Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks
The fifth-generation (5G) technology makes it widely applicable to connected vehicles. This would entail numerous transmitted data in communication networks and frequent information interactions between vehicles and other terminals, thus leading connected vehicles to be vulnerable to attacks from ex...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8386752/ |
id |
doaj-c9d768e0a73440188721f148ed72602e |
---|---|
record_format |
Article |
spelling |
doaj-c9d768e0a73440188721f148ed72602e2021-03-29T20:57:32ZengIEEEIEEE Access2169-35362018-01-016375233753210.1109/ACCESS.2018.28481068386752Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle NetworksHaojie Ji0Yunpeng Wang1Hongmao Qin2https://orcid.org/0000-0002-0146-1525Yongjian Wang3Honggang Li4School of Transportation Science and Engineering, Beihang University, Beijing, ChinaSchool of Transportation Science and Engineering, Beihang University, Beijing, ChinaSchool of Transportation Science and Engineering, Beihang University, Beijing, ChinaNational Computer Network Emergency Response Center Technical Team/Coordination Center of China, Beijing, ChinaSchool of Transportation Science and Engineering, Beihang University, Beijing, ChinaThe fifth-generation (5G) technology makes it widely applicable to connected vehicles. This would entail numerous transmitted data in communication networks and frequent information interactions between vehicles and other terminals, thus leading connected vehicles to be vulnerable to attacks from external communication interfaces. This paper analyzes potential security threats of 5G vehicular network and focuses on intrusion detection methods for in-vehicle networks. We choose four experiment scenarios from potential attacks for in-vehicle networks and collect real car data to compile various attack databases for the first time. In order to find appropriate methods to identify different attacks, four light-weight intrusion detection methods are presented to recognize abnormal behaviors of in-vehicle networks. Furthermore, our study undertakes the detection performance comparison between four detection methods with considering comprehensive evaluation metrics. The evaluation results provide optimal light-weight detection solution for in-vehicle networks. This paper facilitates the understanding of the advantages of the test methods in detection performance for in-vehicle networks and promotes the application of detection technology to deal with the security issues of automotive industry.https://ieeexplore.ieee.org/document/8386752/Vehicular networksanomaly detectioncommunication securityevaluation metrics |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Haojie Ji Yunpeng Wang Hongmao Qin Yongjian Wang Honggang Li |
spellingShingle |
Haojie Ji Yunpeng Wang Hongmao Qin Yongjian Wang Honggang Li Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks IEEE Access Vehicular networks anomaly detection communication security evaluation metrics |
author_facet |
Haojie Ji Yunpeng Wang Hongmao Qin Yongjian Wang Honggang Li |
author_sort |
Haojie Ji |
title |
Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks |
title_short |
Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks |
title_full |
Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks |
title_fullStr |
Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks |
title_full_unstemmed |
Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks |
title_sort |
comparative performance evaluation of intrusion detection methods for in-vehicle networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
The fifth-generation (5G) technology makes it widely applicable to connected vehicles. This would entail numerous transmitted data in communication networks and frequent information interactions between vehicles and other terminals, thus leading connected vehicles to be vulnerable to attacks from external communication interfaces. This paper analyzes potential security threats of 5G vehicular network and focuses on intrusion detection methods for in-vehicle networks. We choose four experiment scenarios from potential attacks for in-vehicle networks and collect real car data to compile various attack databases for the first time. In order to find appropriate methods to identify different attacks, four light-weight intrusion detection methods are presented to recognize abnormal behaviors of in-vehicle networks. Furthermore, our study undertakes the detection performance comparison between four detection methods with considering comprehensive evaluation metrics. The evaluation results provide optimal light-weight detection solution for in-vehicle networks. This paper facilitates the understanding of the advantages of the test methods in detection performance for in-vehicle networks and promotes the application of detection technology to deal with the security issues of automotive industry. |
topic |
Vehicular networks anomaly detection communication security evaluation metrics |
url |
https://ieeexplore.ieee.org/document/8386752/ |
work_keys_str_mv |
AT haojieji comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks AT yunpengwang comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks AT hongmaoqin comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks AT yongjianwang comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks AT honggangli comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks |
_version_ |
1724193875346587648 |