Skip to main content

Real-Time Intrusion Detection in Automotive Cyber-Physical Systems with Recurrent Autoencoders

  • Chapter
  • First Online:
Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems

Abstract

Modern vehicles consist of several powerful embedded systems called Electronic Control Units (ECUs), which control different subsystems in the vehicle. The increasing efforts to make vehicles fully autonomous have led to high reliance on information from various external sources, which made the ECUs in the vehicles highly vulnerable to various cyber-attacks. Therefore, it is essential to have a robust detection system in vehicles that can detect various cyber-attacks. To address this issue, in this chapter, we present a novel deep learning-based intrusion detection framework called INDRA that utilizes a Gated Recurrent Unit (GRU) based recurrent autoencoder network to detect various cyber-attacks in automotive cyber-physical systems. Moreover, the INDRA framework is evaluated under different attack scenarios and compared against various state-of-the-art intrusion detection works using a commercially available in-vehicle network dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kukkala, V.K., Bradley, T., Pasricha, S.: Priority-based multi-level monitoring of signal integrity in a distributed powertrain control system. In: Proceedings of IFAC Workshop on Engine and Powertrain Control, Simulation and Modeling (2015)

    Google Scholar 

  2. Kukkala, V.K., Bradley, T., Pasricha, S.: Uncertainty analysis and propagation for an auxiliary power module. In: Proceedings of IEEE Transportation Electrification Conference (TEC) (2017)

    Google Scholar 

  3. Kukkala, V.K., Pasricha, S., Bradley, T.: JAMS: Jitter-aware message scheduling for flexray automotive networks. In: Proceedings of IEEE/ACM International Symposium on Network-on-Chip (NOCS) (2017)

    Google Scholar 

  4. Kukkala, V.K., Pasricha, S., Bradley, T.: JAMS-SG: A framework for jitter-aware message scheduling for time-triggered automotive networks. ACM Trans. Design Autom. Electron. Syst. (TODAES). 24(6) (2019)

    Google Scholar 

  5. Kukkala, V., Pasricha, S., Bradley, T.: SEDAN: Security-aware design of time-critical automotive networks. IEEE Trans. Vehic. Technol. (TVT). 69(8) (2020)

    Google Scholar 

  6. Kukkala, V.K., Thiruloga, S.V., Pasricha, S.: INDRA: Intrusion detection using recurrent autoencoders in automotive embedded systems. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. (TCAD). 39(11) (2020)

    Google Scholar 

  7. Kukkala, V.K., Thiruloga, S.V., Pasricha, S.: LATTE: LSTM self-attention based anomaly detection in embedded automotive platforms. ACM Trans. Embed. Comput. Syst. (TECS). 20(5s), Article 67 (2021)

    Google Scholar 

  8. Thiruloga, S.V., Kukkala, V.K., Pasricha, S.: TENET: Temporal CNN with attention for anomaly detection in automotive cyber-physical systems. In: Proceedings of IEEE/ACM Asia & South Pacific Design Automation Conference (ASPDAC) (2022)

    Google Scholar 

  9. Kukkala, V.K., Thiruloga, S.V., Pasricha, S.: Roadmap for cybersecurity in autonomous vehicles. In: IEEE Consum. Electron. Magaz. (CEM) (2022)

    Google Scholar 

  10. Tunnell, J., Asher, Z., Pasricha, S., Bradley, T.H.: Towards improving vehicle fuel economy with ADAS. SAE Int. J. Connect. Autom. Veh. 1(2) (2018)

    Google Scholar 

  11. Tunnell, J., Asher, Z., Pasricha, S., Bradley, T.H.: Towards improving vehicle fuel economy with ADAS. In: Proceedings of SAE World Congress Experience (WCX) (2018)

    Google Scholar 

  12. Asher, Z., Tunnell, J., Baker, D.A., Fitzgerald, R.J., Banaei-Kashani, F., Pasricha, S., Bradley, T.H.: Enabling prediction for optimal fuel economy vehicle control. In: Proceedings of SAE World Congress Experience (WCX) (2018)

    Google Scholar 

  13. Dey, J., Taylor, W., Pasricha, S.: VESPA: A framework for optimizing heterogeneous sensor placement and orientation for autonomous vehicles. IEEE Consum. Electron. Magaz. (CEM). 10(2) (2021)

    Google Scholar 

  14. Kukkala, V.K., Pasricha, S., Bradley, T.: Advanced driver-assistance systems: A path toward autonomous vehicles. IEEE Consum. Electron. Magaz. 7(5) (2018)

    Google Scholar 

  15. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of IEEE Symposium on Security and Privacy (SP) (2010)

    Google Scholar 

  16. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015)

    Google Scholar 

  17. Izosimov, V., Asvestopoulos, A., Blomkvist, O., Törngren, M.: Security-aware development of cyber-physical systems illustrated with automotive case study. In: Proceedings of IEEE/ACM Design, Automation & Test in Europe & Exhibition (DATE) (2016)

    Google Scholar 

  18. Studnia, I., Alata, E., Nicomette, V., Kaâniche, M., Laarouchi, Y.: A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. (IJES). 10(8) (2018)

