2022
DOI: 10.3390/jsan11010006
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Lightweight Intrusion Detection Framework for In-Vehicle Networks

Abstract: With the emergence of networked devices, from the Internet of Things (IoT) nodes and cellular phones to vehicles connected to the Internet, there has been an ever-growing expansion of attack surfaces in the Internet of Vehicles (IoV). In the past decade, there has been a rapid growth in the automotive industry as network-enabled and electronic devices are now integral parts of vehicular ecosystems. These include the development of automobile technologies, namely, Connected and Autonomous Vehicles (CAV) and ele… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(16 citation statements)
references
References 25 publications
0
16
0
Order By: Relevance
“…First, our framework is compared to some well-known machine learning models as well as statistical models mentioned in [21]- [23], [27]. The dataset, which contains benign data and malicious data generated from Attack A, Attack B, Attack C, and Attack D is divided into 70% training data and 30% for testing and validation.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…First, our framework is compared to some well-known machine learning models as well as statistical models mentioned in [21]- [23], [27]. The dataset, which contains benign data and malicious data generated from Attack A, Attack B, Attack C, and Attack D is divided into 70% training data and 30% for testing and validation.…”
Section: Resultsmentioning
confidence: 99%
“…The processed data are fed to CNN to extract the feature map and then LSTM is applied to extract the temporal dependencies and the extracted features are finally fed to a fully connected neural network (NN) to classify the output. Dheeraj et al proposed IDS where the data are preprocessed and encoded to be fed to a deep neural network (DNN) to detect anomalies in CAN data [21].…”
Section: A In-vehicle Communication Idssmentioning
confidence: 99%
“…Thereafter, a oneclass SVM filters out malicious CAN frames from each malicious window. Basavaraj and Tayeb [22] proposed a DNN-based IDS and evaluated its performance on two real datasets where they achieved a detection accuracy of 98.67% on known attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This model comes into place to fix weaknesses of the client-server model, as removing one or more bots will not ease the problem due to the huge botnet of independent bots. Several IDSes were proposed and developed during the last couple of years; examples can be found in [11][12][13][14][15].…”
Section: Related Workmentioning
confidence: 99%