Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Multiple Attack Detection Using SHAP and Heterogeneous Ensemble Model in the UAV’s Controller Area Network

Version 1 : Received: 30 April 2024 / Approved: 30 April 2024 / Online: 30 April 2024 (15:36:13 CEST)

How to cite: Hong, Y.-W.; Yoo, D.-Y. Multiple Attack Detection Using SHAP and Heterogeneous Ensemble Model in the UAV’s Controller Area Network. Preprints 2024, 2024042018. https://doi.org/10.20944/preprints202404.2018.v1 Hong, Y.-W.; Yoo, D.-Y. Multiple Attack Detection Using SHAP and Heterogeneous Ensemble Model in the UAV’s Controller Area Network. Preprints 2024, 2024042018. https://doi.org/10.20944/preprints202404.2018.v1

Abstract

Recently, methods to detect DoS and spoofing attacks that occur on in-vehicle networks using CAN Protocol are being studied through deep learning models such as CNN, RNN, and LSTM. These studies have produced significant results in the field of In-Vehicle Network attack detection using deep learning models. In addition, significant results are being achieved through research on applying time series-based deep learning models such as LSTM to detect DoS attacks and replay attacks occurring in in-drone networks by expanding them to drones using the UAVCAN protocol. In this paper, we conducted an experiment to detect in-drone network attacks through non-time series analysis using machine learning models and deep learning models, and through appropriate learning for each attack type, it can also be analyzed through non-time series analysis. The results showed that it was possible to detect attacks.

Keywords

controller area network (CAN); shapley additive explanations (SHAP); machine learning(ML); deep learning(DL); unmanned aerial vehicles (UAVs)

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.