Citation: | Xu He, Wu Di, Lu Jiwu, Li Renfa. An Intrusion Detection Algorithm and Its Hardware Acceleration for CAN in Vehicles[J]. Journal of Computer Research and Development, 2023, 60(12): 2783-2796. DOI: 10.7544/issn1000-1239.202220035 |
A controller area network (CAN) bus protocol is widely used in the vehicular system and is an efficient standard bus enabling communication between all electronic control units (ECUs). However, the CAN bus is easy to be attacked because of a lack of security defense features. We propose self-attention mechanism (SAM) enhanced grid long short-term memory (Grid LSTM) for vehicular intrusion detection, namely SALVID. The SAM can enhance the characteristics of CAN bus-oriented attack behavior, and the Grid LSTM can effectively extract the depth features of time series data. We generate five attack datasets by extracting benign CAN data from the actual car, including denial of service (DoS), fuzzy, spoofing, replay, and delete attacks. We compare the performance of various models with different model depths, and the results demonstrate that SALVID has the best performance in detecting the attacks on CAN bus. SALVID can identify attacks with small-batch features according to an overall detection accuracy of 98.98%, which is hard to be done in previous studies. We also design and implement SALVID based on field programmable gate array (FPGA) embedded platform and use parallel optimization and quantification to accelerate the model based on previous experiments. Even with a certain degree of quantification, SALVID still displays high detection accuracy of 98.81% and a latency of 1.88 ms. The investigation provides a new idea for designing high-performance and real-time vehicular intrusion detection systems.
[1] |
季一木,焦志鹏,刘尚东,等. 基于通信特征的CAN总线泛洪攻击检测方法[J]. 网络与信息安全学报,2020,6(1):27−37 doi: 10.11959/j.issn.2096-109x.2020005
Ji Yimu, Jiao Zhipeng, Liu Shangdong, et al. CAN bus flood attack detection based on communication characteristics[J]. Chinese Journal of Network and Information Security, 2020, 6(1): 27−37 (in Chinese) doi: 10.11959/j.issn.2096-109x.2020005
|
[2] |
Hegde R, Mishra G, Gurumurthy K S. An insight into the hardware and software complexity of ECUs in vehicles[C] //Proc of Int Conf on Advances in Computing and Information Technology. Berlin: Springer, 2011: 99−106
|
[3] |
李中伟,谭凯,关亚东,等. 车载CAN总线脱离攻击及其入侵检测算法[J]. 计算机应用,2020,40(11):3224−3228
Li Zhongwei, Tan Kai, Guan Yadong, et al. In-vehicle CAN bus-off attack and its intrusion detection algorithm[J]. Journal of Computer Applications, 2020, 40(11): 3224−3228 (in Chinese)
|
[4] |
Mccluskey B. Connected cars – The security challenge [connected cars cyber security] [C] //Proc of Engineering & Technology. Piscataway, NJ: IEEE, 2017: 54−57
|
[5] |
Li Yufeng, Lu Xiaoyuan, Cao Chenhong, et al. A survey of cybersecurity for intelligent connected-automated vehicle[J]. Telecommunications Science, 2020, 36(4: 36−45
|
[6] |
Wu Di, Jiang Zhongkai, Xie Xiaofeng, et al. LSTM learning with Bayesian and Gaussian processing for anomaly detection in industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2019, 16(8): 5244−5253
|
[7] |
于赫. 网联汽车信息安全问题及CAN总线异常检测技术研究[D]. 长春: 吉林大学, 2016
Yu He. Research on connected vehicle cyber security and anomaly detection technology for in-vehicle CAN bus[D]. Changchun: Jilin University, 2016 (in Chinese)
|
[8] |
吴武飞,李仁发,曾刚,等. 智能网联车网络安全研究综述[J]. 通信学报,2020,41(6):161−174 doi: 10.11959/j.issn.1000-436x.2020130
Wu Wufei, Li Renfa, Zeng Gang, et al. Survey of the intelligent and connected vehicle cybersecurity[J]. Journal on Communications, 2020, 41(6): 161−174 (in Chinese) doi: 10.11959/j.issn.1000-436x.2020130
|
[9] |
Hsu W N, Zhang Yu, Glass J. A prioritized grid long short-term memory RNN for speech recognition[C] //Proc of Spoken Language Technology Workshop. Piscataway, NJ: IEEE, 2016: 467−473
|
[10] |
Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need[C] //Proc of Advances in Neural Information Processing Systems. New York: ACM, 2017: 6000−6010
|
[11] |
Vuong T P, Loukas G, Gan D. Performance evaluation of cyber-physical intrusion detection on a robotic vehicle[C] //Proc of Int Conf on Computer and Information Technology Ubiquitous Computing and Communications Dependable. Piscataway, NJ: IEEE, 2015: 2106−2113
|
[12] |
Cho K T, Shin K G. Fingerprinting electronic control units for vehicle intrusion detection[C] //Proc of the 25th USENIX Security Symp. Berkeley, CA: USENIX Association, 2016: 911−927
|
[13] |
Zhou Jia, Joshi P, Zeng Haibo, et al. Btmonitor: Bit-time-based intrusion detection and attacker identification in controller area network[J]. ACM Transactions on Embedded Computing Systems, 2019, 18(6): 1−23
|
[14] |
Choi W, Joo K, Jo H J, et al. Voltageids: Low-level communication characteristics for automotive intrusion detection system[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(8): 2114−2129 doi: 10.1109/TIFS.2018.2812149
