Fast anomalous traffic detection system for secure vehicular communications

In modern automotive systems, introducing multiple connectivity protocols has transformed in-vehicle network communication, resulting in the widely recognized Controller Area Network (CAN) standard. Despite its ubiquitous use, the CAN protocol lacks critical security features, making vehicle communi...

Full description

Saved in:
Bibliographic Details
Main Authors: Qasem Abu Al-Haija, Abdulaziz A. Alsulami
Format: Article
Language:English
Published: Tsinghua University Press 2024-12-01
Series:Intelligent and Converged Networks
Subjects:
Online Access:https://www.sciopen.com/article/10.23919/ICN.2024.0021
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841533592934547456
author Qasem Abu Al-Haija
Abdulaziz A. Alsulami
author_facet Qasem Abu Al-Haija
Abdulaziz A. Alsulami
author_sort Qasem Abu Al-Haija
collection DOAJ
description In modern automotive systems, introducing multiple connectivity protocols has transformed in-vehicle network communication, resulting in the widely recognized Controller Area Network (CAN) standard. Despite its ubiquitous use, the CAN protocol lacks critical security features, making vehicle communications vulnerable to message injection attacks. These assaults might confuse original electronic control units (ECUs) or cause system failures, emphasizing the need for strong cybersecurity solutions in automobile networks. This study addresses this need by developing a quick and efficient abnormal traffic detection system to protect vehicular communications from cyber attacks. The proposed system utilizes four machine learning techniques: Adaboost Trees (ABT), Coarse Decision Trees (CDT), Naive Bayes Classifier (NBC), and Support Vector Machine (SVM). These models were carefully assessed on the Car-Hacking-2018 dataset, which simulates real-time vehicular communication scenarios. Specifically, the system considers five balanced classes, including one normal traffic class and four classes for message injection attacks over the in-vehicle controller area network: fuzzy attack, DoS attack, RPM attack (spoofing), and gear attack (spoofing). Our best performance outcomes belong to the ABT model, which notched 99.8% classification accuracy and 6.67 µs of classification overhead. Such results have outweighed existing in-vehicle intrusion detection systems employing the same/similar dataset.
format Article
id doaj-art-f5ebd03603664d4dbd83d667723aa25d
institution Kabale University
issn 2708-6240
language English
publishDate 2024-12-01
publisher Tsinghua University Press
record_format Article
series Intelligent and Converged Networks
spelling doaj-art-f5ebd03603664d4dbd83d667723aa25d2025-01-15T18:07:01ZengTsinghua University PressIntelligent and Converged Networks2708-62402024-12-015435636910.23919/ICN.2024.0021Fast anomalous traffic detection system for secure vehicular communicationsQasem Abu Al-Haija0Abdulaziz A. Alsulami1Department of Cybersecurity, Faculty of Computer & Information Technology, Jordan University of Science and Technology, Irbid 22110, JordanDepartment of Information Systems, King Abdulaziz University, Jeddah 21589, Saudi ArabiaIn modern automotive systems, introducing multiple connectivity protocols has transformed in-vehicle network communication, resulting in the widely recognized Controller Area Network (CAN) standard. Despite its ubiquitous use, the CAN protocol lacks critical security features, making vehicle communications vulnerable to message injection attacks. These assaults might confuse original electronic control units (ECUs) or cause system failures, emphasizing the need for strong cybersecurity solutions in automobile networks. This study addresses this need by developing a quick and efficient abnormal traffic detection system to protect vehicular communications from cyber attacks. The proposed system utilizes four machine learning techniques: Adaboost Trees (ABT), Coarse Decision Trees (CDT), Naive Bayes Classifier (NBC), and Support Vector Machine (SVM). These models were carefully assessed on the Car-Hacking-2018 dataset, which simulates real-time vehicular communication scenarios. Specifically, the system considers five balanced classes, including one normal traffic class and four classes for message injection attacks over the in-vehicle controller area network: fuzzy attack, DoS attack, RPM attack (spoofing), and gear attack (spoofing). Our best performance outcomes belong to the ABT model, which notched 99.8% classification accuracy and 6.67 µs of classification overhead. Such results have outweighed existing in-vehicle intrusion detection systems employing the same/similar dataset.https://www.sciopen.com/article/10.23919/ICN.2024.0021cybersecuritymachine learningin-vehicle networkinternet of vehicles (iov)intrusion detectioncyber-attacks
spellingShingle Qasem Abu Al-Haija
Abdulaziz A. Alsulami
Fast anomalous traffic detection system for secure vehicular communications
Intelligent and Converged Networks
cybersecurity
machine learning
in-vehicle network
internet of vehicles (iov)
intrusion detection
cyber-attacks
title Fast anomalous traffic detection system for secure vehicular communications
title_full Fast anomalous traffic detection system for secure vehicular communications
title_fullStr Fast anomalous traffic detection system for secure vehicular communications
title_full_unstemmed Fast anomalous traffic detection system for secure vehicular communications
title_short Fast anomalous traffic detection system for secure vehicular communications
title_sort fast anomalous traffic detection system for secure vehicular communications
topic cybersecurity
machine learning
in-vehicle network
internet of vehicles (iov)
intrusion detection
cyber-attacks
url https://www.sciopen.com/article/10.23919/ICN.2024.0021
work_keys_str_mv AT qasemabualhaija fastanomaloustrafficdetectionsystemforsecurevehicularcommunications
AT abdulazizaalsulami fastanomaloustrafficdetectionsystemforsecurevehicularcommunications