• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

车载CAN-FD消息的多攻击入侵检测

Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.

作者信息

Gao Fei, Liu Jinshuo, Liu Yingqi, Gao Zhenhai, Zhao Rui

机构信息

State Key Laboratory of Automotive Simulation and Control, Jilin University, Changchun 130025, China.

College of Automotive Engineering, Jilin University, Changchun 130025, China.

出版信息

Sensors (Basel). 2024 May 27;24(11):3461. doi: 10.3390/s24113461.

DOI:10.3390/s24113461
PMID:38894252
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11175007/
Abstract

As an enhanced version of standard CAN, the Controller Area Network with Flexible Data (CAN-FD) rate is vulnerable to attacks due to its lack of information security measures. However, although anomaly detection is an effective method to prevent attacks, the accuracy of detection needs further improvement. In this paper, we propose a novel intrusion detection model for the CAN-FD bus, comprising two sub-models: Anomaly Data Detection Model (ADDM) for spotting anomalies and Anomaly Classification Detection Model (ACDM) for identifying and classifying anomaly types. ADDM employs Long Short-Term Memory (LSTM) layers to capture the long-range dependencies and temporal patterns within CAN-FD frame data, thus identifying frames that deviate from established norms. ACDM is enhanced with the attention mechanism that weights LSTM outputs, further improving the identification of sequence-based relationships and facilitating multi-attack classification. The method is evaluated on two datasets: a real-vehicle dataset including frames designed by us based on known attack patterns, and the CAN-FD Intrusion Dataset, developed by the Hacking and Countermeasure Research Lab. Our method offers broader applicability and more refined classification in anomaly detection. Compared with existing advanced LSTM-based and CNN-LSTM-based methods, our method exhibits superior performance in detection, achieving an improvement in accuracy of 1.44% and 1.01%, respectively.

摘要

作为标准CAN的增强版本,灵活数据速率控制器局域网(CAN-FD)由于缺乏信息安全措施而容易受到攻击。然而,尽管异常检测是一种有效的防攻击方法,但其检测准确性仍需进一步提高。在本文中,我们提出了一种针对CAN-FD总线的新型入侵检测模型,该模型由两个子模型组成:用于发现异常的异常数据检测模型(ADDM)和用于识别及分类异常类型的异常分类检测模型(ACDM)。ADDM采用长短期记忆(LSTM)层来捕捉CAN-FD帧数据中的长期依赖关系和时间模式,从而识别出偏离既定规范的帧。ACDM通过对LSTM输出进行加权的注意力机制得到增强,进一步改善了基于序列关系的识别,并有助于多攻击分类。该方法在两个数据集上进行了评估:一个是我们基于已知攻击模式设计的包含帧的实车数据集,另一个是由黑客与对策研究实验室开发的CAN-FD入侵数据集。我们的方法在异常检测中具有更广泛的适用性和更精细的分类。与现有的基于先进LSTM和基于CNN-LSTM的方法相比,我们的方法在检测方面表现出卓越的性能,准确率分别提高了1.44%和1.01%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/2866167eeaf0/sensors-24-03461-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/ca339b90f772/sensors-24-03461-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/044e14369a53/sensors-24-03461-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/a17715325ec8/sensors-24-03461-g003a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/40f6d9fda4b8/sensors-24-03461-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/7b6b8236aa2c/sensors-24-03461-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/aa7610443016/sensors-24-03461-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/d2980006c0f3/sensors-24-03461-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/97547a2d7c77/sensors-24-03461-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/46b92e06e223/sensors-24-03461-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/ba423f682ae4/sensors-24-03461-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/fb33a7a3f822/sensors-24-03461-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/ebe003bebde7/sensors-24-03461-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/9d74de5c081a/sensors-24-03461-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/f2370178b2ec/sensors-24-03461-g014a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/d74625b39d53/sensors-24-03461-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/b98b5441e8e2/sensors-24-03461-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/95b3856b511d/sensors-24-03461-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/2194780a62ef/sensors-24-03461-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/2866167eeaf0/sensors-24-03461-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/ca339b90f772/sensors-24-03461-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/044e14369a53/sensors-24-03461-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/a17715325ec8/sensors-24-03461-g003a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/40f6d9fda4b8/sensors-24-03461-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/7b6b8236aa2c/sensors-24-03461-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/aa7610443016/sensors-24-03461-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/d2980006c0f3/sensors-24-03461-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/97547a2d7c77/sensors-24-03461-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/46b92e06e223/sensors-24-03461-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/ba423f682ae4/sensors-24-03461-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/fb33a7a3f822/sensors-24-03461-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/ebe003bebde7/sensors-24-03461-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/9d74de5c081a/sensors-24-03461-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/f2370178b2ec/sensors-24-03461-g014a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/d74625b39d53/sensors-24-03461-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/b98b5441e8e2/sensors-24-03461-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/95b3856b511d/sensors-24-03461-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/2194780a62ef/sensors-24-03461-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/020c/11175007/2866167eeaf0/sensors-24-03461-g019.jpg

相似文献

1
Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.车载CAN-FD消息的多攻击入侵检测
Sensors (Basel). 2024 May 27;24(11):3461. doi: 10.3390/s24113461.
2
Network Anomaly Intrusion Detection Based on Deep Learning Approach.基于深度学习方法的网络异常入侵检测。
Sensors (Basel). 2023 Feb 15;23(4):2171. doi: 10.3390/s23042171.
3
Enhancing intrusion detection performance using explainable ensemble deep learning.使用可解释集成深度学习提高入侵检测性能。
PeerJ Comput Sci. 2024 Sep 13;10:e2289. doi: 10.7717/peerj-cs.2289. eCollection 2024.
4
An improved long short term memory network for intrusion detection.改进的长短时记忆网络入侵检测。
PLoS One. 2023 Aug 1;18(8):e0284795. doi: 10.1371/journal.pone.0284795. eCollection 2023.
5
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.自动驾驶汽车攻击:网络安全的深度学习算法。
Sensors (Basel). 2022 Jan 4;22(1):360. doi: 10.3390/s22010360.
6
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
7
Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks.基于攻击统计特征的 CAN 总线车载网络入侵检测系统。
Sensors (Basel). 2023 Mar 28;23(7):3554. doi: 10.3390/s23073554.
8
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles.用于车联网入侵检测系统的多分类与基于树的集成网络
Sensors (Basel). 2023 Oct 28;23(21):8788. doi: 10.3390/s23218788.
9
Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.基于深度自动编码器算法的自动驾驶车辆网络的网络攻击检测。
Sensors (Basel). 2023 Apr 18;23(8):4086. doi: 10.3390/s23084086.
10
RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system.RCLNet:一种用于保障物联网医疗系统安全的基于异常的有效入侵检测方法。
Front Digit Health. 2024 Oct 3;6:1467241. doi: 10.3389/fdgth.2024.1467241. eCollection 2024.

本文引用的文献

1
A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data.一种用于高维不平衡数据的新型多模块集成入侵检测系统。
Appl Intell (Dordr). 2023;53(1):272-288. doi: 10.1007/s10489-022-03361-2. Epub 2022 Apr 14.
2
Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.基于深度神经网络的物联网架构开发,以应对自动化引导车辆的网络攻击。
Sensors (Basel). 2021 Dec 18;21(24):8467. doi: 10.3390/s21248467.
3
Long short-term memory.长短期记忆
Neural Comput. 1997 Nov 15;9(8):1735-80. doi: 10.1162/neco.1997.9.8.1735.