposed approach is able to have 98% accuracy and detect a wide range of in-vehicle attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Koscher, K., Czeskis, A., Roesner, F., et al.: Experimental security analysis of a modern automobile. IEEE J. Sel. Top. Quantum Electron. 41(3), 447–462 (2010)

    Google Scholar 

  2. Xiao-gang, L., Bin, Y.: Analysis on security defense problem of internet of vehicles. Mob. Commun. 39(11), 30–33 (2015)

    Google Scholar 

  3. Cho, A., Jo, H.J., Woo, S., et al.: Message authentication and key distribution mechanism secure against CAN bus attack. J. Korea Inst. Inf. Secur. Cryptol. 22(5), 1057–1068 (2012)

    Google Scholar 

  4. Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inf. 9(4), 2034–2042 (2013)

    Article  Google Scholar 

  5. Woo, S., Jo, H.J., Dong, H.L.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2015)

    Google Scholar 

  6. Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car. Intell. Veh. Symp. 30(1), 528–533 (2011)

    Google Scholar 

  7. Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016)

    Article  Google Scholar 

  8. Sanin, C.: Applying decisional DNA to Internet of things: the concept and initial case study. Cybern. Syst. 46(1–2), 84–93 (2015)

    Google Scholar 

  9. Sanin, C., Toro, C., Haoxi, Z., et al.: Decisional DNA: a multi-technology shareable knowledge structure for decisional experience. Neurocomputing 88(7), 42–53 (2012)

    Article  Google Scholar 

  10. Zhang, H., Saní, C.N., et al.: Implementing fuzzy logic to generate user profile in decisional dna television: the concept and initial case study. Cybern. Syst. 44(2–3), 275–283 (2013)

    Article  Google Scholar 

  11. Längkvist, M., Karlsson, L., Loutfi, A.: A review of unsupervised feature learning and deep learning for time-series modeling. Pattern Recogn. Lett. 42(1), 11–24 (2014)

    Article  Google Scholar 

  12. Lopes, N., Ribeiro, B.: Towards adaptive learning with improved convergence of deep belief networks on graphics processing units. Pattern Recogn. 47(1), 114–127 (2014)

    Article  Google Scholar 

  13. Zhou, L., Pan, S., Wang, J., et al.: Machine learning on big data: opportunities and challenges. Neurocomputing 237, 350–361 (2017)

    Article  Google Scholar 

  14. Shang, C., Yang, F., Huang, D., et al.: Data-driven soft sensor development based on deep learning technique. J. Process Control 24(3), 223–233 (2014)

    Article  Google Scholar 

  15. Davis, R.I., Burns, A., Bril, R.J., et al.: Controller area network (CAN) schedulability analysis: refuted, revisited and revised. Real-Time Syst. 35(3), 239–272 (2007)

    Article  Google Scholar 

  16. Shreejith, S., Fahmy, S.A., Lukasiewycz, M.: Reconfigurable computing in next-generation automotive networks. IEEE Embed. Syst. Lett. 5(1), 12–15 (2013)

    Article  Google Scholar 

  17. Ruth, R., Bartlett, W., Daily, J.: Accuracy of event data in the 2010 and 2011 Toyota camry during steady state and braking conditions. SAE Int. J. Passeng. Cars Electron. Electr. Syst. 5(1), 358–372 (2012)

    Article  Google Scholar 

  18. Natale, M.D., Zeng, H., Giusto, P., et al.: Understanding and using the controller area network communication protocol. Theory Pract. 26(4), 37–40 (2012)

    Google Scholar 

  19. Tobias, H., Kiltz, S., Dittmann, J.: Applying intrusion detection to automotive IT-early insights and remaining challenges. J. Inf. Assur. Secur. (JIAS) 4, 226–235 (2009)

    Google Scholar 

  20. Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks—practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1), 11–25 (2011)

    Article  Google Scholar 

  21. Yin, C.L., Zhu, Y.F., Fei, J.L., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  22. Wang, S.Z., Li, Y.Z.: Intrusion detection algorithm based on deep learning and semi-supervised learning. Inf. Technol. 1, 101–104,108 (2017)

  23. Mohammadi, S., Namadchian, A.: A new deep learning approach for anomaly base IDS using memetic classifier. Int. J. Comput. Commun. Control 12(5), 677–688 (2017)

    Article  Google Scholar 

  24. Li, B.M., Xie, S.Q., Xu, X.: Recent development of knowledge-based systems, methods and tools for one-of-a-kind production. Knowl.-Based Syst. 24(7), 1108–1119 (2011)

    Article  Google Scholar 

  25. Zhang, H., Li, F., Wang, J., et al.: Adding intelligence to cars using the neural knowledge DNA. Cybern. Syst. 48(3), 267–273 (2017)

    Article  Google Scholar 

  26. Zhang, H., Sanin, C., Szczerbicki, E.: Towards neural knowledge DNA. J. Intell. Fuzzy Syst. 32(2), 1575–1584 (2017)

    Article  Google Scholar 

  27. Bereziński, P., Jasiul, B., Szpyrka, M.: An entropy-based network anomaly detection method. Entropy 17(4), 2367–2408 (2015)

    Article  Google Scholar 

  28. He, Yu., Gui-he, Q., et al.: Cyber security and anomaly detection method for in-vehicle CAN. J. Jilin Univ. 46(4), 1246–1253 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fei Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, L., Li, F., Xu, X. et al. Intrusion detection system using SOEKS and deep learning for in-vehicle security. Cluster Comput 22 (Suppl 6), 14721–14729 (2019). https://doi.org/10.1007/s10586-018-2385-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2385-7

Keywords

Navigation