Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.6.1279

GAN Based Adversarial CAN Frame Generation Method for Physical Attack Evading Intrusion Detection System  

Kim, Dowan (Soongsil University)
Choi, Daeseon (Soongsil University)
Abstract
As vehicle technology has grown, autonomous driving that does not require driver intervention has developed. Accordingly, CAN security, an network of in-vehicles, has also become important. CAN shows vulnerabilities in hacking attacks, and machine learning-based IDS is introduced to detect these attacks. However, despite its high accuracy, machine learning showed vulnerability against adversarial examples. In this paper, we propose a adversarial CAN frame generation method to avoid IDS by adding noise to feature and proceeding with feature selection and re-packet for physical attack of the vehicle. We check how well the adversarial CAN frame avoids IDS through experiments for each case that adversarial CAN frame generated by all feature modulation, modulation after feature selection, preprocessing after re-packet.
Keywords
Vehicle Privacy; Evasion Attack; Machine Learning; Adversarial Example;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Christian Szegedy, Wojeciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, I.J. Goodfellow, and Rob Fergus, "Intriguing properties of neural networks," arXiv preprint, Dec. 2013.
2 S.H. Kim and Y.S. Kim, "Control area network security technology trends," The Magazine of the IEIE, 42(8), pp. 46-53, 2015.
3 H.M. Song, Jiyoung Woo, and H.K Kim, "In-vehicle network intrusion detection using deep convolutional neural network," Vehicular Communications 21, vol. 21, pp. 1-13, Jan. 2020.
4 M.J. Kang and J.W. Kang, "Intrusion detection system using deep neural network for in-vehicle network security," PloS one, vol. 11, no. 6, Jun. 2016.
5 I.J. Goodfellow, J.P. Abadie, Mehdi Mirza, et. al., "Generative adversarial nets," Advances in Neural Information Processing Systems 2014, vol. 2, pp. 2672-2680, Jun. 2014.
6 K-CyberSecuri tyChal lenge2020, "K-cyber security challenge," http://datachallenge.kr/challenge20/car/rules/, Aug. 2021.
7 Martin Arjovsky, Soumith Chintala, and Leon Bottou, "Wasserstein generative adversarial networks," Proceedings of the 34th International Conference on Machine Learning, vol. 70, pp. 214-223, 2017.
8 Geoffrey Hinton, Li Deng, Dong Yu, G.E. Dahl, et. al., "Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups," IEEE Signal Processing Magazine, vol 29, no. 6, pp. 82-97, Nov. 2012.   DOI
9 Jian Wang, Yameng Shao, Yuming Ge, and Rundong Yu, "A survey of vehicle to everything(V2X) testing," Sensors 2019, vol. 19, no. 2, Jan. 2019.
10 Eunbi Seo, H.M. Song, and H.K. Kim, "GIDS: GAN based Intrusion detection system for in-vehicle network," 16th Annual Conference on Privacy, Security and Trust(PST), vol. 1, pp. 1-6, Aug. 2018.
11 A.R. Javed, S.U. Rehman, M.U. Khan, and Mamoun Alazab, "CANintelliIDS: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-Based GRU," 2021 3rd International Cyber Resilience Conference(CRC), vol. 8, no. 2, pp. 1456-1466, Jan. 2021.
12 Dowan Kim and Daeseon Choi, "GAN based adversarial CAN packet generation method for evading IDS," Conference on Information Security and Cryptography Summer 2021, pp. 74-77, Jun. 2021.
13 R.S. Pressman and B.R. Maxim, Software engineering a practitioner's approach, ISBN-10: 1259872971, 3rd Ed. McGraw Hill, Sep. 2019.
14 G.E. Hinton, Simon Osindero, and Y.W. Teh, "A fast learning algorithm for deep belief nets," Neural Computation, vol. 18, no. 7, pp. 1527-1554, Jul. 2006.   DOI
15 T.K. Ho, "Random decision forest," Proceeding of 3rd International Conference on Document Analysis and Recognition, vol. 1, pp. 278-282, Aug. 1995.
16 Zilong Lin, Yong Shi, and Zhi Xue, "IDSGAN: generative adversarial networks for attack generation against intrusion detection," arXiv preprint, Sep. 2018.
17 Alex Krizhevsky, Ilya Sutskever, and G.E. Hinton, "ImageNet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems 2012, vol. 1, pp. 1097-1105, Dec. 2012.
18 Zhewen Niu, Zeyuan Yu, Wenhu Tang, Qinghua Wu, and Marek Reformat, "Wind power forecasting using attention-based gated recurrent unit network," Energy, vol. 196, Apr. 2020.
19 R.B. GmbH, "CAN specification version 2.0," Sep. 1991.
20 "Taxonomy and definitions for term related to driving automation systems for on-road motor vehicles," SAE International in United States, Apr. 2021.
21 Nicholas Carlini and David Wagner, "Towards evaluating the robustness of neural networks," 2017 IEEE Symposium Security and Privacy, vol. 1, pp. 39-57, May. 2017.
22 Hyunjae Kang, B.I. Kwak, Y.H. Lee, Hwejae Lee, and H.K. Kim, "Car hacking and defense competition on in-vehicle network," Workshop on Automotive and Autonomous Vehicle Security, pp. 1-6, Feb. 2021.
23 I.J. Goodfellow, Jonathon Shlens, and Christian Szegedy, "Explaining and Harnessing Adversarial Examples," arXiv preprint, Dec. 2014.