Submitted:
30 April 2024
Posted:
30 April 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related Works
2.1. Controller Area Network (CAN) Protocol
| Layer | Description |
|---|---|
| Application | Performs vendor-defined tasks |
| Object (Presentation) | Performs message processing |
| Transfer | Performs message transmission reception and Detects signal defects and message errors |
| Physical | Defines how to convert physical signals such as signal level and signal optimization |
2.2. Network Intrusion Detection Model for CAN Protocol
| Model | Paper | Platform | |
|---|---|---|---|
| Support Vector Machine Random Forest |
Tanksale, V. (2019, November) [11] Alsoliman, A., Rigoni, G., Callegaro, D., Levorato, M., Pinotti, C. M., & Conti, M. (2023) [12], Moulahi, T., Zidi, S., Alabdulatif, A., & Atiquzzaman, M. (2021) [13] |
In-Vehicle Network In-Vehicle Network In-Vehicle Network |
|
| Deep Neural Network CNN CNN+LSTM |
Kang, M. J., & Kang, J. W. (2016) [11] Javed, A. R., Ur Rehman, S., Khan, M. U., Alazab, M., & Reddy, T. (2021) [14] Kou, L., Ding, S., Wu, T., Dong, W., & Yin, Y. (2022)[15] |
In-Vehicle Network In-Vehicle Network In-Vehicle Network |
|
| Convolutional Neural Network | Song, H. M., Woo, J., & Kim, H. K. (2020) [16] | In-Vehicle Network | |
| Recurrent Neural Network LSTM (Long Short-Term Memory) Model GAN Ensemble Learing Model |
Tariq, S., Lee, S., Kim, H. K., & Woo, S. S. (2020) [17] Qin, H., Yan, M., & Ji, H. (2021) [18] Tlili, F., Ayed, S., & CHAARI FOURATI, L. (2023, August) [19] Seo, E., Song, H. M., & Kim, H. K. (2018, August) [20] Khan, M. H., Javed, A. R., Iqbal, Z., Asim, M., & Awad, A. I. (2024) [21] |
In-Vehicle Network In-Vehicle Network In-Drone Network In-Vehicle Network In-Vehicle Network |
|
2.3. SHAP
2.4. Explainable Artificial Intelligence (XAI)
2.5. Deep Neural Network Model
![]() |
2.6. Attack Scenario Analysis
2.6.1. Flooding Attack Scenario Analysis
| TimeStamp (sec) |
10/20 | 30/40/50 | 60/70/80/90 | 100 | 110/120 | 130 | 140/150/160 | 170/180 | |
|---|---|---|---|---|---|---|---|---|---|
| status | Booting | Take Off | Hovering | Motors Stop | Motors Stop | Hovering | Motors Stop | Landing | |
| Label | Normal | Normal | Flooding | Normal | Flooding | Floodng | Normal | Flooding | Normal |
| Time(s) | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | |
|---|---|---|---|---|---|---|---|---|---|
| ECU | |||||||||
| Attacker | - | - | 0x1 | - | - | 0x2 | - | - | |
| Main ECU | 0x1 | - | - | - | 0x1 | - | - | 0x1 | |
| Motor ECU | 0x2 | - | - | - | - | - | 0x2 | - | |
| CAN bus | 0x1 | 0x2 | 0x1 | 0x1 | 0x2 | 0x2 | 0x1 | ||
| Byte | [1] | [2] | [3] | [4] | [5] | [6] | [7] | [8] | [9] | [10] | [11] | [12] | [13] |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 8 | 08 | A6 | 35 | 00 | 00 | 00 | 00 | 00 | - | 166 | 53 | 00 | 00 |
| 7 | 07 | 00 | 00 | 00 | 00 | 00 | 00 | 00 | Null | 00 | 00 | 00 | 00 |
2.6.2. Fuzzy Attack Scenario Analysis
2.6.3. Replay Attack Scenario Analysis
3. Dataset Analysis and Preprocessing
3.1. Dataset Analysis for Each Datasets with SHAP Analysis
![]() |
3.1.1. Flooding Scenario Dataset Analysis

3.1.2. Fuzzy Attack Scenario Dataset Analysis (Type 03 & 04)

3.1.3. Replay Attack Scenario Dataset Analysis (Type 05, Type 06)
3.2. Single Model Performance Evaluation by Scenario Type
3.2.1. Experiment Environment
| Division | Description |
|---|---|
| Memory | 32 GB |
| CPU | AMD Ryzen 7 5700X |
| GPU | NVIDIA GeForce RTX 3060 |
| OS | Microsoft Windows 11 Pro 64bit |
3.2.2. Performance Evaluation Metrics
3.2.3. Performance Evaluation Results
![]() |
4. Experiments
4.1. Experiment Model


4.2. Base Model’s Results Analysis
![]() |
4.3. Experiment Analysis
5. Conclusions
Funding
References
- Altawy, R., & Youssef, A. M. (2016). Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems, 1(2), 1-25.
