• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于深度自动编码器算法的自动驾驶车辆网络的网络攻击检测。

Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.

机构信息

College of Computer Science and Information Technology, King Faisal University, P.O. Box 4000, Al-Ahsa 7057, Saudia Arabia.

Deanship of E-Learning and Distance Education, King Faisal University Saudi Arabia, P.O. Box 4000, Al-Ahsa 7057, Saudi Arabia.

出版信息

Sensors (Basel). 2023 Apr 18;23(8):4086. doi: 10.3390/s23084086.

DOI:10.3390/s23084086
PMID:37112429
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10142967/
Abstract

Connected and autonomous vehicles (CAVs) present exciting opportunities for the improvement of both the mobility of people and the efficiency of transportation systems. The small computers in autonomous vehicles (CAVs) are referred to as electronic control units (ECUs) and are often perceived as being a component of a broader cyber-physical system. Subsystems of ECUs are often networked together via a variety of in-vehicle networks (IVNs) so that data may be exchanged, and the vehicle can operate more efficiently. The purpose of this work is to explore the use of machine learning and deep learning methods in defence against cyber threats to autonomous cars. Our primary emphasis is on identifying erroneous information implanted in the data buses of various automobiles. In order to categorise this type of erroneous data, the gradient boosting method is used, providing a productive illustration of machine learning. To examine the performance of the proposed model, two real datasets, namely the Car-Hacking and UNSE-NB15 datasets, were used. Real automated vehicle network datasets were used in the verification process of the proposed security solution. These datasets included spoofing, flooding and replay attacks, as well as benign packets. The categorical data were transformed into numerical form via pre-processing. Machine learning and deep learning algorithms, namely k-nearest neighbour (KNN) and decision trees, long short-term memory (LSTM), and deep autoencoders, were employed to detect CAN attacks. According to the findings of the experiments, using the decision tree and KNN algorithms as machine learning approaches resulted in accuracy levels of 98.80% and 99%, respectively. On the other hand, the use of LSTM and deep autoencoder algorithms as deep learning approaches resulted in accuracy levels of 96% and 99.98%, respectively. The maximum accuracy was achieved when using the decision tree and deep autoencoder algorithms. Statistical analysis methods were used to analyse the results of the classification algorithms, and the determination coefficient measurement for the deep autoencoder was found to reach a value of R = 95%. The performance of all of the models that were built in this way surpassed that of those already in use, with almost perfect levels of accuracy being achieved. The system developed is able to overcome security issues in IVNs.

摘要

联网和自动驾驶汽车 (CAV) 为提高人员的流动性和交通系统的效率带来了令人兴奋的机会。自动驾驶汽车 (CAV) 中的小型计算机称为电子控制单元 (ECU),通常被视为更广泛的网络物理系统的一个组成部分。ECU 的子系统通常通过各种车载网络 (IVN) 相互连接,以便交换数据,从而使车辆能够更高效地运行。这项工作的目的是探索使用机器学习和深度学习方法来防御自动驾驶汽车的网络威胁。我们的主要重点是识别植入各种汽车数据总线上的错误信息。为了对这种类型的错误数据进行分类,使用梯度提升方法,为机器学习提供了一个富有成效的例证。为了检验所提出模型的性能,使用了两个真实数据集,即 Car-Hacking 和 UNSE-NB15 数据集。在验证所提出的安全解决方案时,使用了真实的自动驾驶汽车网络数据集。这些数据集包括欺骗、泛洪和重播攻击以及良性数据包。通过预处理将分类数据转换为数值形式。使用机器学习和深度学习算法,即 k-最近邻 (KNN) 和决策树、长短时记忆 (LSTM) 和深度自动编码器,来检测 CAN 攻击。根据实验结果,使用决策树和 KNN 算法作为机器学习方法的准确率分别为 98.80%和 99%。另一方面,使用 LSTM 和深度自动编码器算法作为深度学习方法的准确率分别为 96%和 99.98%。使用决策树和深度自动编码器算法时达到了最高的准确率。使用统计分析方法对分类算法的结果进行了分析,发现深度自动编码器的确定系数测量值达到 R=95%。所有构建的模型的性能都超过了现有的模型,准确率几乎达到了完美的水平。所开发的系统能够克服 IVN 中的安全问题。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/dc661d03ffd4/sensors-23-04086-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/423c9d44f29c/sensors-23-04086-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/a79881b7748e/sensors-23-04086-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/5be7204d0834/sensors-23-04086-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/01d9024b9e69/sensors-23-04086-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/45ecd497cca1/sensors-23-04086-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/01461795f4c8/sensors-23-04086-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/3c3f14260b9a/sensors-23-04086-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/00ee009c5852/sensors-23-04086-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/1c1da0a6c30b/sensors-23-04086-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/26e8f4d29ae1/sensors-23-04086-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/211d21492c11/sensors-23-04086-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/d1b7e7cce2dd/sensors-23-04086-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/0c0a34145520/sensors-23-04086-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/9ac8cf451c69/sensors-23-04086-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/668d1b8c8fbf/sensors-23-04086-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/dc661d03ffd4/sensors-23-04086-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/423c9d44f29c/sensors-23-04086-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/a79881b7748e/sensors-23-04086-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/5be7204d0834/sensors-23-04086-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/01d9024b9e69/sensors-23-04086-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/45ecd497cca1/sensors-23-04086-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/01461795f4c8/sensors-23-04086-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/3c3f14260b9a/sensors-23-04086-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/00ee009c5852/sensors-23-04086-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/1c1da0a6c30b/sensors-23-04086-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/26e8f4d29ae1/sensors-23-04086-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/211d21492c11/sensors-23-04086-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/d1b7e7cce2dd/sensors-23-04086-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/0c0a34145520/sensors-23-04086-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/9ac8cf451c69/sensors-23-04086-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/668d1b8c8fbf/sensors-23-04086-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a5d2/10142967/dc661d03ffd4/sensors-23-04086-g016.jpg

