{"title":"An Unsupervised Learning Approach for In-Vehicle Network Intrusion Detection","authors":"Nandi O. Leslie","doi":"10.1109/CISS50987.2021.9400233","DOIUrl":null,"url":null,"abstract":"In-vehicle networks remain largely unprotected from a myriad of vulnerabilities to failures caused by adversarial activities. Remote attacks on the SAE J1939 protocol based on controller access network (CAN) bus for heavy-duty ground vehicles can lead to detectable changes in the physical characteristics of the vehicle. In this paper, I develop an unsupervised learning approach to monitor the normal behavior within the CAN bus data and detect malicious traffic. The J1939 data packets have some text-based features that I convert to numerical values. In addition, I propose an algorithm based on hierarchical agglomerative clustering that considers multiple approaches for linkages and pairwise distances between observations. I present prediction performance results to show the effectiveness of this ensemble algorithm. In addition to in-vehicle network security, this algorithm is also transferrable to other cybersecurity datasets, including botnet attacks in traditional enterprise IP networks.","PeriodicalId":228112,"journal":{"name":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISS50987.2021.9400233","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In-vehicle networks remain largely unprotected from a myriad of vulnerabilities to failures caused by adversarial activities. Remote attacks on the SAE J1939 protocol based on controller access network (CAN) bus for heavy-duty ground vehicles can lead to detectable changes in the physical characteristics of the vehicle. In this paper, I develop an unsupervised learning approach to monitor the normal behavior within the CAN bus data and detect malicious traffic. The J1939 data packets have some text-based features that I convert to numerical values. In addition, I propose an algorithm based on hierarchical agglomerative clustering that considers multiple approaches for linkages and pairwise distances between observations. I present prediction performance results to show the effectiveness of this ensemble algorithm. In addition to in-vehicle network security, this algorithm is also transferrable to other cybersecurity datasets, including botnet attacks in traditional enterprise IP networks.