Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet

Authors
Han, Mee LanKwak, Byung IlKim, Huy Kang
Issue Date
1-Jan-2023
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Intrusion detection system; in-vehicle network; automotive ethernet; deep learning; wavelet transform; data reduction
Citation
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.18, pp 411 - 422
Pages
12
Indexed
SCIE
SCOPUS
Journal Title
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Volume
18
Start Page
411
End Page
422
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/190028
DOI
10.1109/TIFS.2022.3221893
ISSN
1556-6013
1556-6021
Abstract
Devices that ensure vehicle and driver safety or provide services to drivers generate a substantial amount of network traffic. The traffic is transmitted to the In-Vehicle Network (IVN) depending on the defined function. Consequently, to quickly process a lot of traffic transmitted to the IVN, an advanced network protocol such as Automotive Ethernet is necessary. However, owing to the connectivity reinforcement between devices inside a vehicle and external networks, attack vectors and vulnerabilities can be easily inherited from an established Ethernet to Automotive Ethernet. The present study proposes a method for detecting and identifying abnormalities in Automotive Ethernet based on wavelet transform and deep convolutional neural network. First, we define attack scenarios and extract normal and abnormal data corresponding to these scenarios. Second, we conduct several preprocesses, such as fixing the packet size and normalizing the network image data. Finally, we conduct extensive evaluations of the proposed method's performance, considering the size of network image data and multi-resolution levels. The results demonstrate that the proposed method can effectively detect an abnormality. Furthermore, the results suggest that the our method is more effective in terms of time-cost compared to default ResNet and EfficientNet methods.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles
Graduate School > Department of Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Huy Kang photo

Kim, Huy Kang
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE