Modern cars have evidenced to be susceptible to attacks by security researchers through physical and remote access to the cars' internal network. They can access a Controller Area Network (CAN), a bus communication protocol that defines a standard for effective and reliable transmission with the Electronics Control Units (ECU) in-cars. The CAN bus has some vulnerabilities that permit the intruders to control the car, for example preventing the engine to work or cutting the brakes by injection fabricated messages. However, the line of protection is monitoring and detecting malicious behavior on the CAN bus to reducing these risks. A security approach is suggested that depended on unsupervised learning, such as k-mean and supervised learning, such as Artificial Neural Networks (ANN) to enhance and protect the CAN bus of autonomous cars. The features are evaluated to measure its discrimination ability between classes and to select the best existing features. A real dataset shows that the suggested schema provides a low false ratio of 0.1% and the error rate of 0.6% with an average accuracy of 87.63%.

1.
K.-T.
Cho
and
K. G.
Shin
, “
Fingerprinting electronic control units for vehicle intrusion detection
,” in
25th ${$USENIX$}$ Security Symposium (${$USENIX$}$ Security 16)
,
2016
, pp.
911
927
.
2.
M.
Yli-Olli
and others, “
Machine Learning for Secure Vehicular Communication: an Empirical Study
,”
2019
.
3.
K.
Koscher
 et al., “
Experimental Security Analysis of a Modern Automobile
,” in
2010 IEEE Symposium on Security and Privacy
,
2010
, pp.
447
462
.
4.
T.
Hoppe
,
S.
Kiltz
, and
J.
Dittmann
, “
Automotive it-security as a challenge: Basic attacks from the black box perspective on the example of privacy threats
,” in
International Conference on Computer Safety, Reliability, and Security
,
2009
, pp.
145
158
.
5.
T.
Hoppe
and
J.
Dittman
, “
Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
,” in
Proceedings of the 2nd workshop on embedded systems security (WESS
),
2007
, pp.
1
6
.
6.
H. A.
Boyes
and
A. E. A.
Luck
, “
A security-minded approach to vehicle automation, road infrastructure technology, and connectivity
,”
2015
.
7.
A.-S. K.
Pathan
,
Security of self-organizing networks: MANET, WSN, WMN, VANET
.
CRC press
,
2016
.
8.
A. D.
Wood
and
J. A.
Stankovic
, “
Denial of service in sensor networks
,”
Computer (Long. Beach. Calif)
., vol.
35
, no.
10
, pp.
54
62
,
2002
.
9.
I.
Studnia
,
V.
Nicomette
,
E.
Alata
,
Y.
Deswarte
,
M.
Kaaniche
, and
Y.
Laarouchi
, “
Survey on security threats and protection mechanisms in embedded automotive networks
,” in
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W
),
2013
, pp.
1
12
.
10.
S.
Mukherjee
,
H.
Shirazi
,
I.
Ray
,
J.
Daily
, and
R.
Gamble
, “
Practical DoS attacks on embedded networks in commercial vehicles
,” in
International Conference on Information Systems Security
,
2016
, pp.
23
42
.
11.
X.
Lin
,
X.
Sun
,
X.
Wang
,
C.
Zhang
,
P.-H.
Ho
, and
X.
Shen
, “
TSVC: Timed efficient and secure vehicular communications with privacy preserving
,”
IEEE Trans. Wirel. Commun.
, vol.
7
, no.
12
, pp.
4987
4998
,
2008
.
12.
H.
Lee
,
K.
Choi
,
K.
Chung
,
J.
Kim
, and
K.
Yim
, “
Fuzzing can packets into automobiles
,” in
2015 IEEE 29th International Conference on Advanced Information Networking and Applications
,
2015
, pp.
817
821
.
13.
H.
Lee
,
S. H.
Jeong
, and
H. K.
Kim
, “
OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame
,” in
2017 15th Annual Conference on Privacy, Security and Trust (PST
),
2017
, pp.
57
5709
.
14.
M. L.
Han
,
B. Il
Kwak
, and
H. K.
Kim
, “
Anomaly intrusion detection method for vehicular networks based on survival analysis
,”
Veh. Commun.
,vol.
14
, pp.
52
63
,
2018
.
15.
H. K. K. H.M.
Song
, “
Can network intrusion datasets
, http://ocslab.hksecurity.net/Datasets/car-hacking-datase.”
16.
T.
Tang
,
W.
Shi
,
H.
Shang
, and
Y.
Wang
, “
A new car-following model with consideration of inter-vehicle communication
,”
Nonlinear Dyn.
, vol.
76
, no.
4
, pp.
2017
2023
,
2014
.
17.
R. O.
Duda
,
P. E.
Hart
, and
D. G.
Stork
,
“Pattern classification 2nd ed
,”
John Willey Sons Inc
,
2001
.
18.
I.
Ahmad
,
A. B.
Abdullah
, and
A. S.
Alghamdi
, “
Application of artificial neural network in detection of DOS attacks
,” in
Proceedings of the 2nd international conference on Security of information and networks
,
2009
, pp.
229
234
.
19.
M.
Zamani
and
M.
Movahedi
, “
Machine learning techniques for intrusion detection
,” arXiv Prepr. arXiv1312.2177,
2013
.
20.
K. M. K. M. Ali
Alheeti
,
L.
Al-Jobouri
, and
K.
McDonald-Maier
, “
Increasing the rate of intrusion detection based on a hybrid technique
,”
2013
, pp.
179
182
.
21.
H. M.
Song
,
J.
Woo
, and
H. K.
Kim
, “
In-vehicle network intrusion detection using deep convolutional neural network
,”
Veh. Commun.
, vol.
21
, p.
100198
,
2020
.
22.
K. M. A.
Alheeti
,
A.
Gruebler
, and
K. D.
McDonald-Maier
, “
An intrusion detection system against malicious attacks on the communication network of driverless cars
,” in
2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC
),
2015
, pp.
916
921
.
23.
M.
Müter
and
N.
Asaj
, “
Entropy-based anomaly detection for in-vehicle networks
,” in
2011 IEEE Intelligent Vehicles Symposium (IV
),
2011
, pp.
1110
1115
.
24.
A.
Taylor
,
N.
Japkowicz
, and
S.
Leblanc
, “
Frequency-based anomaly detection for the automotive CAN bus
,” in
2015 World Congress on Industrial Control Systems Security (WCICSS
),
2015
, pp.
45
49
.
25.
A.
Taylor
,
S.
Leblanc
, and
N.
Japkowicz
, “
Anomaly detection in automobile control network data with long short-term memory networks
,” in
2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA
),
2016
, pp.
130
139
.
26.
S.
Tariq
,
S.
Lee
,
H. K.
Kim
, and
S. S.
Woo
, “
Detecting In-vehicle CAN message attacks using heuristics and RNNs
,” in
International Workshop on Information and Operational Technology Security Systems
,
2018
, pp.
39
45
.
27.
C.
Wang
,
Z.
Zhao
,
L.
Gong
,
L.
Zhu
,
Z.
Liu
, and
X.
Cheng
, “
A distributed anomaly detection system for in-vehicle network using HTM
,”
IEEE Access
, vol.
6
, pp.
9091
9098
,
2018
.
This content is only available via PDF.
You do not currently have access to this content.