TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet
- Authors
- Han, Mee Lan; Kwak, Byung Il; Kim, Huy Kang
- Issue Date
- 1-Jan-2023
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Intrusion detection system; in-vehicle network; automotive ethernet; deep learning; wavelet transform; data reduction
- Citation
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.18, pp 411 - 422
- Pages
- 12
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
- Volume
- 18
- Start Page
- 411
- End Page
- 422
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/190028
- DOI
- 10.1109/TIFS.2022.3221893
- ISSN
- 1556-6013
1556-6021
- Abstract
- Devices that ensure vehicle and driver safety or provide services to drivers generate a substantial amount of network traffic. The traffic is transmitted to the In-Vehicle Network (IVN) depending on the defined function. Consequently, to quickly process a lot of traffic transmitted to the IVN, an advanced network protocol such as Automotive Ethernet is necessary. However, owing to the connectivity reinforcement between devices inside a vehicle and external networks, attack vectors and vulnerabilities can be easily inherited from an established Ethernet to Automotive Ethernet. The present study proposes a method for detecting and identifying abnormalities in Automotive Ethernet based on wavelet transform and deep convolutional neural network. First, we define attack scenarios and extract normal and abnormal data corresponding to these scenarios. Second, we conduct several preprocesses, such as fixing the packet size and normalizing the network image data. Finally, we conduct extensive evaluations of the proposed method's performance, considering the size of network image data and multi-resolution levels. The results demonstrate that the proposed method can effectively detect an abnormality. Furthermore, the results suggest that the our method is more effective in terms of time-cost compared to default ResNet and EfficientNet methods.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
- Graduate School > Department of Cyber Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.