- Liu, J., Yin, T., Yue, D., Karimi, H. R., & Cao, J. (2020). Event-based secure leader-following consensus control for multiagent systems with multiple cyber attacks. IEEE Transactions on Cybernetics, 51(1), 162-173. [CrossRef]
- Cao, J., Ding, D., Liu, J., Tian, E., Hu, S., & Xie, X. (2021). Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks. Information Sciences, 548, 69-84. [CrossRef]
- Robert Bosch GmbH, (1991). CAN Specification version 2.0, Postfach 30 02 40, D-70442 Stuttgart.
- Lundberg, S. M., & Lee, S. I. (2017). A unified approach to interpreting model predictions. Advances in neural information processing systems, 30.
- Lundberg, S. M., Erion, G. G., & Lee, S. I. (2018). Consistent individualized feature attribution for tree ensembles. arXiv preprint. arXiv:1802.03888.
- Lundberg, S. M., Erion, G., Chen, H., DeGrave, A., Prutkin, J. M., Nair, B. & Lee, S. I. (2020). From local explanations to global understanding with explainable AI for trees. Nature machine intelligence, 2(1), 56-67. [CrossRef]
- Li, J., Guo, Y., Li, L., Liu, X., & Wang, R. (2023, August). Using LightGBM with SHAP for predicting and analyzing traffic accidents severity. In 2023 7th International Conference on Transportation Information and Safety (ICTIS) (pp. 2150-2155). IEEE.
- Lee, Y. G., Oh, J. Y., Kim, D., & Kim, G. (2023). Shap value-based feature importance analysis for short-term load forecasting. Journal of Electrical Engineering & Technology, 18(1), 579-588. [CrossRef]
- OpenCyphal. Available online: https://legacy.uavcan.org/ (accessed on 26 april 2024).
- Tanksale, V. (2019, November). Intrusion detection for controller area network using support vector machines. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW) (pp. 121-126). IEEE.Shrestha, B. (2015).
- Kou, L., Ding, S., Wu, T., Dong, W., & Yin, Y. (2022). An intrusion detection model for drone communication network in sdn environment. Drones, 6(11), 342. [CrossRef]
- Moulahi, T., Zidi, S., Alabdulatif, A., & Atiquzzaman, M. (2021). Comparative performance evaluation of intrusion detection based on machine learning in in-vehicle controller area network bus. IEEE Access, 9, 99595-99605. [CrossRef]
- Javed, A. R., Ur Rehman, S., Khan, M. U., Alazab, M., & Reddy, T. (2021). CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE transactions on network science and engineering, 8(2), 1456-1466. [CrossRef]
- Alsoliman, A., Rigoni, G., Callegaro, D., Levorato, M., Pinotti, C. M., & Conti, M. (2023). Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. ACM Transactions on Cyber-Physical Systems, 7(2), 1-29.Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PloS one, 11(6), e0155781. [CrossRef]
- Song, H. M., Woo, J., & Kim, H. K. (2020). In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications, 21, 100198. [CrossRef]
- Tariq, S., Lee, S., Kim, H. K., & Woo, S. S. (2020). CAN-ADF: The controller area network attack detection framework. Computers & Security, 94, 101857. [CrossRef]
- Qin, H., Yan, M., & Ji, H. (2021). Application of controller area network (CAN) bus anomaly detection based on time series prediction. Vehicular Communications, 27, 100291. [CrossRef]
- Seo, E., Song, H. M., & Kim, H. K. (2018, August). GIDS: GAN based intrusion detection system for in-vehicle network. In 2018 16th Annual Conference on Privacy, Security and Trust (PST) (pp. 1-6). [CrossRef]
- Khan, M. H., Javed, A. R., Iqbal, Z., Asim, M., & Awad, A. I. (2024). DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning. Computers & Security, 103712. [CrossRef]
- Tlili, F., Ayed, S., & CHAARI FOURATI, L. (2023, August). Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI. In Proceedings of the 18th International Conference on Availability, Reliability and Security (pp. 1-10).
- Islam, R., Refat, R. U. D., Yerram, S. M., & Malik, H. (2020). Graph-based intrusion detection system for controller area networks. IEEE Transactions on Intelligent Transportation Systems, 23(3), 1727-1736. [CrossRef]
- Kim, Dongsung, et al. "Uavcan dataset description." arXiv preprint. arXiv:2212.09268 (2022).
