4.6 Article

Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Swarm Optimization and Machine Learning Applied to PE Malware Detection towards Cyber Threat Intelligence

Santosh Jhansi Kattamuri et al.

Summary: Cyber threat intelligence involves analyzing applications and their metadata to identify potential threats. This study focuses on the analysis of Portable Executable (PE) file headers for static malware detection in Windows executables. The researchers developed a new dataset called SOMLAP, which enhances the existing benchmark dataset by including 108 pure PE file header attributes. Additionally, swarm optimization algorithms (Ant Colony Optimization, Cuckoo Search Optimization, and Grey Wolf Optimization) combined with machine learning tools were used to minimize features and improve the performance of the Malware Detection System (MDS), achieving an accuracy of 99.37% with an optimized set of 12 features (ACO).

ELECTRONICS (2023)

Article Chemistry, Analytical

Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity

Theyazn H. H. Aldhyani et al.

Summary: Rapid technological development has significantly changed the automotive industry, particularly in the transition of vehicles from machine-controlled to software-controlled technologies. However, the complexity of data and traffic behaviors still poses cybersecurity issues and weaknesses in the autonomous vehicle network. Developing a system capable of rapidly detecting message attacks in the controller area network (CAN) is a major challenge. This study presents a high-performance system that utilizes artificial intelligence and deep learning approaches to protect the vehicle network from cyber threats.

SENSORS (2022)

Article Computer Science, Hardware & Architecture

Decision tree based user-centric security solution for critical IoT infrastructure

Deepak Puthal et al.

Summary: Real-time data processing brings better business modeling and actionable plans. Internet of Things (IoT), as a source of sensitive data collected and communicated through public or private networks, requires end-to-end security to ensure data integrity, quality, and acceptability. Designing an adaptive solution is crucial for deploying IoT in critical infrastructures and enabling near-real-time decision-making through data analysis in edge data centers. Securing the system according to user demand and device specifications is a challenging and open research problem. This paper proposes a user-centric security approach called DecisionT Sec, based on decision trees, that provides a secure communication channel in IoT networks by integrating edge data centers. The proposed DecisionT Sec is validated through real-time testbed experiments and theoretical security validation.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Chemistry, Analytical

Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models

Josue Genaro Almaraz-Rivera et al.

Summary: From smart homes to industrial environments, the IoT has become an essential part of our daily lives. However, the increasing number of connected devices also raises concerns about security. This study addresses this issue by building a novel Intrusion Detection System based on Machine Learning and Deep Learning models, achieving high accuracy in identifying denial of service attacks on IoT networks.

SENSORS (2022)

Article Chemistry, Analytical

Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle CAN-Network

Easa Alalwany et al.

Summary: This paper presents an effective machine learning-based intrusion detection system (IDS) for detecting attacks on the CAN bus. By utilizing various machine learning algorithms and ensemble classifiers, the system achieves higher accuracy in detecting normal and abnormal activities.

SENSORS (2022)

Article Engineering, Civil

AI-Enabled Fingerprinting and Crowdsource-Based Vehicle Localization for Resilient and Safe Transportation Systems

Rathin Chandra Shit et al.

Summary: The study proposes a crowd-sourced based localization system to address the radio map building issue in fingerprinting localization system. By utilizing a deep learning algorithm, the approach achieves calibration-free crowd-sourced fingerprint generation, suitable for various location-based services in urban infrastructure.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Computer Science, Information Systems

Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses

Abdulrahman Abu Elkhail et al.

Summary: In recent years, advancements in automotive technology have led to the development of intelligent vehicles, but also exposed security issues such as malware attacks. Researchers have proposed various defense measures, such as signature and cloud detection, to address these threats.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Comparative Performance Evaluation of Intrusion Detection Based on Machine Learning in In-Vehicle Controller Area Network Bus

Tarek Moulahi et al.

Summary: This paper investigates the use of multiple ML techniques to detect intrusions in in-vehicle communication, with experimental results showing that the techniques under consideration outperform other previously used methods.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network

Mee Lan Han et al.

Summary: Vehicle communication technology has been steadily progressing alongside the convergence of the in-vehicle network (IVN) and wireless communication technology. The present study proposes a method to detect and identify abnormalities in vehicular networks based on the periodic event-triggered interval of the controller area network (CAN) messages, achieving up to 99% accuracy in detecting abnormalities in the IVN.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Civil

A Survey of Intrusion Detection for In-Vehicle Networks

Wufei Wu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

Securing the internet of vehicles through lightweight block ciphers *

Arcangelo Castiglione et al.

PATTERN RECOGNITION LETTERS (2020)

Article Chemistry, Analytical

LoRa Architecture for V2X Communication: An Experimental Evaluation with Vehicles on the Move

Khandaker Foysal Haque et al.

SENSORS (2020)

Proceedings Paper Green & Sustainable Science & Technology

A LoRa Based Reliable and Low Power Vehicle to Everything (V2X) Communication Architecture

Khandaker Foysal Haque et al.

2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Toward Never-Ending Learner for Malware Analysis (NELMA)

Moumita Kamal et al.

2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) (2020)

Review Telecommunications

Attacks and defences on intelligent connected vehicles: a survey

Mahdi Dibaei et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Computer Science, Information Systems

Identification Failure Data for Cluster Heads Aggregation in WSN Based on Improving Classification of SVM

Thi-Kien Dao et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks

Bogdan Groza et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Artificial Intelligence

Machine learning algorithms for wireless sensor networks: A survey

D. Praveen Kumar et al.

INFORMATION FUSION (2019)

Article Computer Science, Information Systems

Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles

Ahilan Appathurai et al.

IET NETWORKS (2019)

Article Automation & Control Systems

Self-adaptative multi-kernel algorithm for switched linear systems identification

Lamaa Sellami et al.

INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL (2019)

Article Engineering, Electrical & Electronic

Fault Detection in Wireless Sensor Networks Through SVM Classifier

Salah Zidi et al.

IEEE SENSORS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol

Pal-Stefan Murvay et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

Energy-Efficient Wireless Transmissions for Battery-Less Vehicle Tire Pressure Monitoring System

Qinmiao Kang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles

Wenyuan Xu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

DRIVING WITH SHARKS Rethinking Connected Vehicles with Vehicle Cybersecurity

Mahmoud Hashem Eiza et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2017)

Proceedings Paper Computer Science, Information Systems

OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame

Hyunsung Lee et al.

2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) (2017)

Article Computer Science, Hardware & Architecture

Security in Automotive Networks: Lightweight Authentication and Authorization

Philipp Mundhenk et al.

ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2017)

Article Multidisciplinary Sciences

Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

Min-Joo Kang et al.

PLOS ONE (2016)

Article Multidisciplinary Sciences

An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network

Xuemei Sun et al.

PLOS ONE (2015)