Skip to main content
Top

2024 | OriginalPaper | Chapter

MaREA: Multi-class Random Forest for Automotive Intrusion Detection

Authors : Danilo Caivano, Christian Catalano, Mirko De Vincentiis, Alfred Lako, Alessandro Pagano

Published in: Product-Focused Software Process Improvement

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The technology inside modern vehicles is rapidly growing and poses newer security risks, as vehicle communication protocols are not yet fully secured and vulnerable to attacks. Consequently, the implementation of automotive cybersecurity systems has gained more attention. Controller Area Network (CAN) is one of the most studied communication protocols in the literature and lacks inherent cybersecurity measures. Several works proposed Intrusion Detection Systems (IDSs) using Machine Learning (ML) and Deep Learning (DL) algorithms to identify attacks on the CAN bus. Exploiting ML or DL techniques in a multi-class approach makes it possible to know the attack typology and to support developers’ decisions to integrate concrete design methods in the software automotive development life-cycle. However, most automotive IDSs are tested on data sets that contain raw CAN messages without the possibility of decoding these messages to understand how the attack was generated. Based on these gaps, a Multi-class Random Forest for Automotive Intrusion Detection (MaREA) is presented, and a new Synthetic Automotive Hacking Dataset (SA-Hacking Dataset) is generated with a Database for CAN (DBC) file. First, the model is validated on the Car-Hacking dataset and compared with two other works in the literature that used the same classifier and dataset for the multi-class approach. Then, the Random Forest model is tested by concatenating the Survival Analysis Dataset and the SA-Hacking Dataset. The proposed approach presented better-quality results for both the Car-Hacking dataset and the aforementioned concatenated dataset.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
6.
go back to reference Alfardus, A., Rawat, D.B.: Intrusion detection system for can bus in-vehicle network based on machine learning algorithms. In: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0944–0949. IEEE (2021) Alfardus, A., Rawat, D.B.: Intrusion detection system for can bus in-vehicle network based on machine learning algorithms. In: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0944–0949. IEEE (2021)
8.
go back to reference Baldassarre, M.T., Barletta, V.S., Caivano, D., Piccinno, A.: A visual tool for supporting decision-making in privacy oriented software development. In: Proceedings of the International Conference on Advanced Visual Interfaces. AVI 2020, Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3399715.3399818 Baldassarre, M.T., Barletta, V.S., Caivano, D., Piccinno, A.: A visual tool for supporting decision-making in privacy oriented software development. In: Proceedings of the International Conference on Advanced Visual Interfaces. AVI 2020, Association for Computing Machinery, New York, NY, USA (2020). https://​doi.​org/​10.​1145/​3399715.​3399818
9.
go back to reference Baldassarre, M.T., Barletta, V.S., Caivano, D., Piccinno, A.: Integrating security and privacy in HCD-scrum. In: CHItaly 2021: 14th Biannual Conference of the Italian SIGCHI Chapter. CHItaly 2021, Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3464385.3464746 Baldassarre, M.T., Barletta, V.S., Caivano, D., Piccinno, A.: Integrating security and privacy in HCD-scrum. In: CHItaly 2021: 14th Biannual Conference of the Italian SIGCHI Chapter. CHItaly 2021, Association for Computing Machinery, New York, NY, USA (2021). https://​doi.​org/​10.​1145/​3464385.​3464746
10.
go back to reference Barletta, V.S., Caivano, D., Catalano, C., De Vincentiis, M., Pal, A.: Machine learning for automotive security in technology transfer. In: Information Systems and Technologies - WorldCIST 2023 (2023) Barletta, V.S., Caivano, D., Catalano, C., De Vincentiis, M., Pal, A.: Machine learning for automotive security in technology transfer. In: Information Systems and Technologies - WorldCIST 2023 (2023)
13.
go back to reference Barletta, V.S., Cassano, F., Pagano, A., Piccinno, A.: New perspectives for cyber security in software development: when end-user development meets artificial intelligence. In: 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp. 531–534. IEEE (2022) Barletta, V.S., Cassano, F., Pagano, A., Piccinno, A.: New perspectives for cyber security in software development: when end-user development meets artificial intelligence. In: 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp. 531–534. IEEE (2022)
