CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems (2404.04648v1)
Abstract: The growing integration of vehicles with external networks has led to a surge in attacks targeting their Controller Area Network (CAN) internal bus. As a countermeasure, various Intrusion Detection Systems (IDSs) have been suggested in the literature to prevent and mitigate these threats. With the increasing volume of data facilitated by the integration of Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication networks, most of these systems rely on data-driven approaches such as Machine Learning (ML) and Deep Learning (DL) models. However, these systems are susceptible to adversarial evasion attacks. While many researchers have explored this vulnerability, their studies often involve unrealistic assumptions, lack consideration for a realistic threat model, and fail to provide effective solutions. In this paper, we present CANEDERLI (CAN Evasion Detection ResiLIence), a novel framework for securing CAN-based IDSs. Our system considers a realistic threat model and addresses the impact of adversarial attacks on DL-based detection systems. Our findings highlight strong transferability properties among diverse attack methodologies by considering multiple state-of-the-art attacks and model architectures. We analyze the impact of adversarial training in addressing this threat and propose an adaptive online adversarial training technique outclassing traditional fine-tuning methodologies with F1 scores up to 0.941. By making our framework publicly available, we aid practitioners and researchers in assessing the resilience of IDSs to a varied adversarial landscape.
- Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. 315–329.
- An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks 90 (2019), 101842.
- A dynamic intrusion detection system based on multivariate Hotelling’s T 2 statistics approach for network environments. The Scientific World Journal 2015 (2015).
- Model evasion attack on intrusion detection systems using adversarial machine learning. In 2020 54th annual conference on information sciences and systems (CISS). IEEE, 1–6.
- Recent advances in adversarial training for adversarial robustness. arXiv preprint arXiv:2102.01356 (2021).
- Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407 (2019).
- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. arXiv:2403.17494 [cs.CR]
- Vehicle to vehicle “V2V” communication: scope, importance, challenges, research directions and future. The Open Transportation Journal 14, 1 (2020).
- Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).
- Anomaly intrusion detection method for vehicular networks based on survival analysis. Vehicular communications 14 (2018), 52–63.
- International Standard Organization. 2015. ISO 11898:2015: Road vehicles — Controller area network (CAN). Standard. International Organization for Standardization, Geneva, CH.
- Min-Joo Kang and Je-Won Kang. 2016. Intrusion detection system using deep neural network for in-vehicle network security. PloS one 11, 6 (2016), e0155781.
- Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2, 1 (2019), 1–22.
- Hoki Kim. 2020. Torchattacks: A pytorch repository for adversarial attacks. arXiv preprint arXiv:2010.01950 (2020).
- Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall/CRC, 99–112.
- Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review. EURASIP Journal on Wireless Communications and Networking 2019 (2019), 1–17.
- Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017).
- A stealth, selective, link-layer denial-of-service attack against automotive networks. In Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings 14. Springer, 185–206.
- Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet of Things Journal 8, 13 (2020), 10327–10335.
- A survey of anomaly detection for connected vehicle cybersecurity and safety. In 2018 IEEE Intelligent Vehicles Symposium (IV). IEEE, 421–426.
- Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In 2016 international conference on information networking (ICOIN). IEEE, 63–68.
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network. In Proceedings of the 35th annual ACM symposium on applied computing. 1048–1055.
- Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017).
- Embedded hybrid anomaly detection for automotive CAN communication. In 9th European congress on embedded real time software and systems (ERTS 2018).
- {{\{{DnD}}\}}: A {{\{{Cross-Architecture}}\}} Deep Neural Network Decompiler. In 31st USENIX Security Symposium (USENIX Security 22). 2135–2152.
- On the Resilience of Machine Learning-Based IDS for Automotive Networks. In 2023 IEEE Vehicular Networking Conference (VNC). IEEE, 239–246.
- Francesco Marchiori (17 papers)
- Mauro Conti (195 papers)