skip to main content
10.1145/3416014.3424581acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Machine Learning-Based Intrusion Detection System for Controller Area Networks

Published: 16 November 2020 Publication History

Abstract

The automotive industry continues to innovate at an exponential rate to provide a safer and more efficient experience for consumers. Autonomous vehicles and Vehicle-to-Everything technologies are at the forefront of defining the future of transportation. Enabling vehicles to connect to various services has exposed critical in-vehicle networks such as the Controller Area Network (CAN) to potential exploitation by adversaries. In its standard form, the CAN bus suffers from multiple vulnerabilities such as limited bandwidth and lack of authentication. Attacks can be initiated through physical and wireless mediums, exploiting diagnostic interfaces, Bluetooth and infotainment systems to compromise the confidentiality, integrity and availability of data communication within vehicles. In this paper, a holistic, comprehensive, Machine Learning-Based intrusion detection system for the CAN bus is proposed to secure the critical in-vehicle network. The proposed system is modular, scalable and can be adapted to the ever-changing threat landscape of cyber vehicle attacks. On an unseen testing dataset, our system achieved 100% accuracy in protecting against denial of service and multiple impersonation injection attacks, as well as 95.67% accuracy of fuzzy injection attacks.

References

[1]
National Highway Traffic Safety Administration. 2020. Automated Vehicles for Safety. https://www.nhtsa.gov/technology-innovation/automated-vehicles-safety
[2]
Henry Claypool, Amitai Bin-Nun, and Gerlach Jeffrey. 2017. Self-Driving Cars: The Impact on People with Disabilities. Ruderman Family Foundation White Papers (01 2017).
[3]
Daniel Da Silva, Tracy Ann Kosa, Steve Marsh, and Khalil El-Khatib. 2012. Examining privacy in vehicular ad-hoc networks. In Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications. 105--110.
[4]
CSS Electronics. 2020. CAN Bus Explained - A Simple Intro (2020). https://www.csselectronics.com/screen/page/simple-intro-to-can-bus/language/en
[5]
E Frank, MA Hall, and IH Witten. [n.d.]. The WEKA Workbench. Online Appendix for" Data Mining: Practical Machine Learning Tools and Techniques", 2016.
[6]
Andy Greenberg. 2015. Hackers Remotely Kill a Jeep on the Highway?With Me in It. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
[7]
Bogdan Groza and Pal-Stefan Murvay. 2018. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Vehicular Technology Magazine, Vol. PP (01 2018), 1--1. https://doi.org/10.1109/MVT.2017.2736344
[8]
Joshua Harrington, Jesse Lacroix, Khalil El-Khatib, Felipe Leite Lobo, and Horácio ABF Oliveira. 2017. Proactive Certificate Distribution for PKI in VANET. In Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks. 9--13.
[9]
S Hartzell and C Stubel. 2017. Automobile CAN bus network security and vulnerabilities.
[10]
Kushal Jaisingh, Khalil El-Khatib, and Rajen Akalu. 2016. Paving the way for Intelligent Transport Systems (ITS) Privacy Implications of Vehicle Infotainment and Telematics Systems. In Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications. 25--31.
[11]
Mohammad Kawser, Syed Sajjad, Saymon Fahad, Sakib Ahmed, and Hasib Rafi. 2019. The Perspective of Vehicle-to-Everything (V2X) Communication towards 5G., Vol. 19 (04 2019), 146--155.
[12]
Jesse Lacroix and Khalil El-Khatib. 2014. Vehicular ad hoc network security and privacy: A second look. In VEHICULAR 2014. 14.
[13]
Jesse Lacroix, Khalil El-Khatib, and Rajen Akalu. 2016. Vehicular digital forensics: What does my vehicle know about me?. In Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications. 59--66.
[14]
Hyunsung Lee, Seong Hoon Jeong, and Huy Kang Kim. 2017a. OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame. In 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, 57--5709.
[15]
H. Lee, S. H. Jeong, and H. K. Kim. 2017b. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. In 2017 15th Annual Conference on Privacy, Security and Trust (PST), Vol. 00. 57--5709. https://doi.org/10.1109/PST.2017.00017
[16]
Siti-Farhana Lokman, Abu Talib Othman, and Muhammad-Husaini Abu-Bakar. 2019. Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review. EURASIP Journal on Wireless Communications and Networking, Vol. 2019, 1 (2019), 184.
[17]
Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, Vol. 2015 (2015), 91.
[18]
Joelma Peixoto, Safwan Alam, Josh Harrington, Akramul Azim, Khalil El-Khatib, and Jeremy S. Bradbury. [n.d.]. Cybersecurity for Connected Autonomous Vehicles (CAVs). ( [n.,d.]). Unpublished.
[19]
Fadi Salo, Mohammadnoor Injadat, Ali Bou Nassif, Abdallah Shami, and Aleksander Essex. 2018. Data mining techniques in intrusion detection systems: A systematic literature review. IEEE Access, Vol. 6 (2018), 56046--56058.
[20]
Eunbi Seo, Hyun Min Song, and Huy Kang Kim. 2018. GIDS: GAN based intrusion detection system for in-vehicle network. In 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 1--6.
[21]
Hyun Min Song, Ha Rang Kim, and Huy Kang Kim. 2016. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In 2016 international conference on information networking (ICOIN). IEEE, 63--68.
[22]
Hiroshi Ueda, Ryo Kurachi, Hiroaki Takada, Tomohiro Mizutani, Masayuki Inoue, and Satoshi Horihata. 2015. Security authentication system for in-vehicle network. SEI technical review, Vol. 81 (2015), 5--9.
[23]
Li Yang, Abdallah Moubayed, Ismail Hamieh, and Abdallah Shami. 2019. Tree-based Intelligent Intrusion Detection System in Internet of Vehicles. arXiv preprint arXiv:1910.08635 (2019).
[24]
K. Yardy, A. Almehmadi, and K. El-Khatib. 2019. Detecting Malicious Driving with Machine Learning. In 2019 IEEE Wireless Communications and Networking Conference (WCNC). 1--6.
[25]
Maram Bani Younes and Azzedine Boukerche. 2018. An efficient dynamic traffic light scheduling algorithm considering emergency vehicles for intelligent transportation systems. Wireless Networks, Vol. 24, 7 (2018), 2451--2463.
[26]
Maram Bani Younes, Azzedine Boukerche, and Abdelhamid Mammeri. 2016. Context-aware traffic light self-scheduling algorithm for intelligent transportation systems. In 2016 IEEE Wireless Communications and Networking Conference. IEEE, 1--6.
[27]
Clinton Young, Habeeb Olufowobi, Gedare Bloom, and Joseph Zambreno. 2019. Automotive intrusion detection based on constant can message frequencies across vehicle driving modes. In Proceedings of the ACM Workshop on Automotive Cybersecurity. 9--14.

