2023
DOI: 10.1109/access.2023.3282110
|View full text |Cite
|
Sign up to set email alerts
|

Transformer-Based Attention Network for In-Vehicle Intrusion Detection

Abstract: Despite the significant advantages of communication systems between electronic control units, the controller area network (CAN) protocol is vulnerable to attacks owing to its weak security structure. The persistent development of intrusion detection systems (IDS) is geared toward preventing vehicles from being targeted by malicious attacks. Recurrent neural networks (RNNs) have emerged as a prominent approach in this domain, contributing significantly to the evolution of IDS. Nonetheless, RNN-based methods hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…Input Features Used GIDS [30] CAN ID DCNN [13] CAN ID Rec-CNN [38] CAN ID G-IDCS [28] CAN ID TAN-IDS [29] CAN ID iForest [35] Data Field MLIDS [36] CAN ID + Data Field NovelADS [32] CAN ID + Data Field TCAN-IDS [31] CAN ID + Data Field MTH-IDS [37] CAN ID + Data Field HyDL-IDS [33] CAN ID + Data Field + DLC GRU [34] CAN ID + Data Field + DLC CQMLP-IDS (proposed) CAN ID + Data Field IDS using deep convolutional neural networks. They achieve over 99% accuracy for DoS, fuzzing & spoofing attacks.…”
Section: Modelsmentioning
confidence: 99%
See 3 more Smart Citations
“…Input Features Used GIDS [30] CAN ID DCNN [13] CAN ID Rec-CNN [38] CAN ID G-IDCS [28] CAN ID TAN-IDS [29] CAN ID iForest [35] Data Field MLIDS [36] CAN ID + Data Field NovelADS [32] CAN ID + Data Field TCAN-IDS [31] CAN ID + Data Field MTH-IDS [37] CAN ID + Data Field HyDL-IDS [33] CAN ID + Data Field + DLC GRU [34] CAN ID + Data Field + DLC CQMLP-IDS (proposed) CAN ID + Data Field IDS using deep convolutional neural networks. They achieve over 99% accuracy for DoS, fuzzing & spoofing attacks.…”
Section: Modelsmentioning
confidence: 99%
“…In [28], authors present a graph based intrusion detection protocol and propose improvements over existing graph based IDS techniques. In [29], a transformer network-based IDS is proposed which demonstrates very high classification accuracy at the cost of higher detection latency. In [30], the authors propose a GAN-based IDS and achieve an average accuracy of 97.5% for the same attacks.…”
Section: Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…To protect vehicle network security, the authors in [175] proposed a transformer-based intrusion detection system that provides a sophisticated solution for vehicle networks. This system employs self-attention mechanisms to analyze Controller Area Network (CAN) messages, accurately classifying them into various in-vehicle attacks like denial-of-service, spoofing, and replay attacks.…”
Section: E Network Coverage and Peer-to-peer Communicationmentioning
confidence: 99%