计算机科学 ›› 2021, Vol. 48 ›› Issue (1): 34-39.doi: 10.11896/jsjkx.200900181
所属专题: 智能化边缘计算
于天琪1, 胡剑凌1, 金炯2, 羊箭锋1
YU Tian-qi1, HU Jian-ling1, JIN Jiong2, YANG Jian-feng1
摘要: 随着车联网技术的快速发展和广泛部署,其在为智能网联汽车提供互联网与大数据分析等智能化服务的同时,引入了网络入侵等安全与隐私问题。传统车载网络的封闭性导致现有的车载网络通信协议,特别是部署最为广泛的控制器局域网络(Controller Area Network,CAN)总线协议,在发布时缺少隐私与安全保护机制。因此,为检测网络入侵、保护智能网联汽车安全,文中提出了一种基于支持向量数据描述(Support Vector Data Description,SVDD)的车载CAN网络入侵检测方法。该方法提取单位时间窗内CAN网络报文ID的加权自信息量和ID的归一化值作为特征信息,并在移动边缘计算服务器处构建并训练SVDD模型,目标车辆基于训练的SVDD模型进行异常特征值识别,从而实现实时的车载CAN网络入侵检测。文中采用韩国高丽大学HCR实验室公开的CAN网络数据集,对所提方法与3种传统的基于信息熵的车载网络入侵检测方法在拒绝服务攻击和伪装攻击检测准确率方面进行了对比与分析。仿真实验结果表明,在少量报文入侵时,所提方法显著提高了入侵检测的准确率。
中图分类号:
[1] LIU Z,ZHANG T.Research on automatic lane change method based on vehicle network information[J].Journal of Chongqing University of Technology (Natural Science),2020,34(4):11-17. [2] CHEN L,ZHANG D,LIANG J.The Driving active service selection method based on QoS for Internet of Vehicle environment[J].Journal of Chongqing University of Technology (Na-tural Science),2019,33(12):8-17. [3] LI Y,LUO Q,LIU J,et al.TSP security in intelligent and connected vehicles:challenges and solutions [J].IEEE Wireless Communications,2019,26(3):125-131. [4] WU W,LI R,XIE G,et al.A survey of intrusion detection for in-vehicle networks [J].IEEE Transactions on Intelligent Transportation System,2020,13(3):919-933. [5] MILLER C,VALASEK C.Remote exploitation of an unaltered passenger vehicle [R].BlackHat USA,2015. [6] KEEN SECURITY LAB.Car hacking research:Remote attack Tesla motors [EB/OL].[2020-09-24].https://www.blackhat.com/docs/us-17/thursday/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf. [7] YOUNG C,ZAMBRENO J,OLUFOWOBI H,et al.Survey of automotive controller area network intrusion detection systems [J].IEEE Design & Test,2019,36(6):48-55. [8] CHOI W,JOO K,JO H J,et al.VoltageIDS:Low-level communication characteristics for automotive intrusion detection system[J].IEEE Transactions on Information Forensics Security,2018,13(8):2114-2129. [9] CHO K T,SHIN K G.Fingerprinting electronic control units for vehicle intrusion detection[C]//25th USENIX Conference on Security Symposium.2016:911-927. [10] SHIN K G,CHO K T.Viden:Attacker identification on in-vehicle networks[C]//ACM SIGSAC Conference on Computer Communication Security.2017:1109-1123. [11] SONG H M,KIM H R,KIM H K.Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network[C]//International Conference on Information Networks (ICOIN).2016:63-68. [12] LEE H,JEONG S H,KIM H K.OTIDS:A novel intrusion detection system for in-vehicle network by using remote frame[C]//15th IEEE PST.2017:5709-5757. [13] MÜTER M,ASAJ N.Entropy-based anomaly detection for in-vehicle networks[C]//IEEE Intelligent Vehicles Symposium.2011:1110-1115. [14] YU H,QIN G H,SUN M H,et al.Cyber security and anomaly detection method for in-vehicle CAN[J].Journal of Jilin University (Engineering Edition),2016,46(4):1246-1253. [15] WU W,HUANG Y,KURACHI R,et al.Sliding window optimized information entropy analysis method for intrusion detection on in-vehicle networks[J].IEEE Access,2018,6:45233-45245. [16] YU C,LIN B,GUI P,et al.Deployment and dimensioning of fog computing-based Internet of Vehicle infrastructure for autonomous driving[J].IEEE