Cited By

View all
  • (2024)A Novel Light-Weight Machine Learning Classifier for Intrusion Detection in Controller Area Network in Smart CarsSmart Cities10.3390/smartcities70601277:6(3289-3314)Online publication date: 2-Nov-2024
  • (2024)Intrusion detection system for controller area networkCybersecurity10.1186/s42400-023-00195-47:1Online publication date: 2-Feb-2024
  • (2024)In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware FeaturesIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.332362225:5(3843-3853)Online publication date: May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DIVANet '20: Proceedings of the 10th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications
November 2020
76 pages
ISBN:9781450381215
DOI:10.1145/3416014
  • General Chair:
  • Mirela Notare,
  • Program Chair:
  • Peng Sun
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 November 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. can bus
  2. intrusion detection
  3. machine learning
  4. security
  5. vanet

Qualifiers

  • Research-article

Conference

MSWiM '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 70 of 308 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)102
  • Downloads (Last 6 weeks)12
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Novel Light-Weight Machine Learning Classifier for Intrusion Detection in Controller Area Network in Smart CarsSmart Cities10.3390/smartcities70601277:6(3289-3314)Online publication date: 2-Nov-2024
  • (2024)Intrusion detection system for controller area networkCybersecurity10.1186/s42400-023-00195-47:1Online publication date: 2-Feb-2024
  • (2024)In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware FeaturesIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.332362225:5(3843-3853)Online publication date: May-2024
  • (2024)Work-in-Progress: CANGen: Practical Synthetic CAN Traces Generation Using Deep Generative Models2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00050(1-9)Online publication date: 8-Jul-2024
  • (2024)RETRACTED ARTICLE: An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networksScientific Reports10.1038/s41598-024-70835-314:1Online publication date: 5-Sep-2024
  • (2023)Reinforcement Learning as a Path to Autonomous Intelligent Cyber-Defense Agents in Vehicle PlatformsApplied Sciences10.3390/app13211162113:21(11621)Online publication date: 24-Oct-2023
  • (2023)Security strategy for autonomous vehicle cyber-physical systems using transfer learningJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00564-x12:1Online publication date: 20-Dec-2023
  • (2023)Trust-based Knowledge Sharing Among Federated Learning Servers in Vehicular Edge ComputingProceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications10.1145/3616392.3624701(9-15)Online publication date: 30-Oct-2023
  • (2023)AI-Based Intrusion Detection Systems for In-Vehicle Networks: A SurveyACM Computing Surveys10.1145/357095455:11(1-40)Online publication date: 9-Feb-2023
  • (2023)Design and Test of Hardware-in-the-Loop Platform for Vehicle Chassis CAN System with Intermittent Open and Short Connection Faults2023 29th International Conference on Mechatronics and Machine Vision in Practice (M2VIP)10.1109/M2VIP58386.2023.10413404(1-6)Online publication date: 21-Nov-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media