相似文献

1
Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.基于深度自动编码器算法的自动驾驶车辆网络的网络攻击检测。
Sensors (Basel). 2023 Apr 18;23(8):4086. doi: 10.3390/s23084086.
2
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.自动驾驶汽车攻击:网络安全的深度学习算法。
Sensors (Basel). 2022 Jan 4;22(1):360. doi: 10.3390/s22010360.
3
Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.基于人工智能算法的经济可持续性否认攻击检测系统:云计算环境。
Sensors (Basel). 2022 Jun 21;22(13):4685. doi: 10.3390/s22134685.
4
Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study.基于机器学习的车载控制器局域网 (CAN) 总线入侵检测:性能比较研究。
Sensors (Basel). 2023 Mar 30;23(7):3610. doi: 10.3390/s23073610.
5
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.
6
Computational Intelligence Approaches in Developing Cyberattack Detection System.计算智能方法在开发网络攻击检测系统中的应用。
Comput Intell Neurosci. 2022 Mar 18;2022:4705325. doi: 10.1155/2022/4705325. eCollection 2022.
7
An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks.一种用于确保6G自动驾驶汽车网络中安全通信的智能动态信息物理系统威胁检测系统。
Sci Rep. 2024 Sep 5;14(1):20795. doi: 10.1038/s41598-024-70835-3.
8
A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection.深度学习在网络异常和网络攻击检测中的应用。
Sensors (Basel). 2020 Aug 15;20(16):4583. doi: 10.3390/s20164583.
9
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
10
Network intrusion detection using oversampling technique and machine learning algorithms.使用过采样技术和机器学习算法的网络入侵检测
PeerJ Comput Sci. 2022 Jan 7;8:e820. doi: 10.7717/peerj-cs.820. eCollection 2022.

引用本文的文献

1
QCAE-QOC-SVM: A hybrid quantum machine learning model for DoS and Fuzzy attack detection on autonomous vehicle CAN bus.QCAE-QOC-SVM:一种用于自动驾驶汽车CAN总线拒绝服务和模糊攻击检测的混合量子机器学习模型。
MethodsX. 2025 Jun 26;15:103471. doi: 10.1016/j.mex.2025.103471. eCollection 2025 Dec.
2
Ensemble and Gossip Learning-Based Framework for Intrusion Detection System in Vehicle-to-Everything Communication Environment.车联网通信环境下基于集成和八卦学习的入侵检测系统框架
Sensors (Basel). 2024 Oct 10;24(20):6528. doi: 10.3390/s24206528.
3
Emerging Sensor Communication Network-Based AI/ML Driven Intelligent IoT.

本文引用的文献

1
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
2
Space-efficient optical computing with an integrated chip diffractive neural network.具有集成芯片衍射神经网络的空间高效光计算。
Nat Commun. 2022 Feb 24;13(1):1044. doi: 10.1038/s41467-022-28702-0.
3
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.自动驾驶汽车攻击:网络安全的深度学习算法。
基于新兴传感器通信网络的人工智能/机器学习驱动的智能物联网
Sensors (Basel). 2023 Sep 12;23(18):7814. doi: 10.3390/s23187814.
4
Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study.基于长短期记忆神经网络的伪造网络攻击:一个实验案例研究
Sensors (Basel). 2023 Jul 28;23(15):6778. doi: 10.3390/s23156778.
Sensors (Basel). 2022 Jan 4;22(1):360. doi: 10.3390/s22010360.
4
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations.机器人网络安全:漏洞、攻击、对策及建议。
Int J Inf Secur. 2022;21(1):115-158. doi: 10.1007/s10207-021-00545-8. Epub 2021 Mar 19.
5
An optical neural chip for implementing complex-valued neural network.用于实现复值神经网络的光神经芯片。
Nat Commun. 2021 Jan 19;12(1):457. doi: 10.1038/s41467-020-20719-7.
6
A Review of Recurrent Neural Networks: LSTM Cells and Network Architectures.递归神经网络综述:长短期记忆细胞和网络架构。
Neural Comput. 2019 Jul;31(7):1235-1270. doi: 10.1162/neco_a_01199. Epub 2019 May 21.