A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet

Kabid Hassan Shibly, Md. Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Y. Kadobayashi
{"title":"A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet","authors":"Kabid Hassan Shibly, Md. Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Y. Kadobayashi","doi":"10.1109/CSR57506.2023.10224976","DOIUrl":null,"url":null,"abstract":"The proliferation of devices aimed at enhancing vehicle and driver safety or providing various services to drivers has resulted in a considerable amount of network traffic. Employing a sophisticated network protocol like Automotive Ethernet is crucial for expediently processing the high volume of traffic routed to the In-Vehicle Network (IVN), as its transmission is dependent on the specific function being performed. T he increased interconnectivity of in-vehicle devices and external networks allows for the transfer of potential attack vectors and associated vulnerabilities from an Ethernet infrastructure to an Automotive Ethernet framework. As the architecture of Automotive Ethernet is comprised of heterogeneous networks, it is susceptible to various vulnerabilities and remains a largely uncharted area of research. While supervised learning has demonstrated potential in this domain, its application is still limited by the vulnerability to unknown attacks, given the nascent nature of this area of research. The proposed research advances an approach to detecting intrusion in Automotive Ethernet data, which leverages the power of semi-supervised learning. In essence, by augmenting data with selectively identifying key features that are most relevant to the learning objective and isolating them from extraneous noise, this method enhances the algorithm's ability to discern attack activity and ultimately achieves superior performance. Our research indicates an average attack detection rate of 98.8 % for CAN DoS attacks, 97.8% for CAN Reply, 96.1 % for PTP Sync, 92.4% for Frame injection, and 91.1 % for Switch attacks, and we replicated the experiment across multiple IVN intrusion datasets for comparison to verify the credibility and robustness of the findings.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224976","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The proliferation of devices aimed at enhancing vehicle and driver safety or providing various services to drivers has resulted in a considerable amount of network traffic. Employing a sophisticated network protocol like Automotive Ethernet is crucial for expediently processing the high volume of traffic routed to the In-Vehicle Network (IVN), as its transmission is dependent on the specific function being performed. T he increased interconnectivity of in-vehicle devices and external networks allows for the transfer of potential attack vectors and associated vulnerabilities from an Ethernet infrastructure to an Automotive Ethernet framework. As the architecture of Automotive Ethernet is comprised of heterogeneous networks, it is susceptible to various vulnerabilities and remains a largely uncharted area of research. While supervised learning has demonstrated potential in this domain, its application is still limited by the vulnerability to unknown attacks, given the nascent nature of this area of research. The proposed research advances an approach to detecting intrusion in Automotive Ethernet data, which leverages the power of semi-supervised learning. In essence, by augmenting data with selectively identifying key features that are most relevant to the learning objective and isolating them from extraneous noise, this method enhances the algorithm's ability to discern attack activity and ultimately achieves superior performance. Our research indicates an average attack detection rate of 98.8 % for CAN DoS attacks, 97.8% for CAN Reply, 96.1 % for PTP Sync, 92.4% for Frame injection, and 91.1 % for Switch attacks, and we replicated the experiment across multiple IVN intrusion datasets for comparison to verify the credibility and robustness of the findings.
面向汽车以太网的特征感知半监督学习方法
旨在提高车辆和驾驶员安全或为驾驶员提供各种服务的设备的激增导致了相当大的网络流量。采用像汽车以太网这样复杂的网络协议对于方便地处理路由到车载网络(IVN)的大量流量至关重要,因为它的传输依赖于正在执行的特定功能。车载设备和外部网络互联性的增强,使得潜在的攻击载体和相关漏洞从以太网基础设施转移到汽车以太网框架。由于汽车以太网的体系结构是由异构网络组成的,它容易受到各种漏洞的影响,并且在很大程度上仍然是一个未知的研究领域。虽然监督学习在这一领域已经展示了潜力,但鉴于这一研究领域的新生性质,它的应用仍然受到未知攻击的脆弱性的限制。该研究提出了一种检测汽车以太网数据入侵的方法,该方法利用了半监督学习的力量。从本质上讲,通过选择性地识别与学习目标最相关的关键特征并将其与外部噪声隔离开来来增强数据,该方法增强了算法识别攻击活动的能力,最终实现了卓越的性能。我们的研究表明,CAN DoS攻击的平均攻击检测率为98.8%,CAN Reply攻击为97.8%,PTP同步攻击为96.1%,帧注入攻击为92.4%,Switch攻击为91.1%,并且我们在多个IVN入侵数据集上复制实验进行比较,以验证结果的可信度和鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信