版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Soonchunhyang Univ Dept Future Convergence Technol Asan 31538 Chuncheongnam D South Korea
出 版 物:《VEHICULAR COMMUNICATIONS》 (Veh. Commun.)
年 卷 期:2022年第38卷
核心收录:
学科分类:0810[工学-信息与通信工程] 08[工学] 0823[工学-交通运输工程]
基 金:National Research Foundation of Korea (NRF) - Korea government (MSIT) [2021R1A4A2001810, NRF-2020R1F1A1048664] Institute for Information & communications Technology Planning & Evaluation (IITP) - Korea government (MSIT) [2022-0-01197] National Research Foundation of Korea (NRF) - Ministry of Education (MOE) [2021RIS-004] Ministry of Education Soonchunhyang Research Fund Convergence security core talent training business (SoonChunHyang University) National Research Foundation of Korea
主 题:Controller area network Intrusion detection Semi -supervised learning Adversarial autoencoder Convolutional neural networks
摘 要:With the development of autonomous vehicle technology, the controller area network (CAN) bus has become the de facto standard for an in-vehicle communication system because of its simplicity and efficiency. However, without any encryption and authentication mechanisms, the in-vehicle network using the CAN protocol is susceptible to a wide range of attacks. Many studies, which are mostly based on machine learning, have proposed installing an intrusion detection system (IDS) for anomaly detection in the CAN bus system. Although machine learning methods have many advantages for IDS, previous models usually require a large amount of labeled data, which results in high time and labor costs. To handle this problem, we propose a novel semi-supervised learning-based convolutional adversarial autoencoder model in this paper. The proposed model combines two popular deep learning models: autoencoder and generative adversarial networks. First, the model is trained with unlabeled data to learn the manifolds of normal and attack patterns. Then, only a small number of labeled samples are used in supervised training. The proposed model can detect various kinds of message injection attacks, such as DoS, fuzzy, and spoofing, as well as unknown attacks. The experimental results show that the proposed model achieves the highest F1 score of 0.9984 and a low error rate of 0.1% with limited labeled data compared to other supervised methods. In addition, we show that the model can meet the real-time requirement by analyzing the model complexity in terms of the number of trainable parameters and inference time. This study successfully reduced the number of model parameters by five times and the inference time by eight times, compared to a state-of-the-art model.(c) 2022 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://***/licenses/by/4.0/).