Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks

The fifth-generation (5G) technology makes it widely applicable to connected vehicles. This would entail numerous transmitted data in communication networks and frequent information interactions between vehicles and other terminals, thus leading connected vehicles to be vulnerable to attacks from ex...

Full description

Bibliographic Details
Main Authors: Haojie Ji, Yunpeng Wang, Hongmao Qin, Yongjian Wang, Honggang Li
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8386752/
id doaj-c9d768e0a73440188721f148ed72602e
record_format Article
spelling doaj-c9d768e0a73440188721f148ed72602e2021-03-29T20:57:32ZengIEEEIEEE Access2169-35362018-01-016375233753210.1109/ACCESS.2018.28481068386752Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle NetworksHaojie Ji0Yunpeng Wang1Hongmao Qin2https://orcid.org/0000-0002-0146-1525Yongjian Wang3Honggang Li4School of Transportation Science and Engineering, Beihang University, Beijing, ChinaSchool of Transportation Science and Engineering, Beihang University, Beijing, ChinaSchool of Transportation Science and Engineering, Beihang University, Beijing, ChinaNational Computer Network Emergency Response Center Technical Team/Coordination Center of China, Beijing, ChinaSchool of Transportation Science and Engineering, Beihang University, Beijing, ChinaThe fifth-generation (5G) technology makes it widely applicable to connected vehicles. This would entail numerous transmitted data in communication networks and frequent information interactions between vehicles and other terminals, thus leading connected vehicles to be vulnerable to attacks from external communication interfaces. This paper analyzes potential security threats of 5G vehicular network and focuses on intrusion detection methods for in-vehicle networks. We choose four experiment scenarios from potential attacks for in-vehicle networks and collect real car data to compile various attack databases for the first time. In order to find appropriate methods to identify different attacks, four light-weight intrusion detection methods are presented to recognize abnormal behaviors of in-vehicle networks. Furthermore, our study undertakes the detection performance comparison between four detection methods with considering comprehensive evaluation metrics. The evaluation results provide optimal light-weight detection solution for in-vehicle networks. This paper facilitates the understanding of the advantages of the test methods in detection performance for in-vehicle networks and promotes the application of detection technology to deal with the security issues of automotive industry.https://ieeexplore.ieee.org/document/8386752/Vehicular networksanomaly detectioncommunication securityevaluation metrics
collection DOAJ
language English
format Article
sources DOAJ
author Haojie Ji
Yunpeng Wang
Hongmao Qin
Yongjian Wang
Honggang Li
spellingShingle Haojie Ji
Yunpeng Wang
Hongmao Qin
Yongjian Wang
Honggang Li
Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks
IEEE Access
Vehicular networks
anomaly detection
communication security
evaluation metrics
author_facet Haojie Ji
Yunpeng Wang
Hongmao Qin
Yongjian Wang
Honggang Li
author_sort Haojie Ji
title Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks
title_short Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks
title_full Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks
title_fullStr Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks
title_full_unstemmed Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks
title_sort comparative performance evaluation of intrusion detection methods for in-vehicle networks
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description The fifth-generation (5G) technology makes it widely applicable to connected vehicles. This would entail numerous transmitted data in communication networks and frequent information interactions between vehicles and other terminals, thus leading connected vehicles to be vulnerable to attacks from external communication interfaces. This paper analyzes potential security threats of 5G vehicular network and focuses on intrusion detection methods for in-vehicle networks. We choose four experiment scenarios from potential attacks for in-vehicle networks and collect real car data to compile various attack databases for the first time. In order to find appropriate methods to identify different attacks, four light-weight intrusion detection methods are presented to recognize abnormal behaviors of in-vehicle networks. Furthermore, our study undertakes the detection performance comparison between four detection methods with considering comprehensive evaluation metrics. The evaluation results provide optimal light-weight detection solution for in-vehicle networks. This paper facilitates the understanding of the advantages of the test methods in detection performance for in-vehicle networks and promotes the application of detection technology to deal with the security issues of automotive industry.
topic Vehicular networks
anomaly detection
communication security
evaluation metrics
url https://ieeexplore.ieee.org/document/8386752/
work_keys_str_mv AT haojieji comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks
AT yunpengwang comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks
AT hongmaoqin comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks
AT yongjianwang comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks
AT honggangli comparativeperformanceevaluationofintrusiondetectionmethodsforinvehiclenetworks
_version_ 1724193875346587648