Abstract
5G and artificial intelligence greatly promote the development of intelligent and connected vehicle (ICV). However, ICV opens more ports to the outside world, making it easy for hackers to intrude controller area network (CAN) and control ICV. Therefore, many researchers design intrusion detection systems (IDSs) to detect vehicle intrusion in real-time. In this paper, we propose a highly camouflaged attack method called the same origin method execution (SOME) attack. The intrusion messages of this attack have the same characteristics as normal messages and can bypass most existing IDSs. To detect this attack, we design a reliable IDS for ICV based on a generative adversarial network (GAN) called GVIDS. It takes CAN messages as the input sample and trains the IDS model to distinguish the legality of messages. Experiments on two real vehicles show that GVIDS can detect most existing attacks, including spoofing, bus-off, masquerade, and SOME attacks. The average detection accuracy of GVIDS is 96.64%, and the average running time of each detection is only 0.18 ms. In addition, the experiment also shows that the detection performance of GVIDS is not affected by the value of identifiers in CAN messages.
| Original language | English |
|---|---|
| Pages (from-to) | 4310-4315 |
| Number of pages | 6 |
| Journal | Proceedings - IEEE Global Communications Conference, GLOBECOM |
| DOIs | |
| State | Published - 2022 |
| Event | 2022 IEEE Global Communications Conference, GLOBECOM 2022 - Rio de Janeiro, Brazil Duration: 4 Dec 2022 → 8 Dec 2022 |