Loading [MathJax]/extensions/MathMenu.js
Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique | IEEE Journals & Magazine | IEEE Xplore

Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique


Abstract:

With the rapid development of Internet of vehicles, connected vehicles, autonomous vehicles, and autonomous driving technologies, automotive Controller Area Networks (CAN...Show More

Abstract:

With the rapid development of Internet of vehicles, connected vehicles, autonomous vehicles, and autonomous driving technologies, automotive Controller Area Networks (CAN) have suffered from numerous security threats. Deep learning models are the current mainstream intrusion detection techniques for threat analysis, and the state-of-the-art intrusion detection technique introduces the Generative Adversarial Networks (GAN) model to generate usable attacked samples to supplement the training samples, but it exists the limitations of rough CAN message block construction and fails to detect the data tampering threat. Based on the CAN communication matrix defined by the automotive Original Equipment Manufacturer (OEM) for a vehicle model, we propose an enhanced deep learning GAN model with elaborate CAN message blocks and the enhanced GAN discriminator. The elaborate CAN message blocks in the training samples can precisely reflect the real generated CAN message blocks in the detection phase. The GAN discriminator can detect whether each message has suffered from the data tampering threat. Experimental results illustrate that the enhanced deep learning GAN model has higher detection accuracy, recall, and F1 scores than the state-of-the-art deep learning GAN model under various attacks and threats.
Published in: IEEE Transactions on Intelligent Transportation Systems ( Volume: 22, Issue: 7, July 2021)
Page(s): 4467 - 4477
Date of Publication: 10 February 2021

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.