Internet of Things Journal,2019,6(1):149-160. [17] YU X,LIU Y,SHI X,et al.Mobile edge computing offloading strategy under Internet of Vehicles scenario[J].Computer Engineering,2020,46(11):29-34,41. [18] LING F,DUAN J,LI C,et al.Research on dynamic load balancing algorithm for C-V2X edge server[J].Computer Enginee-ring,2020,46(12):201-206,221. [19] TAX M J D,DUIN P W R.Support Vector Data Description[J].Machine Learning,2004,54:45-66. [20] Support Vector Data Description (SVDD) Toolkit [EB/OL].[2020-09-24].https://github.com/iqiukp/SVDD. |
[1] | 王馨彤, 王璇, 孙知信. 基于多尺度记忆残差网络的网络流量异常检测模型 Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network 计算机科学, 2022, 49(8): 314-322. https://doi.org/10.11896/jsjkx.220200011 |
[2] | 陈晶, 吴玲玲. 多源异构环境下的车联网大数据混合属性特征检测方法 Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment 计算机科学, 2022, 49(8): 108-112. https://doi.org/10.11896/jsjkx.220300273 |
[3] | 于滨, 李学华, 潘春雨, 李娜. 基于深度强化学习的边云协同资源分配算法 Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning 计算机科学, 2022, 49(7): 248-253. https://doi.org/10.11896/jsjkx.210400219 |
[4] | 李梦菲, 毛莺池, 屠子健, 王瑄, 徐淑芳. 基于深度确定性策略梯度的服务器可靠性任务卸载策略 Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient 计算机科学, 2022, 49(7): 271-279. https://doi.org/10.11896/jsjkx.210600040 |
[5] | 方韬, 杨旸, 陈佳馨. D2D辅助移动边缘计算下的卸载策略优化 Optimization of Offloading Decisions in D2D-assisted MEC Networks 计算机科学, 2022, 49(6A): 601-605. https://doi.org/10.11896/jsjkx.210200114 |
[6] | 刘漳辉, 郑鸿强, 张建山, 陈哲毅. 多无人机使能移动边缘计算系统中的计算卸载与部署优化 Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems 计算机科学, 2022, 49(6A): 619-627. https://doi.org/10.11896/jsjkx.210600165 |
[7] | 谢万城, 李斌, 代玥玥. 空中智能反射面辅助边缘计算中基于PPO的任务卸载方案 PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing 计算机科学, 2022, 49(6): 3-11. https://doi.org/10.11896/jsjkx.220100249 |
[8] | 周天清, 岳亚莉. 超密集物联网络中多任务多步计算卸载算法研究 Multi-Task and Multi-Step Computation Offloading in Ultra-dense IoT Networks 计算机科学, 2022, 49(6): 12-18. https://doi.org/10.11896/jsjkx.211200147 |
[9] | 彭冬阳, 王睿, 胡谷雨, 祖家琛, 王田丰. 视频缓存策略中QoE和能量效率的公平联合优化 Fair Joint Optimization of QoE and Energy Efficiency in Caching Strategy for Videos 计算机科学, 2022, 49(4): 312-320. https://doi.org/10.11896/jsjkx.210800027 |
[10] | 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰. 大数据时代下车联网安全加密认证技术研究综述 Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era 计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112 |
[11] | 张海波, 张益峰, 刘开健. 基于NOMA-MEC的车联网任务卸载、迁移与缓存策略 Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC 计算机科学, 2022, 49(2): 304-311. https://doi.org/10.11896/jsjkx.210100157 |
[12] | 梁俊斌, 张海涵, 蒋婵, 王天舒. 移动边缘计算中基于深度强化学习的任务卸载研究进展 Research Progress of Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing 计算机科学, 2021, 48(7): 316-323. https://doi.org/10.11896/jsjkx.200800095 |
[13] | 宋海宁, 焦健, 刘永. 高速公路中的移动边缘计算研究 Research on Mobile Edge Computing in Expressway 计算机科学, 2021, 48(6A): 383-386. https://doi.org/10.11896/jsjkx.200900212 |
[14] | 唐亮, 李飞. 基于决策树的车联网安全态势预测模型研究 Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree 计算机科学, 2021, 48(6A): 514-517. https://doi.org/10.11896/jsjkx.200700158 |
[15] | 俞建业, 戚湧, 王宝茁. 基于Spark的车联网分布式组合深度学习入侵检测方法 Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark 计算机科学, 2021, 48(6A): 518-523. https://doi.org/10.11896/jsjkx.200700129 |
|