2023
DOI: 10.1109/access.2023.3268519
|View full text |Cite
|
Sign up to set email alerts
|

G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…This precision in node detection surpasses traditional clustering methods, highlighting its criticality across diverse applications. For instance, in anomaly detection scenarios [51][52][53], the precise identification of unusual nodes is indispensable for tasks like fraud detection in financial transactions [54,55], intrusion detection in computer networks [56,57], and rare disease identification in biological networks [58,59]. Similarly, within network resource allocation frameworks [60,61]such as transportation or social networks, the ability to pinpoint nodes with specific characteristics is crucial for optimizing traffic flow, efficiently allocating resources, and upholding infrastructure integrity.…”
Section: -3-discussionmentioning
confidence: 99%
“…This precision in node detection surpasses traditional clustering methods, highlighting its criticality across diverse applications. For instance, in anomaly detection scenarios [51][52][53], the precise identification of unusual nodes is indispensable for tasks like fraud detection in financial transactions [54,55], intrusion detection in computer networks [56,57], and rare disease identification in biological networks [58,59]. Similarly, within network resource allocation frameworks [60,61]such as transportation or social networks, the ability to pinpoint nodes with specific characteristics is crucial for optimizing traffic flow, efficiently allocating resources, and upholding infrastructure integrity.…”
Section: -3-discussionmentioning
confidence: 99%
“…Park et al [24] introduce G-IDCS, a graph-based intrusion detection and classification system, to improve in-vehicle network security. It overcomes the limitations of existing intrusion detection systems, such as requiring large CAN messages and not classifying attack types.…”
Section: B Contributionmentioning
confidence: 99%
“…There are many existing methods that use shallow learning models or their own algorithms. The authors of [10] proposed G-IDCS, a graph-based intrusion detection and classification system that combines threshold-based IDS with a machine-learning-based classifier to overcome computation limitations. Derhab et al [11] proposed H-IDFS, a Histogram-based Intrusion Detection and Filtering framework.…”
Section: Related Workmentioning
confidence: 99%
“…These previous approaches [10][11][12][13][14][15][16][17][18][19][20] use specific features for anomaly detection and extract information from the entire frame sequence of the CAN bus. However, this may lead to false positives when encountering event frames that do not present during training.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation