Multiple attacks have shown that in-vehicle networks have vulnerabilities which can be exploited. Securing the Controller Area Network (CAN) for modern vehicles has become a necessary task for car manufacturers. Some attacks inject potentially large amount of fake messages into the CAN network; however, such attacks are relatively easy to detect. In more sophisticated attacks, the original messages are modified, making the de- tection a more complex problem. In this paper, we present a novel machine learning based intrusion detection method for CAN networks. We focus on detecting message modification attacks, which do not change the timing patterns of communications. Our proposed temporal convolutional network-based solution can learn the normal behavior of CAN signals and differentiate them from malicious ones. The method is evaluated on multiple CAN-bus message IDs from two public datasets including different types of attacks. Performance results show that our lightweight approach compares favorably to the state-of-the-art unsupervised learning approach, achieving similar or better accuracy for a wide range of scenarios with a significantly lower false positive rate.
翻译:多个攻击表明,机动车内网络存在可加以利用的弱点。为现代车辆确保控制区网络(CAN)已成为汽车制造商的一项必要任务。一些攻击可能将大量假信息输入CAN网络;然而,这类攻击相对容易被发现。在更复杂的攻击中,原始信息被修改,使去电网成为一个更复杂的问题。在本文中,我们为CAN网络展示了一种新的机器学习入侵探测方法。我们侧重于探测信息修改攻击,这些攻击并不改变通信的时间安排。我们提议的基于时间变换网络的解决方案可以了解CAN信号的正常行为,并将它们与恶意信号区分开来。该方法是从两个公共数据集(包括不同类型的攻击)对多个CAN-bus电文代号进行评估的。绩效结果表明,我们的轻量方法优于最先进的不受监督的学习方法,在一系列情况中实现相似或更好的准确性,其误率要低得多。