- Capuano, N., Fenza, G., Loia, V., & Stanzione, C. (2022). Explainable artificial intelligence in cybersecurity: A survey. IEEE Access, 10, 93575-93600. [CrossRef]
- Ribeiro, M. T., Singh, S., & Guestrin, C. (2016, August). " Why should i trust you?" Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 1135-1144).
- Chamola, V., Hassija, V., Sulthana, A. R., Ghosh, D., Dhingra, D., & Sikdar, B. (2023). A review of trustworthy and explainable artificial intelligence (xai). IEEE Access. [CrossRef]
- Covington, P., Adams, J., & Sargin, E. (2016, September). Deep neural networks for youtube recommendations. InProceedings of the 10th ACM conference on recommender systems(pp. 191-198).
- The Asimov Institute. Available online: https://www.asimovinstitute.org/neural-network-zoo/ (accessed on 8 March 2024).
- OpenCyphal. DS-015 UAVCAN Drone Standard v1.0.1. 2021.
- Sikora, Riyaz. "A modified stacking ensemble machine learning algorithm using genetic algorithms." Handbook of research on organizational transformations through big data analytics. IGi Global, 2015. 43-53.Kwon, H., Park, J., & Lee, Y. (2019). Stacking ensemble technique for classifying breast cancer. Healthcare informatics research, 25(4), 283-288.
- Charoenkwan, P., Chiangjong, W., Nantasenamat, C., Hasan, M. M., Manavalan, B., & Shoombuatong, W. (2021). StackIL6: a stacking ensemble model for improving the prediction of IL-6 inducing peptides. Briefings in bioinformatics, 22(6), bbab172.
- Akyol, K. (2020). Stacking ensemble based deep neural networks modeling for effective epileptic seizure detection. Expert Systems with Applications, 148, 113239. [CrossRef]
- Rashid, M., Kamruzzaman, J., Imam, T., Wibowo, S., & Gordon, S. (2022). A tree-based stacking ensemble technique with feature selection for network intrusion detection. Applied Intelligence, 52(9), 9768-9781. [CrossRef]
- Shrestha, R., Omidkar, A., Roudi, S. A., Abbas, R., & Kim, S. (2021). Machine-learning-enabled intrusion detection system for cellular connected UAV networks. Electronics, 10(13), 1549. [CrossRef]
- Hartmann, K., & Steup, C. (2013, June). The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. In 2013 5th international conference on cyber conflict (CYCON 2013) (pp. 1-23).
- Kim, J., Kim, S., Ju, C., & Son, H. I. (2019). Unmanned aerial vehicles in agriculture: A review of perspective of platform, control, and applications. Ieee Access, 7, 105100-105115. [CrossRef]
- Mademlis, I., Nikolaidis, N., Tefas, A., Pitas, I., Wagner, T., & Messina, A. (2018). Autonomous unmanned aerial vehicles filming in dynamic unstructured outdoor environments. IEEE Signal Processing Magazine, 36(1), 147-153. [CrossRef]
- Gargalakos, M. (2021). The role of unmanned aerial vehicles in military communications: application scenarios, current trends, and beyond. The Journal of Defense Modeling and Simulation, 15485129211031668. [CrossRef]
- Elman, J. L. (1990). Finding structure in time.Cognitive science,14(2), 179-211.
- Hochreiter, Sepp, and Jürgen Schmidhuber. “Long short-term memory.” Neural computation 9.8 (1997): 1735-1780.
- Hyung-Hoon Kim, Yeon-Seon Jeong, Won-Seok Choi, and Hyo-Jin Cho. 2022. Evaluation framework for automotive intrusion detection systems using AI, The Korea Institute of Information Security and Cryptology, 32, 4, (2022), 7-17.









| Time Stamp(sec) |
10/20 | 30/40/50 | 60/70/80 | 90 | 100/110 | 120 | 130 | 140/150 /160 |
170/180 |
|---|---|---|---|---|---|---|---|---|---|
| Status | Booting | Hovering | Hovering Motors stop | Hovering | Hovering Motors stop |
Hovering Motors stop | Hovering | Hovering Motors stop |
Landing |
| Label | Normal | Fuzzy | Normal | Fuzzy | Fuzzy | Normal | Fuzzy | Normal | |
| Scenario type | Number of Attack | Interval(s) | Total time(s) | Propotion of Label(normal:attack) |
|---|---|---|---|---|
| 05 | 3 | 0.005 | 210 | 2.5:1 |
| 06 | 4 | 0.005 | 280 | 2:1 |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Label | |||
|---|---|---|---|
| Positive | Negative | ||
| Prediction | Positive | TP (True Positive) | FP (False Positive) |
| Negative | FP (False Negative) | TN (True Negative) | |
![]() |
![]() |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).