    Google Scholar 

  19. Marchetti, M., Stabili, D.: Anomaly detection of CAN bus messages through analysis of ID sequences. In: Proceedings of IEEE Intelligent Vehicle Symposium (IV) (2017)

    Google Scholar 

  20. Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks- practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1) (2011)

    Google Scholar 

  21. Larson, U.E., Nilsson, D.K., Jonsson, E.: An approach to specification-based attack detection for in-vehicle networks. In: Proceedings of IEEE Intelligent Vehicles Symposium (IV) (2008)

    Google Scholar 

  22. Aldwairi, M., Abu-Dalo, A.M., Jarrah, M.: Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework. EURASIP J. Inf. Secur. 1 (2017)

    Google Scholar 

  23. Myers, E.W.: An O(ND) difference algorithm and its variations. Algorithmica (1986)

    Google Scholar 

  24. Hoppe, T., Kiltz, S., Dittmann, J.: Applying intrusion detection to automotive IT-early insights and remaining challenges. J. Inf. Assur. Secur. (JIAS). 4(6) (2009)

    Google Scholar 

  25. Waszecki, P., Mundhenk, P., Steinhorst, S., Lukasiewycz, M., Karri, R., Chakraborty, S.: Automotive electrical and electronic architecture security via distributed in-vehicle traffic monitoring. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. (TCAD). 36(11) (2017)

    Google Scholar 

  26. Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of USENIX (2016)

    Google Scholar 

  27. Ying, X., Sagong, S.U., Clark, A., Bushnell, L., Poovendran, R.: Shape of the Cloak: Formal analysis of clock skew-based intrusion detection system in controller area networks. IEEE Trans. Inf. Forensics Secur. (TIFS). 14(9) (2019)

    Google Scholar 

  28. Yoon, M.K., Mohan, S., Choi, J., Sha, L.: Memory heat map: Anomaly detection in real-time embedded systems using memory behavior. In: Proceedings of IEEE/ACM/EDAC Design Automation Conference (DAC) (2015)

    Google Scholar 

  29. Müter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: Proceedings of IEEE Intelligent Vehicles Symposium (IV) (2011)

    Google Scholar 

  30. Müter, M., Groll, A., Freiling, F.C.: A structured approach to anomaly detection for in-vehicle networks. In: Proceedings of IEEE International Conference on Intelligent and Advanced System (ICIAS) (2010)

    Google Scholar 

  31. Taylor, A., Japkowicz, N., Leblanc, S.: Frequency-based anomaly detection for the automotive CAN bus. In: Proceedings of World Congress on Industrial Control Systems Security (WCICSS) (2015)

    Google Scholar 

  32. Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Car hacking identification through fuzzy logic algorithms. In: Proceedings of IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2017)

    Google Scholar 

  33. Vuong, T.P., Loukas, G., Gan, D.: Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: Proc. of IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) (2015)

    Google Scholar 

  34. Levi, M., Allouche, Y., Kontorovich, A.: Advanced analytics for connected car cybersecurity. In: Proceedings of IEEE Vehicular Technology Conference (VTC) (2018)

    Google Scholar 

  35. Kang, M.J., Kang, J.W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: IEEE Proceedings of Vehicular Technology Conference (VTC) (2016)

    Google Scholar 

  36. Hanselmann, M., Strauss, T., Dormann, K., Ulmer, H.: CANet: An unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access. (2020)

    Google Scholar 

  37. Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access. (2018)

    Google Scholar 

  38. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: Proceedings of IEEE International Conference on Data Science and Advanced Analytics (DSAA) (2016)

    Google Scholar 

  39. Weber, M., Wolf, G., Sax, E., Zimmer, B.: Online detection of anomalies in vehicle signals using replicator neural networks. In: Proceedings of ESCAR USA (2018)

    Google Scholar 

  40. Weber, M., Klug, S., Sax, E., Zimmer, B.: Embedded hybrid anomaly detection for automotive can communication. In: Embedded Real Time Software and Systems (ERTS) (2018)

    Google Scholar 

  41. Schmidhuber, J.: Habilitation Thesis: System Modeling and Optimization (1993)

    Google Scholar 

  42. Hochreiter, S., Bengio, Y., Frasconi, P., Schmidhuber, J.: Gradient Flow in Recurrent Nets: The Difficulty of Learning Long-Term Dependencies. IEEE Press (2001)

    Google Scholar 

  43. Cho, K., Van Merriënboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv Preprint, arXiv:1406.1078, 2014

    Google Scholar 

  44. DiDomenico, G.C, Bair, J., Kukkala, V.K, Tunnell, J., Peyfuss, M., Kraus, M., Ax, J., Lazarri, J., Munin, M., Cooke, C., Christensen, E.: Colorado State University EcoCAR 3 final technical report. In: SAE World Congress Experience (WCX) (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vipin Kumar Kukkala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kukkala, V.K., Thiruloga, S.V., Pasricha, S. (2023). Real-Time Intrusion Detection in Automotive Cyber-Physical Systems with Recurrent Autoencoders. In: Kukkala, V.K., Pasricha, S. (eds) Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems. Springer, Cham. https://doi.org/10.1007/978-3-031-28016-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28016-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28015-3

  • Online ISBN: 978-3-031-28016-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics