Skip to main content

Detection of Cyber Attacks Targeting Autonomous Vehicles Using Machine Learning

  • Conference paper
  • First Online:
Advances in Intelligent Manufacturing and Service System Informatics (IMSS 2023)

Abstract

The advent of Industry 4.0, characterized by the integration of digital technology into mechanical and electronic sectors, has led to the development of autonomous vehicles as a notable innovation. Despite their advanced driver assistance systems, these vehicles present potential security vulnerabilities, rendering them susceptible to cyberattacks. To address this, the study emphasized investigating these attack methodologies, underlining the need for robust safeguarding strategies for autonomous vehicles. Existing preventive or detection mechanisms encompass intrusion detection systems for Controller Area Networks and Vehicle-to-Vehicle communication, coupled with AI-driven attack identification. The critical role of artificial intelligence, specifically machine learning and deep learning subdomains, was emphasized, given their ability to dissect vehicular communications for attack detection. In this study, a mini autonomous vehicle served as the test environment, where the network was initially scanned, followed by the execution of Man-in-the-Middle, Deauthentication, DDoS, and Replay attacks. Network traffic was logged across all stages, enabling a comprehensive analysis of the attack impacts. Utilizing these recorded network packets, an AI system was trained to develop an attack detection mechanism. The resultant AI model was tested by transmitting new network packets, and its detection efficiency was subsequently evaluated. The study confirmed successful identification of the attacks, signifying the effectiveness of the AI-based model. Though the focus remained on autonomous vehicles, the study proposes that the derived methodology can be extended to other IoT systems, adhering to the steps delineated herein.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K.: Cybersecurity for autonomous vehicles: review of attacks and defense. Comput. Secur. 103, 102150 (2021)

    Article  Google Scholar 

  2. Nie, S., Liu, L., Du, Y.: Free-fall: hacking tesla from wireless to can bus. Briefing, Black Hat USA 25, 1–16 (2017)

    Google Scholar 

  3. Lee, Y., Woo, S.: CAN Signal Extinction-based DoS Attack on In-Vehicle Network. Secur. Commun. Netw. 2022 (2022)

    Google Scholar 

  4. Fowler, D.S., Bryans, J., Cheah, M., Wooderson, P., Shaikh, S.A.: A method for constructing automotive cybersecurity tests, a CAN fuzz testing example. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 1–8. IEEE (2019)

    Google Scholar 

  5. Lim, B.S., Keoh, S.L., Thing, V.L.: Autonomous vehicle ultrasonic sensor vulnerability and impact assessment. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) (pp. 231–236). IEEE (2018)

    Google Scholar 

  6. Jakobsen, S.B., Knudsen, K.S., Andersen, B.: Analysis of sensor attacks against autonomous vehicles. In: 25th International Symposium on Wireless Personal Multimedia Communications. IEEE (2022)

    Google Scholar 

  7. Eriksson, B., Groth, J., Sabelfeld, A.: On the road with third-party apps: security analysis of an in-vehicle app platform. In: VEHITS, pp. 64–75 (2019)

    Google Scholar 

  8. Cai, Z., Wang, A., Zhang, W., Gruffke, M., Schweppe, H.: 0-days & mitigations: roadways to exploit and secure connected BMW cars. Black Hat USA 2019, 39 (2019)

    Google Scholar 

  9. Zoppelt, M., Kolagari, R.T.: UnCle SAM: modeling cloud attacks with the automotive security abstraction model. Cloud Comput. 67–72 (2019)

    Google Scholar 

  10. Maple, C., Bradbury, M., Le, A.T., Ghirardello, K.: A connected and autonomous vehicle reference architecture for attack surface analysis. Appl. Sci. 9(23), 5101 (2019)

    Article  Google Scholar 

  11. Miller, C., Valasek, C.:. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015(S 91), 1–91 (2015)

    Google Scholar 

  12. Miller, C.: Lessons learned from hacking a car. IEEE Design & Test 36(6), 7–9 (2019)

    Article  Google Scholar 

  13. Woo, S., Moon, D., Youn, T.Y., Lee, Y., Kim, Y.: Can id shuffling technique (cist): moving target defense strategy for protecting in-vehicle can. IEEE Access 7, 15521–15536 (2019)

    Article  Google Scholar 

  14. Shrestha, R., Nam, S.Y.: Regional blockchain for vehicular networks to prevent 51% attacks. IEEE Access 7, 95033–95045 (2019)

    Article  Google Scholar 

  15. Nasser, A., Ma, D.: Defending AUTOSAR safety critical systems against code reuse attacks. In: Proceedings of the ACM Workshop on Automotive Cybersecurity, pp. 15–18 (2019)

    Google Scholar 

  16. Zhang, L., Ma, D.: A hybrid approach toward efficient and accurate intrusion detection for in-vehicle networks. IEEE Access 10, 10852–10866 (2022)

    Article  Google Scholar 

  17. Zhou, J., Joshi, P., Zeng, H., Li, R.: Btmonitor: bit-time-based intrusion detection and attacker identification in controller area network. ACM Trans. Embed. Comput. Syst. (TECS) 18(6), 1–23 (2019)

    Article  Google Scholar 

  18. Olufowobi, H., Hounsinou, S., Bloom, G.: Controller area network intrusion prevention system leveraging fault recovery. In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, pp. 63–73 (2019)

    Google Scholar 

  19. Hamad, M., Tsantekidis, M., Prevelakis, V.: Red-Zone: Towards an intrusion response framework for intra-vehicle system. In: VEHITS, pp. 148–158 (2019)

    Google Scholar 

  20. Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)

    Google Scholar 

  21. Tang, F., Kawamoto, Y., Kato, N., Liu, J.: Future intelligent and secure vehicular network toward 6G: Machine-learning approaches. Proc. IEEE 108(2), 292–307 (2019)

    Article  Google Scholar 

  22. Ahmad, U., Song, H., Bilal, A., Alazab, M., Jolfaei, A.: Securing smart vehicles from relay attacks using machine learning. J. Supercomput. 76, 2665–2682 (2020)

    Article  Google Scholar 

  23. Gundu, R., Maleki, M.: Securing CAN bus in connected and autonomous vehicles using supervised machine learning approaches. In: 2022 IEEE International Conference on Electro Information Technology (eIT), pp. 042–046. IEEE (2022)

    Google Scholar 

  24. Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R.: BDEdge: blockchain and deep-learning for secure edge-envisioned green CAVs. IEEE Trans. Green Commun. Netw. 6(3), 1330–1339 (2022)

    Article  Google Scholar 

  25. Alsulami, A.A., Abu Al-Haija, Q., Alqahtani, A., Alsini, R.: Symmetrical simulation scheme for anomaly detection in autonomous vehicles based on LSTM model. Symmetry 14(7), 1450 (2022)

    Article  Google Scholar 

  26. Özgür, A.: Classifier selection in resource limited hardware: decision analysis and resolution approach. J. Intell. Syst. Theory Appl. 4(1), 37–42 (2021). https://doi.org/10.38016/jista.755419

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehmet Ali Barışkan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Onur, F., Barışkan, M.A., Gönen, S., Kubat, C., Tunay, M., Yılmaz, E.N. (2024). Detection of Cyber Attacks Targeting Autonomous Vehicles Using Machine Learning. In: Şen, Z., Uygun, Ö., Erden, C. (eds) Advances in Intelligent Manufacturing and Service System Informatics. IMSS 2023. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-6062-0_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-6062-0_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-6061-3

  • Online ISBN: 978-981-99-6062-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics