• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种利用交叉检查过滤器的车载网络入侵检测系统的新型架构。

A Novel Architecture for an Intrusion Detection System Utilizing Cross-Check Filters for In-Vehicle Networks.

作者信息

Im Hyungchul, Lee Donghyeon, Lee Seongsoo

机构信息

Department of Intelligent Semiconductors, Soongsil University, Seoul 06978, Republic of Korea.

出版信息

Sensors (Basel). 2024 Apr 28;24(9):2807. doi: 10.3390/s24092807.

DOI:10.3390/s24092807
PMID:38732913
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11086323/
Abstract

The Controller Area Network (CAN), widely used for vehicular communication, is vulnerable to multiple types of cyber-threats. Attackers can inject malicious messages into the CAN bus through various channels, including wireless methods, entertainment systems, and on-board diagnostic ports. Therefore, it is crucial to develop a reliable intrusion detection system (IDS) capable of effectively distinguishing between legitimate and malicious CAN messages. In this paper, we propose a novel IDS architecture aimed at enhancing the cybersecurity of CAN bus systems in vehicles. Various machine learning (ML) models have been widely used to address similar problems; however, although existing ML-based IDS are computationally efficient, they suffer from suboptimal detection performance. To mitigate this shortcoming, our architecture incorporates specially designed rule-based filters that cross-check outputs from the traditional ML-based IDS. These filters scrutinize message ID and payload data to precisely capture the unique characteristics of three distinct types of cyberattacks: DoS attacks, spoofing attacks, and fuzzy attacks. Experimental evidence demonstrates that the proposed architecture leads to a significant improvement in detection performance across all utilized ML models. Specifically, all ML-based IDS achieved an accuracy exceeding 99% for every type of attack. This achievement highlights the robustness and effectiveness of our proposed solution in detecting potential threats.

摘要

控制器局域网(CAN)广泛应用于车辆通信,容易受到多种网络威胁。攻击者可以通过各种渠道,包括无线方式、娱乐系统和车载诊断端口,向CAN总线注入恶意消息。因此,开发一种能够有效区分合法和恶意CAN消息的可靠入侵检测系统(IDS)至关重要。在本文中,我们提出了一种新颖的IDS架构,旨在增强车辆CAN总线系统的网络安全性。各种机器学习(ML)模型已被广泛用于解决类似问题;然而,尽管现有的基于ML的IDS计算效率高,但它们的检测性能欠佳。为了缓解这一缺点,我们的架构纳入了专门设计的基于规则的过滤器,对传统基于ML的IDS的输出进行交叉检查。这些过滤器仔细检查消息ID和有效载荷数据,以精确捕捉三种不同类型网络攻击的独特特征:拒绝服务(DoS)攻击、欺骗攻击和模糊攻击。实验证据表明,所提出的架构使所有使用的ML模型的检测性能都有显著提高。具体而言,所有基于ML的IDS对每种类型的攻击都实现了超过99%的准确率。这一成果突出了我们提出的解决方案在检测潜在威胁方面的稳健性和有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/9a561b7638d1/sensors-24-02807-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/c7b5feafa954/sensors-24-02807-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/1da888c7c72b/sensors-24-02807-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/26c467269999/sensors-24-02807-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/630efaf1b2fe/sensors-24-02807-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/2740e6f86c72/sensors-24-02807-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/032e238f0232/sensors-24-02807-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/00cd09a029a1/sensors-24-02807-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/23a2f2479746/sensors-24-02807-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/568ae8ebc344/sensors-24-02807-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/f93463916ee3/sensors-24-02807-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/9a561b7638d1/sensors-24-02807-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/c7b5feafa954/sensors-24-02807-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/1da888c7c72b/sensors-24-02807-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/26c467269999/sensors-24-02807-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/630efaf1b2fe/sensors-24-02807-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/2740e6f86c72/sensors-24-02807-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/032e238f0232/sensors-24-02807-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/00cd09a029a1/sensors-24-02807-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/23a2f2479746/sensors-24-02807-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/568ae8ebc344/sensors-24-02807-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/f93463916ee3/sensors-24-02807-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9633/11086323/9a561b7638d1/sensors-24-02807-g011.jpg

相似文献

1
A Novel Architecture for an Intrusion Detection System Utilizing Cross-Check Filters for In-Vehicle Networks.一种利用交叉检查过滤器的车载网络入侵检测系统的新型架构。
Sensors (Basel). 2024 Apr 28;24(9):2807. doi: 10.3390/s24092807.
2
Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study.基于机器学习的车载控制器局域网 (CAN) 总线入侵检测:性能比较研究。
Sensors (Basel). 2023 Mar 30;23(7):3610. doi: 10.3390/s23073610.
3
Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks.基于攻击统计特征的 CAN 总线车载网络入侵检测系统。
Sensors (Basel). 2023 Mar 28;23(7):3554. doi: 10.3390/s23073554.
4
Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks.基于深度迁移学习的车联网入侵检测系统。
Sensors (Basel). 2021 Jul 11;21(14):4736. doi: 10.3390/s21144736.
5
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.基于线性回归的位级汽车控制器局域网消息反向框架
Sensors (Basel). 2022 Jan 27;22(3):981. doi: 10.3390/s22030981.
6
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles.用于车联网入侵检测系统的多分类与基于树的集成网络
Sensors (Basel). 2023 Oct 28;23(21):8788. doi: 10.3390/s23218788.
7
On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks.基于滑动窗口的熵度量在汽车车载网络入侵检测中的应用
Entropy (Basel). 2020 Sep 18;22(9):1044. doi: 10.3390/e22091044.
8
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.自动驾驶汽车攻击:网络安全的深度学习算法。
Sensors (Basel). 2022 Jan 4;22(1):360. doi: 10.3390/s22010360.
9
Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle CAN-Network.基于机器学习集成的车辆 CAN 网络正常和恶意流量分类。
Sensors (Basel). 2022 Nov 26;22(23):9195. doi: 10.3390/s22239195.
10
GAN model using field fuzz mutation for in-vehicle CAN bus intrusion detection.基于场模糊突变的 GAN 模型在车载 CAN 总线入侵检测中的应用。
Math Biosci Eng. 2022 May 11;19(7):6996-7018. doi: 10.3934/mbe.2022330.

本文引用的文献

1
In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches.车载网络入侵检测系统:基于深度学习方法的系统综述
PeerJ Comput Sci. 2023 Oct 26;9:e1648. doi: 10.7717/peerj-cs.1648. eCollection 2023.
2
Learning to Double-Check Model Prediction From a Causal Perspective.从因果关系角度学习对模型预测进行二次检查。
IEEE Trans Neural Netw Learn Syst. 2024 Apr;35(4):5054-5063. doi: 10.1109/TNNLS.2023.3264712. Epub 2024 Apr 4.
3
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.
用于车载网络安全的基于深度神经网络的入侵检测系统
PLoS One. 2016 Jun 7;11(6):e0155781. doi: 10.1371/journal.pone.0155781. eCollection 2016.