|
[15] |
Hanselmann M, Strauss T, Dormann K, et al. CANet: An unsupervised intrusion detection system for high dimensional CAN bus data[J]. IEEE Access, 2020, 8: 58194−58205 doi: 10.1109/ACCESS.2020.2982544
|
[16] |
Hossain M D, Inoue H, Ochiai H, et al. LSTM-based intrusion detection system for in-vehicle CAN bus communications[J]. IEEE Access, 2020, 8: 185489−185502 doi: 10.1109/ACCESS.2020.3029307
|
[17] |
Xie Guoqi, Yang L T, Yang Yuanda, et al. Threat analysis for automotive CAN networks: A GAN model-based intrusion detection technique[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(7): 4467−4477 doi: 10.1109/TITS.2021.3055351
|
[18] |
Dupont G, Lekidis A, Den H J, at el. Automotive controller area network (CAN) bus intrusion dataset v2[DB/OL]. 2019[2022-01-02].https://data.4tu.nl/articles/dataset/Automotive_Controller_Area_Network_CAN_Bus_Intrusion_Dataset/12696950
|
[19] |
周飞燕,金林鹏,董军. 卷积神经网络研究综述[J]. 计算机学报,2017,40(6):1229−1251 doi: 10.11897/SP.J.1016.2017.01229
Zhou Feiyan, Jin Linpeng, Dong Jun. Review of convolutional neural network[J]. Chinese Journal of Computer, 2017, 40(6): 1229−1251 (in Chinese) doi: 10.11897/SP.J.1016.2017.01229
|
[20] |
Wu Di, Xu He, Jiang Zhongkai, et al. EdgeLSTM: Towards deep and sequential edge computing for IoT applications[J]. IEEE/ACM Transactions on Networking, 2021, 29(4): 1895−1908 doi: 10.1109/TNET.2021.3075468
|
[21] |
Zhang Han, Goodfellow I, Metaxas D, et al. Self-attention generative adversarial networks[C] //Proc of the 36th Int Conf on Machine Learning. San Diego, CA: ICML, 2019: 7354−7363
|
[22] |
Rybalkin V, Pappalardo A, Ghaffar M M, et al. FINN-L: Library extensions and design trade-off analysis for variable precision LSTM networks on FPGAs[C] //Proc of the 28th Int Conf on Field Programmable Logic and Applications. Piscataway, NJ: IEEE, 2018: 89−897
|
[23] |
Que Zhiqiang, Wang Erwei, Marikar U, et al. Accelerating recurrent neural networks for gravitational wave experiments[C] //Proc of the 32nd Int Conf on Application Specific Systems, Architectures and Processors. Piscataway, NJ: IEEE, 2021: 117−124
|
[24] |
张奕玮. 基于FPGA的高能效比LSTM预测算法加速器的设计与实现[D]. 合肥: 中国科学技术大学, 2018
Zhang Yiwei. FPGA-Based design and implementation of energy-efficient LSTM prediction accelerator[D]. Hefei: University of Science and Technology of China, 2018 (in Chinese)
|
[25] |
Vaishnav A, Pham K D, Koch D. A survey on FPGA virtualization[C] //Proc of the 28th Int Conf on Field Programmable Logic and Applications. Piscataway, NJ: IEEE, 2018: 131−1317
|
[1] | Lin Liansheng, Zheng Huanqin, Su Shen, Lei Kai, Chen Xiaofeng, Tian Zhihong. An On-Chain Mechanism Against DeFi Price Manipulation Attacks[J]. Journal of Computer Research and Development, 2025, 62(2): 443-457. DOI: 10.7544/issn1000-1239.202330291 |
[2] | Song Shuwei, Ni Xiaoze, Chen Ting. Gas Optimization for Smart Contracts: A Survey[J]. Journal of Computer Research and Development, 2023, 60(2): 311-325. DOI: 10.7544/issn1000-1239.202220887 |
[3] | Ying Chenhao, Xia Fuyuan, Li Jie, Si Xueming, Luo Yuan. Incentive Mechanism Based on Truth Estimation of Private Data for Blockchain-Based Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2022, 59(10): 2212-2232. DOI: 10.7544/issn1000-1239.20220493 |
[4] | Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo. A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks[J]. Journal of Computer Research and Development, 2020, 57(10): 2209-2220. DOI: 10.7544/issn1000-1239.2020.20200453 |
[5] | Hai Mo, Zhu Jianming. A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks[J]. Journal of Computer Research and Development, 2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419 |
[6] | He Yunhua, Li Mengru, Li Hong, Sun Limin, Xiao Ke, Yang Chao. A Blockchain Based Incentive Mechanism for Crowdsensing Applications[J]. Journal of Computer Research and Development, 2019, 56(3): 544-554. DOI: 10.7544/issn1000-1239.2019.20170670 |
[7] | He Haiwu, Yan An, Chen Zehua. Survey of Smart Contract Technology and Application Based on Blockchain[J]. Journal of Computer Research and Development, 2018, 55(11): 2452-2466. DOI: 10.7544/issn1000-1239.2018.20170658 |
[8] | Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li. Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2018, 55(7): 1359-1370. DOI: 10.7544/issn1000-1239.2018.20180080 |
[9] | Wang Bo, Huang Chuanhe, Yang Wenzhong, Dan Feng, and Xu Liya. An Incentive-Cooperative Forwarding Model Based on Punishment Mechanism in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 398-406. |
[10] | Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397. |
1. |
李硕,王馨爽. 多场景融合的码号数据分发架构及关键技术研究. 数据通信. 2024(06): 1-3+11 .
![]() | |
2. |
俞惠芳,李磊. 基于椭圆曲线签密的跨链医疗数据共享方案. 通信学报. 2024(12): 57-66 .
![]() |