2018
DOI: 10.1007/978-3-030-03405-4_4
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Anomaly Detection System for Electronic Control Units Featuring Replicator Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Then deep learning-based approaches are proposed as it helps to manage the communication messages in the network. The deep learning-based approach makes lowpriority monitoring to be applied and it is difficult to apply the high-priority systems [31] and [32]. The deep-based auto encoder approach is proposed in order to identify the attacks as it uses the LSTM model and it contains message ID to identify the complex networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Then deep learning-based approaches are proposed as it helps to manage the communication messages in the network. The deep learning-based approach makes lowpriority monitoring to be applied and it is difficult to apply the high-priority systems [31] and [32]. The deep-based auto encoder approach is proposed in order to identify the attacks as it uses the LSTM model and it contains message ID to identify the complex networks.…”
Section: Related Workmentioning
confidence: 99%
“…With the LSTM classifier, supervised learning models are applied and to classify the attacks on the networks. Then [33] proposed the LSTM-based encoder and decoder architecture as it uses certain messages to make them construct the given input. This encoder and decoder use Knearest neighbor and estimator to identify the intrusion on the networks.…”
Section: Related Workmentioning
confidence: 99%
“…Purely payload-based methods, however, fail to capture the timing/sequence of messages in an attack, leading to parts of attack messages being flagged as benign. Hybrid schemes use both the message timing/frequency and the payload information to capture a more holistic view of the network, allowing them to extract specific signatures of transmitting ECUs, receiving ECUs, and messages [27]. Machine learning-based techniques further generalises such techniques when trained with large datasets through classification approaches, sequential techniques, and deep learningbased schemes.…”
Section: A Controller Area Networkmentioning
confidence: 99%
“…We modified the original coherence analysis with the weighted phase angle to include the phase information. Below we show these modifications of the original approach, which is represented by Equation 6.…”
Section: ) Extended Coherence Analysismentioning
confidence: 99%
“…One such intelligent technique for the detection of attacks are IDSs which can be divided into two types [5]. First, techniques that use unusual behaviour or signatures from data streams to infer the presence of attackers [6], [7]. Second, signaturebased techniques that are focused on specific patterns in the network to detect malicious actions.…”
Section: Introductionmentioning
confidence: 99%