Abstract

In today's cars, communication between electronic control units is managed via the Controller Area Network (CAN) bus system. Nevertheless, the CAN bus system lacks means for authentication and authorisation, making it susceptible to attacks like denial-of-service, fuzzing, and spoofing. To identify and counteract CAN bus network intrusions, this study suggests an intrusion detection system based on a Long Short-Term Memory (LSTM) model. Extraction of attack-free data and attack injection produced the dataset used for testing and training. Findings show that the suggested LSTM model has a greater detection rate than the Survival Analysis approach and is efficient in defending current automobiles from assaults on the CAN bus network. The ability to identify these sorts of assaults is limited by the constraints of conventional intrusion detection systems (IDS) for CAN bus networks, such as statistical analysis, frequency-based analysis, and Hidden Markov Model (HMM). Using a Long Short-Term Memory (LSTM) based strategy, the objective of this article is to build a reliable IDS that can efficiently identify and counteract these assaults on the CAN bus network.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call