{"created":"2023-07-25T10:26:36.375254+00:00","id":5217,"links":{},"metadata":{"_buckets":{"deposit":"1926b181-1d6f-43c2-b84e-8131ee912dab"},"_deposit":{"created_by":4,"id":"5217","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"5217"},"status":"published"},"_oai":{"id":"oai:naist.repo.nii.ac.jp:00005217","sets":["34:36"]},"author_link":["14028","14029","14030","37"],"item_1698715929687":{"attribute_name":"会議情報","attribute_value_mlt":[{"subitem_conference_country":"USA","subitem_conference_date":{"subitem_conference_date_language":"en","subitem_conference_period":"23-27 March 2020"},"subitem_conference_names":[{"subitem_conference_name":"2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","subitem_conference_name_language":"en"}],"subitem_conference_places":[{"subitem_conference_place":"Austin TX","subitem_conference_place_language":"en"}]}]},"item_9_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2020-08-04","bibliographicIssueDateType":"Issued"}}]},"item_9_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"The number of computer controlled vehicles throughout the world is rising at a staggering speed. Even though this enhances the driving experience, it opens a new security hole in the automotive industry. To alleviate this issue, we are proposing an intrusion detection system (IDS) to the controller area network (CAN), which is the de facto communication standard of present-day vehicles. We implemented an IDS based on the analysis of ID sequences. The IDS uses a trained Long-Short Term Memory (LSTM) to predict an arbitration ID that will appear in the future by looking back to the last 20 packet arbitration IDs. The output from the LSTM network is a softmax probability of all the 42 arbitration IDs in our test car. The softmax probability is used in two approaches for IDS. In the first approach, a single arbitration ID is predicted by taking the class which has the highest softmax probability. This method only gave us an accuracy of 0.6. Applying this result in a real vehicle would give us a lot of false negatives, hence we devised a second approach that uses log loss as an anomaly signal. The evaluated log loss is compared with a predefined threshold to see if the result is in the anomaly boundary. Furthermore, We have tested our approach using insertion, drop and illegal ID attacks which greatly outperform the conventional method with practical F1 scores of 0.9, 0.84, and 1.0 respectively.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_9_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_9_relation_11":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"9781728147161","subitem_relation_type_select":"ISBN"}}]},"item_9_relation_13":{"attribute_name":"出版者版DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1109/PerComWorkshops48775.2020.9156250","subitem_relation_type_select":"DOI"}}]},"item_9_rights_14":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"c 2020, IEEE","subitem_rights_language":"en"}]},"item_9_version_type_16":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Araya, Kibrom Desta","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"14028","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Ohira, Shuji","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"14029","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Arai, Ismail","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"14030","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Fujikawa, Kazutoshi","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"37","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"30252729","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=30252729"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-02"}],"displaytype":"detail","filename":"ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks.pdf","filesize":[{"value":"2.1 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"fulltext","objectType":"fulltext","url":"https://naist.repo.nii.ac.jp/record/5217/files/ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks.pdf"},"version_id":"03bf3fc9-f131-4491-afc4-7c24ccaeebe3"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"LSTM","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"In-vehicle Network Security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Automotive","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Intrusion Detection","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"CAN bus","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks","subitem_title_language":"en"}]},"item_type_id":"9","owner":"4","path":["36"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-08-11"},"publish_date":"2020-08-11","publish_status":"0","recid":"5217","relation_version_is_last":true,"title":["ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-11-29T09:12:18.655351+00:00"}