Towards a CAN IDS Based on a Neural Network Data Field Predictor

Krzysztof Pawelec, Robert A. Bridges, Frank L. Combs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Scopus citations

Abstract

Modern vehicles contain a few controller area networks (CANs), which allow scores of on-board electronic control units (ECUs) to communicate messages critical to vehicle functions and driver safety. CAN provides a lightweight and reliable broadcast protocol but is bereft of security features. As evidenced by many recent research works, CAN exploits are possible both remotely and with direct access, fueling a growing CAN intrusion detection system (IDS) body of research. A challenge for pioneering vehicle-agnostic IDSs is that passenger vehicles' CAN message encodings are proprietary, defined and held secret by original equipment manufacturers (OEMs). Targeting detection of next-generation attacks, in which messages are sent from the expected ECU at the expected time but with malicious content, researchers are now seeking to leverage "CAN data models'', which predict future CAN messages and use prediction error to identify anomalous, hopefully malicious CAN messages. Yet, current works model CAN signals post-translation, i.e., after applying OEM-donated or reverse-engineered translations from raw data. We present initial IDS results testing deep neural networks used to predict CAN data at the bit level, targeting IDS capabilities that avoiding reverse engineering proprietary encodings. Our results suggest the method is promising for data with signals exhibiting dependence on previous or concurrent inputs.

Original languageEnglish
Title of host publicationAutoSec 2019 - Proceedings of the ACM Workshop on Automotive Cybersecurity, co-located with CODASPY 2019
PublisherAssociation for Computing Machinery, Inc
Pages31-34
Number of pages4
ISBN (Electronic)9781450361804
DOIs
StatePublished - Mar 13 2019
Event2019 ACM Workshop on Automotive Cybersecurity, AutoSec 2019, co-located with CODASPY 2019 - Richardson, United States
Duration: Mar 27 2019 → …

Publication series

NameAutoSec 2019 - Proceedings of the ACM Workshop on Automotive Cybersecurity, co-located with CODASPY 2019

Conference

Conference2019 ACM Workshop on Automotive Cybersecurity, AutoSec 2019, co-located with CODASPY 2019
Country/TerritoryUnited States
CityRichardson
Period03/27/19 → …

Keywords

  • anomaly detection
  • can bus
  • controller area network
  • deep learning
  • in-vehicle security
  • intrusion detection
  • neural network

Fingerprint

Dive into the research topics of 'Towards a CAN IDS Based on a Neural Network Data Field Predictor'. Together they form a unique fingerprint.

Cite this