Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

CF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network

Full metadata record
DC Field Value Language
dc.contributor.authorIslam, Md. Rezanur-
dc.contributor.authorSahlabadi, Mahdi-
dc.contributor.authorKim, Keunkyoung-
dc.contributor.authorKim, Yoonji-
dc.contributor.authorYim, Kangbin-
dc.date.accessioned2024-06-11T07:02:21Z-
dc.date.available2024-06-11T07:02:21Z-
dc.date.issued2024-02-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/25924-
dc.description.abstractMany studies have focused on obtaining high accuracy in the design of Intrusion Detection Systems (IDS) for in-vehicle networks, neglecting the significance of different intensive packet injection techniques. Because of their reliance on scenario-specific training datasets, these IDSs are vulnerable to failing to detect real-world attacks. This study implemented deep learning (DL)-based classification for intrusion detection using a Gated Recurrent Unit (GRU) while considering various intrusion frequencies. Different intrusion frequencies are comprehensively addressed with frequency-agnostic intrusion and resolved by generalizing features for DL input through time series segmentation and frequency domain conversion using Gabor filtering. For training purposes, five types of vehicle data are used, encompassing DoS, fuzzing, and replay attack scenarios. The accuracy range for mechanical version vehicles is typically between 95% and 100%. For electronic vehicles, it is around 90%. Considering the nature of this IDS system, it has been named a Comprehensive Frequency-Agnostic Intrusion Detection System (CF-AIDS). Although this IDS can perform better in all aspects, achieving more efficient results requires a larger amount of situational data.-
dc.format.extent15-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleCF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2023.3346943-
dc.identifier.scopusid2-s2.0-85181566434-
dc.identifier.wosid001157913700001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.12, pp 13971 - 13985-
dc.citation.titleIEEE ACCESS-
dc.citation.volume12-
dc.citation.startPage13971-
dc.citation.endPage13985-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusANOMALY DETECTION SYSTEM-
dc.subject.keywordPlusCLASSIFICATION-
dc.subject.keywordAuthorIn-vehicle network-
dc.subject.keywordAuthorCAN-
dc.subject.keywordAuthorIDS-
dc.subject.keywordAuthorGabor transform-
dc.subject.keywordAuthorfrequency-agnostic-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE