Abstract
The advent of Industry 4.0, characterized by the integration of digital technology into mechanical and electronic sectors, has led to the development of autonomous vehicles as a notable innovation. Despite their advanced driver assistance systems, these vehicles present potential security vulnerabilities, rendering them susceptible to cyberattacks. To address this, the study emphasized investigating these attack methodologies, underlining the need for robust safeguarding strategies for autonomous vehicles. Existing preventive or detection mechanisms encompass intrusion detection systems for Controller Area Networks and Vehicle-to-Vehicle communication, coupled with AI-driven attack identification. The critical role of artificial intelligence, specifically machine learning and deep learning subdomains, was emphasized, given their ability to dissect vehicular communications for attack detection. In this study, a mini autonomous vehicle served as the test environment, where the network was initially scanned, followed by the execution of Man-in-the-Middle, Deauthentication, DDoS, and Replay attacks. Network traffic was logged across all stages, enabling a comprehensive analysis of the attack impacts. Utilizing these recorded network packets, an AI system was trained to develop an attack detection mechanism. The resultant AI model was tested by transmitting new network packets, and its detection efficiency was subsequently evaluated. The study confirmed successful identification of the attacks, signifying the effectiveness of the AI-based model. Though the focus remained on autonomous vehicles, the study proposes that the derived methodology can be extended to other IoT systems, adhering to the steps delineated herein.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K.: Cybersecurity for autonomous vehicles: review of attacks and defense. Comput. Secur. 103, 102150 (2021)
Nie, S., Liu, L., Du, Y.: Free-fall: hacking tesla from wireless to can bus. Briefing, Black Hat USA 25, 1–16 (2017)
Lee, Y., Woo, S.: CAN Signal Extinction-based DoS Attack on In-Vehicle Network. Secur. Commun. Netw. 2022 (2022)
Fowler, D.S., Bryans, J., Cheah, M., Wooderson, P., Shaikh, S.A.: A method for constructing automotive cybersecurity tests, a CAN fuzz testing example. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 1–8. IEEE (2019)
Lim, B.S., Keoh, S.L., Thing, V.L.: Autonomous vehicle ultrasonic sensor vulnerability and impact assessment. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) (pp. 231–236). IEEE (2018)
Jakobsen, S.B., Knudsen, K.S., Andersen, B.: Analysis of sensor attacks against autonomous vehicles. In: 25th International Symposium on Wireless Personal Multimedia Communications. IEEE (2022)
Eriksson, B., Groth, J., Sabelfeld, A.: On the road with third-party apps: security analysis of an in-vehicle app platform. In: VEHITS, pp. 64–75 (2019)
Cai, Z., Wang, A., Zhang, W., Gruffke, M., Schweppe, H.: 0-days & mitigations: roadways to exploit and secure connected BMW cars. Black Hat USA 2019, 39 (2019)
Zoppelt, M., Kolagari, R.T.: UnCle SAM: modeling cloud attacks with the automotive security abstraction model. Cloud Comput. 67–72 (2019)
Maple, C., Bradbury, M., Le, A.T., Ghirardello, K.: A connected and autonomous vehicle reference architecture for attack surface analysis. Appl. Sci. 9(23), 5101 (2019)
Miller, C., Valasek, C.:. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015(S 91), 1–91 (2015)
Miller, C.: Lessons learned from hacking a car. IEEE Design & Test 36(6), 7–9 (2019)
Woo, S., Moon, D., Youn, T.Y., Lee, Y., Kim, Y.: Can id shuffling technique (cist): moving target defense strategy for protecting in-vehicle can. IEEE Access 7, 15521–15536 (2019)
Shrestha, R., Nam, S.Y.: Regional blockchain for vehicular networks to prevent 51% attacks. IEEE Access 7, 95033–95045 (2019)
Nasser, A., Ma, D.: Defending AUTOSAR safety critical systems against code reuse attacks. In: Proceedings of the ACM Workshop on Automotive Cybersecurity, pp. 15–18 (2019)
Zhang, L., Ma, D.: A hybrid approach toward efficient and accurate intrusion detection for in-vehicle networks. IEEE Access 10, 10852–10866 (2022)
Zhou, J., Joshi, P., Zeng, H., Li, R.: Btmonitor: bit-time-based intrusion detection and attacker identification in controller area network. ACM Trans. Embed. Comput. Syst. (TECS) 18(6), 1–23 (2019)
Olufowobi, H., Hounsinou, S., Bloom, G.: Controller area network intrusion prevention system leveraging fault recovery. In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, pp. 63–73 (2019)
Hamad, M., Tsantekidis, M., Prevelakis, V.: Red-Zone: Towards an intrusion response framework for intra-vehicle system. In: VEHITS, pp. 148–158 (2019)
Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)
Tang, F., Kawamoto, Y., Kato, N., Liu, J.: Future intelligent and secure vehicular network toward 6G: Machine-learning approaches. Proc. IEEE 108(2), 292–307 (2019)
Ahmad, U., Song, H., Bilal, A., Alazab, M., Jolfaei, A.: Securing smart vehicles from relay attacks using machine learning. J. Supercomput. 76, 2665–2682 (2020)
Gundu, R., Maleki, M.: Securing CAN bus in connected and autonomous vehicles using supervised machine learning approaches. In: 2022 IEEE International Conference on Electro Information Technology (eIT), pp. 042–046. IEEE (2022)
Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R.: BDEdge: blockchain and deep-learning for secure edge-envisioned green CAVs. IEEE Trans. Green Commun. Netw. 6(3), 1330–1339 (2022)
Alsulami, A.A., Abu Al-Haija, Q., Alqahtani, A., Alsini, R.: Symmetrical simulation scheme for anomaly detection in autonomous vehicles based on LSTM model. Symmetry 14(7), 1450 (2022)
Özgür, A.: Classifier selection in resource limited hardware: decision analysis and resolution approach. J. Intell. Syst. Theory Appl. 4(1), 37–42 (2021). https://doi.org/10.38016/jista.755419
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Onur, F., Barışkan, M.A., Gönen, S., Kubat, C., Tunay, M., Yılmaz, E.N. (2024). Detection of Cyber Attacks Targeting Autonomous Vehicles Using Machine Learning. In: Şen, Z., Uygun, Ö., Erden, C. (eds) Advances in Intelligent Manufacturing and Service System Informatics. IMSS 2023. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-6062-0_40
Download citation
DOI: https://doi.org/10.1007/978-981-99-6062-0_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-6061-3
Online ISBN: 978-981-99-6062-0
eBook Packages: EngineeringEngineering (R0)