2021
DOI: 10.1109/access.2021.3095962
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Performance Evaluation of Intrusion Detection Based on Machine Learning in In-Vehicle Controller Area Network Bus

Abstract: Communication between the nodes in a vehicle is performed using many protocols. The most common of these is known as the Controller Area Network (CAN). The functionality of the CAN protocol is based on sending messages from one node to all others throughout a bus. Messages are sent without either source or destination addresses. Consequently, it is simple for an attacker to inject malicious messages. This may lead to some nodes malfunctioning or to total system failure, which can affect the safety of the drive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(33 citation statements)
references
References 26 publications
(35 reference statements)
0
22
0
Order By: Relevance
“…Similarly, Alfardus and Rawat [6] also used ML algorithms such as KNN, RF, SVM, and Multilayer Perceptron (MLP) to detect CAN bus attacks. Moulahi et al [114] used RF, DT, SVM, and MLP to compare the detection capability. Features related to time, ID, DLC, and payload values were used.…”
Section: Supervisedmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, Alfardus and Rawat [6] also used ML algorithms such as KNN, RF, SVM, and Multilayer Perceptron (MLP) to detect CAN bus attacks. Moulahi et al [114] used RF, DT, SVM, and MLP to compare the detection capability. Features related to time, ID, DLC, and payload values were used.…”
Section: Supervisedmentioning
confidence: 99%
“…The main objective of the proposed approach was to identify vehicle models and anomalies. All of these works [6,10,11,35,70,113,114,129] can be considered as basic ML and DL model comparisons for CAN attacks. None of these models has the capability to detect unknown attacks.…”
Section: Supervisedmentioning
confidence: 99%
“…Similar to DCNN, the proposed models are extremely complicated to deploy in real life. Conversely, in [16], simple machine learning models are used for faster training and inference. However, the models achieve low accuracy, particularly for DoS and fuzzy attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A hierarchical taxonomy on these methodologies can be found in [31]. The authors from [32] provide a comparative view regarding the use of machine learning approaches for CAN IDSs. For example, in [33], the authors evaluate the performance of the K-Nearest Neighbour and Support Vector Machine algorithms against Denial of Service (DoS) and fuzzy attacks.…”
Section: B Related Workmentioning
confidence: 99%