2020
DOI: 10.3390/fi12070119
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection for in-Vehicle Communication Networks: An Unsupervised Kohonen SOM Approach

Abstract: The diffusion of embedded and portable communication devices on modern vehicles entails new security risks since in-vehicle communication protocols are still insecure and vulnerable to attacks. Increasing interest is being given to the implementation of automotive cybersecurity systems. In this work we propose an efficient and high-performing intrusion detection system based on an unsupervised Kohonen Self-Organizing Map (SOM) network, to identify attack messages sent on a Controller Area Network (CAN) bus. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 61 publications
(27 citation statements)
references
References 45 publications
0
31
0
1
Order By: Relevance
“…To generate accurate in-vehicle data, Vita Santa Barletta et al [14] and Huaxin Li et al [1] generated data by accessing the CAN network via OBD-II of the real vehicle. Messages were injected to perform a specific attack on the CAN bus, and data between two sensors were analyzed to estimate the category of the attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To generate accurate in-vehicle data, Vita Santa Barletta et al [14] and Huaxin Li et al [1] generated data by accessing the CAN network via OBD-II of the real vehicle. Messages were injected to perform a specific attack on the CAN bus, and data between two sensors were analyzed to estimate the category of the attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, this method has drawbacks, particularly when the in-vehicle environment changes often; these drawbacks might include the constant requirement for calibration and data updates. Other work by Barletta et al [233] proposed an IDS based on a combination of an unsupervised Kohonen Self-Organizing Map (SOM) network and k-means algorithm. The CAN IDs, timestamp, DLC and data field were used as features in order to identify attack messages sent on the CAN bus.…”
Section: F Intrusion Detection Systemmentioning
confidence: 99%
“…CAN messages can be periodic, sporadic, or aperiodic. Periodic messages are sent at regular time intervals, sporadic messages occur with a minimum time interval and aperiodic messages at arbitrary times [19]. Hence, starting from timestamp defined as S i , with i = 1, .…”
Section: Data Preprocessingmentioning
confidence: 99%
“…In our research, we implemented an anomaly-based IDS for the identification of attack messages injected on the CAN bus using both supervised and unsupervised SOM networks [19] combined with a K-means clustering algorithm.…”
Section: Introductionmentioning
confidence: 99%