Show simple item record

dc.contributor.authorShanker, Shreejithen
dc.date.accessioned2023-06-19T13:17:13Z
dc.date.available2023-06-19T13:17:13Z
dc.date.createdJuly 2023en
dc.date.issued2023en
dc.date.submitted2023en
dc.identifier.citationShashwat Khandelwal & Shanker Shreejith, Real-time zero-day Intrusion Detection System for Automotive Controller Area Network on FPGAs, International Conference on Application-specific Systems, Architectures and Processors, Portugal, July 2023, 2023en
dc.identifier.otherYen
dc.descriptionPUBLISHEDen
dc.descriptionPortugalen
dc.description.abstractIncreasing automation in vehicles enabled by in- creased connectivity to the outside world has exposed vulnerabilities in previously siloed automotive networks like controller area networks (CAN). Attributes of CAN such as broadcast-based communication among electronic control units (ECUs) that lowered deployment costs are now being exploited to carry out active injection attacks like denial of service (DoS), fuzzing, and spoofing attacks. Research literature has proposed multiple supervised machine learning models deployed as Intrusion detection systems (IDSs) to detect such malicious activity; however, these are largely limited to identifying previously known attack vectors. With the ever-increasing complexity of active injection attacks, detecting zero-day (novel) attacks in these networks in real-time (to prevent propagation) becomes a problem of particular interest. This paper presents an unsupervised-learning-based convolutional autoencoder architecture for detecting zero-day attacks, which is trained only on benign (attack-free) CAN messages. We quantise the model using Vitis-AI tools from AMD/Xilinx targeting a resource-constrained Zynq Ultrascale platform as our IDS-ECU system for integration. The proposed model successfully achieves equal or higher classification accuracy (> 99.5%) on unseen DoS, fuzzing, and spoofing attacks from a publicly available attack dataset when compared to the state-of-the-art unsupervised learning-based IDSs. Additionally, by cleverly overlapping IDS operation on a window of CAN messages with the reception, the model is able to meet line-rate detection (0.43 ms per window) of high-speed CAN, which when coupled with the low energy consumption per inference, makes this architecture ideally suited for detecting zero-day attacks on critical CAN networks.en
dc.language.isoenen
dc.rightsYen
dc.subjectField Programmable Gate Arraysen
dc.subjectQuantised Neural Netsen
dc.subjectUnsuperivsed Machine Learningen
dc.subjectAutoencodersen
dc.subjectIntrusion Detection Systemen
dc.subjectController Area Networken
dc.titleReal-time zero-day Intrusion Detection System for Automotive Controller Area Network on FPGAsen
dc.title.alternativeInternational Conference on Application-specific Systems, Architectures and Processorsen
dc.typeConference Paperen
dc.type.supercollectionscholarly_publicationsen
dc.type.supercollectionrefereed_publicationsen
dc.identifier.peoplefinderurlhttp://people.tcd.ie/shankersen
dc.identifier.rssinternalid256587en
dc.rights.ecaccessrightsopenAccess
dc.subject.TCDThemeMaking Irelanden
dc.subject.TCDThemeSmart & Sustainable Planeten
dc.subject.TCDThemeTelecommunicationsen
dc.subject.TCDTagComputer/Data/Network Securityen
dc.subject.TCDTagENERGY EFFICIENCYen
dc.subject.TCDTagHardware and software architecturesen
dc.subject.TCDTagReconfigurable Hardwareen
dc.subject.TCDTagdeep learningen
dc.identifier.orcid_id0000-0002-9717-1804en
dc.status.accessibleNen
dc.identifier.urihttp://hdl.handle.net/2262/102967


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record