14.
go back to reference Bosch: CAN Specification Version 2.0. Robert Bosch GmbH, Postfach 50 (1991) Bosch: CAN Specification Version 2.0. Robert Bosch GmbH, Postfach 50 (1991)
15.
go back to reference Bozdal, M., Samie, M., Aslam, S., Jennions, I.: Evaluation of can bus security challenges. Sensors 20(8), 2364 (2020)CrossRef Bozdal, M., Samie, M., Aslam, S., Jennions, I.: Evaluation of can bus security challenges. Sensors 20(8), 2364 (2020)CrossRef
16.
go back to reference Breiman, L.: Random forests 45(1), 5–32 (2001) Breiman, L.: Random forests 45(1), 5–32 (2001)
17.
go back to reference Buscemi, A., Turcanu, I., Castignani, G., Crunelle, R., Engel, T.: CANmatch: a fully automated tool for can bus reverse engineering based on frame matching. IEEE Trans. Veh. Technol. 70(12), 12358–12373 (2021)CrossRef Buscemi, A., Turcanu, I., Castignani, G., Crunelle, R., Engel, T.: CANmatch: a fully automated tool for can bus reverse engineering based on frame matching. IEEE Trans. Veh. Technol. 70(12), 12358–12373 (2021)CrossRef
18.
go back to reference Catalano, C., Afrune, P., Angelelli, M., Maglio, G., Striani, F., Tommasi, F.: Security testing reuse enhancing active cyber defence in public administration. In: ITASEC, pp. 120–132 (2021) Catalano, C., Afrune, P., Angelelli, M., Maglio, G., Striani, F., Tommasi, F.: Security testing reuse enhancing active cyber defence in public administration. In: ITASEC, pp. 120–132 (2021)
19.
go back to reference Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: USENIX Security Symposium, vol. 40, pp. 911–27 (2016) Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: USENIX Security Symposium, vol. 40, pp. 911–27 (2016)
20.
go back to reference De Vincentiis, M., Cassano, F., Pagano, A., Piccinno, A.: QAI4ASE: quantum artificial intelligence for automotive software engineering. In: Proceedings of the 1st International Workshop on Quantum Programming for Software Engineering, pp. 19–21. QP4SE 2022, Association for Computing Machinery, New York, NY, USA (2022) De Vincentiis, M., Cassano, F., Pagano, A., Piccinno, A.: QAI4ASE: quantum artificial intelligence for automotive software engineering. In: Proceedings of the 1st International Workshop on Quantum Programming for Software Engineering, pp. 19–21. QP4SE 2022, Association for Computing Machinery, New York, NY, USA (2022)
21.
go back to reference El-Rewini, Z., Sadatsharan, K., Selvaraj, D.F., Plathottam, S.J., Ranganathan, P.: Cybersecurity challenges in vehicular communications. Veh. Commun. 23, 100214 (2020) El-Rewini, Z., Sadatsharan, K., Selvaraj, D.F., Plathottam, S.J., Ranganathan, P.: Cybersecurity challenges in vehicular communications. Veh. Commun. 23, 100214 (2020)
22.
go back to reference Gundu, R., Maleki, M.: Securing CAN bus in connected and autonomous vehicles using supervised machine learning approaches. In: 2022 IEEE International Conference on Electro Information Technology (EIT), pp. 042–046. IEEE (2022) Gundu, R., Maleki, M.: Securing CAN bus in connected and autonomous vehicles using supervised machine learning approaches. In: 2022 IEEE International Conference on Electro Information Technology (EIT), pp. 042–046. IEEE (2022)
23.
go back to reference Han, M.L., Kwak, B.I., Kim, H.K.: Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh. Commun. 14, 52–63 (2018) Han, M.L., Kwak, B.I., Kim, H.K.: Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh. Commun. 14, 52–63 (2018)
24.
go back to reference Hossain, M.D., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: LSTM-based intrusion detection system for in-vehicle can bus communications. IEEE Access 8, 185489–185502 (2020)CrossRef Hossain, M.D., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: LSTM-based intrusion detection system for in-vehicle can bus communications. IEEE Access 8, 185489–185502 (2020)CrossRef
25.
go back to reference Kalkan, S.C., Sahingoz, O.K.: In-vehicle intrusion detection system on controller area network with machine learning models. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–6 (2020) Kalkan, S.C., Sahingoz, O.K.: In-vehicle intrusion detection system on controller area network with machine learning models. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–6 (2020)
26.
