Multi-attack and multi-classification intrusion detection for vehicle-mounted networks based on mosaic-coded convolutional neural network.

Sci Rep

Fujian Provincial Key Laboratory of Information Processing and Intelligent Control, Minjiang University, Fuzhou, China.

Published: April 2022

With the development of Internet of vehicles, the information exchange between vehicles and the outside world results in a higher risk of external network attacks to the vehicles. The attack modes to the most widely used vehicle-mounted CAN bus are complex and diverse, but most of the intrusion detection approaches proposed by now can only detect one type of attack at a time. Aiming at detecting multi-types of attacks using a single model, we proposed a detection method based on the Mosaic-coded convolution neural network for intrusions containing various combinations of attacks with multi-classification capability. A Mosaic-like two-dimensional data grid was created from the one-dimensional CAN ID for the CNN to effectively extract the data features and maintain the time connections between the CAN IDs. Four types of attacks and all possible combinations of them were used to train and test our model. The autoencoder was also used to reduce the dimensionality of the data so as to cut down the model's complexity. Experimental results showed that the proposed method was effective in detecting all types of attack combinations with high and stable multi-classification ability.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9012766PMC
http://dx.doi.org/10.1038/s41598-022-10200-4DOI Listing

Publication Analysis

Top Keywords

intrusion detection
8
based mosaic-coded
8
neural network
8
multi-attack multi-classification
4
multi-classification intrusion
4
detection vehicle-mounted
4
vehicle-mounted networks
4
networks based
4
mosaic-coded convolutional
4
convolutional neural
4

Similar Publications

Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. As IoT, AI, and 5G endure to unite and understand the potential of Industry 4.0, security events and incidents on IoT systems have been enlarged.

View Article and Find Full Text PDF

The network intrusion detection system (NIDS) plays a critical role in maintaining network security. However, traditional NIDS relies on a large volume of samples for training, which exhibits insufficient adaptability in rapidly changing network environments and complex attack methods, especially when facing novel and rare attacks. As attack strategies evolve, there is often a lack of sufficient samples to train models, making it difficult for traditional methods to respond quickly and effectively to new threats.

View Article and Find Full Text PDF

Unveiling urinary extracellular vesicle mRNA signature for early diagnosis and prognosis of bladder cancer.

Theranostics

January 2025

State Key Laboratory of Medicinal Chemical Biology, Tianjin Key Laboratory of Molecular Recognition and Biosensing, Frontiers Science Center for New Organic Matter, College of Chemistry, Nankai University, Tianjin 300071, China.

Bladder cancer (BC) ranks as one of the most prevalent cancers. Its early diagnosis is clinically essential but remains challenging due to the lack of reliable biomarkers. Extracellular vesicles (EVs) carry abundant biological cargoes from parental cells, rendering them as promising cancer biomarkers.

View Article and Find Full Text PDF

The application of artificial neural networks (ANNs) can be found in numerous fields, including image and speech recognition, natural language processing, and autonomous vehicles. As well, intrusion detection, the subject of this paper, relies heavily on it. Different intrusion detection models have been constructed using ANNs.

View Article and Find Full Text PDF

Smart devices are enabled via the Internet of Things (IoT) and are connected in an uninterrupted world. These connected devices pose a challenge to cybersecurity systems due attacks in network communications. Such attacks have continued to threaten the operation of systems and end-users.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!