go back to reference Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K.: Cybersecurity for autonomous vehicles: review of attacks and defense. Comput. Secur. 103, 102150 (2021)CrossRef Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K.: Cybersecurity for autonomous vehicles: review of attacks and defense. Comput. Secur. 103, 102150 (2021)CrossRef
27.
go back to reference Marchetti, M., Stabili, D.: READ: reverse engineering of automotive data frames. IEEE Trans. Inf. Forensics Secur. 14(4), 1083–1097 (2019)CrossRef Marchetti, M., Stabili, D.: READ: reverse engineering of automotive data frames. IEEE Trans. Inf. Forensics Secur. 14(4), 1083–1097 (2019)CrossRef
28.
go back to reference Martínez-Cruz, A., Ramírez-Gutiérrez, K.A., Feregrino-Uribe, C., Morales-Reyes, A.: Security on in-vehicle communication protocols: issues, challenges, and future research directions. Comput. Commun. 180, 1–20 (2021)CrossRef Martínez-Cruz, A., Ramírez-Gutiérrez, K.A., Feregrino-Uribe, C., Morales-Reyes, A.: Security on in-vehicle communication protocols: issues, challenges, and future research directions. Comput. Commun. 180, 1–20 (2021)CrossRef
29.
go back to reference Miller, C., Valasek, C.: Adventures in automotive networks and control units. Def Con 21(260–264), 15–31 (2013) Miller, C., Valasek, C.: Adventures in automotive networks and control units. Def Con 21(260–264), 15–31 (2013)
30.
go back to reference Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91), 1–91 (2015) Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91), 1–91 (2015)
31.
go back to reference Moulahi, T., Zidi, S., Alabdulatif, A., Atiquzzaman, M.: Comparative performance evaluation of intrusion detection based on machine learning in in-vehicle controller area network bus. IEEE Access 9, 99595–99605 (2021)CrossRef Moulahi, T., Zidi, S., Alabdulatif, A., Atiquzzaman, M.: Comparative performance evaluation of intrusion detection based on machine learning in in-vehicle controller area network bus. IEEE Access 9, 99595–99605 (2021)CrossRef
33.
go back to reference Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)MathSciNetMATH Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)MathSciNetMATH
34.
go back to reference Rajapaksha, S., Kalutarage, H., Al-Kadri, M.O., Petrovski, A., Madzudzo, G., Cheah, M.: Ai-based intrusion detection systems for in-vehicle networks: a survey. ACM Comput. Surv. 55(11), 1–40 (2023)CrossRef Rajapaksha, S., Kalutarage, H., Al-Kadri, M.O., Petrovski, A., Madzudzo, G., Cheah, M.: Ai-based intrusion detection systems for in-vehicle networks: a survey. ACM Comput. Surv. 55(11), 1–40 (2023)CrossRef
35.
go back to reference Seo, E., Song, H.M., Kim, H.K.: GIDS: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–6 (2018) Seo, E., Song, H.M., Kim, H.K.: GIDS: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–6 (2018)
37.
go back to reference Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020) Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)
38.
go back to reference Stabili, D., Ferretti, L., Andreolini, M., Marchetti, M.: DAGA: detecting attacks to in-vehicle networks via n-gram analysis. IEEE Trans. Veh. Technol. 71(11), 11540–11554 (2022)CrossRef Stabili, D., Ferretti, L., Andreolini, M., Marchetti, M.: DAGA: detecting attacks to in-vehicle networks via n-gram analysis. IEEE Trans. Veh. Technol. 71(11), 11540–11554 (2022)CrossRef
39.
go back to reference Venturi, A., Stabili, D., Pollicino, F., Bianchi, E., Marchetti, M.: Comparison of machine learning-based anomaly detectors for controller area network. In: 2022 IEEE 21st International Symposium on Network Computing and Applications (NCA), vol. 21, pp. 81–88. IEEE (2022) Venturi, A., Stabili, D., Pollicino, F., Bianchi, E., Marchetti, M.: Comparison of machine learning-based anomaly detectors for controller area network. In: 2022 IEEE 21st International Symposium on Network Computing and Applications (NCA), vol. 21, pp. 81–88. IEEE (2022)
40.
go back to reference Yang, L., Moubayed, A., Hamieh, I., Shami, A.: Tree-based intelligent intrusion detection system in internet of vehicles. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019) Yang, L., Moubayed, A., Hamieh, I., Shami, A.: Tree-based intelligent intrusion detection system in internet of vehicles. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)
Metadata
Title
MaREA: Multi-class Random Forest for Automotive Intrusion Detection
Authors
Danilo Caivano
Christian Catalano
Mirko De Vincentiis
Alfred Lako
Alessandro Pagano
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-49269-3_3

Premium Partner