<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Learning-based Intrusion Detection System for On-Board Vehicle Communication</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tobia Fiorese</string-name>
          <email>fioresetobia@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pietro Montino</string-name>
          <email>pietro.montino@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>GAN Training</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>CAN Bus</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bluewind</institution>
          ,
          <addr-line>Via della Borsa, 16A Castelfranco Veneto, 31033 (TV)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Padova</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This paper presents the development of an Intrusion Detection System (IDS) to be deployed on a CAN bus. Since the introduction of many external interfaces in modern vehicles exposes users to the risk of cyber-attacks, the need of focus on security is concrete. An IDS is a component that can detect anomalies in the behavior of the system where it is deployed. The proposed machine learning based solution is composed of two parts. The first includes a supervised trained neural network that is able to distinguish among different known attacks. The second includes a discriminator that has been trained exploiting the Generative Adversarial Network (GAN) paradigm, to distinguish among the attack-free situation and an anomalous situation. It will be demonstrated how the supervised training can achieve state of the art performance in classification and how the unsupervised training can guarantee a certain level of security even without the necessity of feeding labeled data to the network.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>ITASEC21, May 2021</p>
      <p>
        2020 Copyright for this paper by its authors.
sub-networks along with the addition of gateways and firewalls that block messages trying to cross
subnets. Authentication protocols [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and encryption methods [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] have been deployed as well, thus
increasing safety levels of CAN buses. Other countermeasures include Intrusion Detection Systems
(IDS), that try to identify anomalies on the traffic on a specific network by reading all the messages in
transit.
      </p>
      <p>This paper presents the architecture and the safety performances of a two-step CAN bus IDS
trained with machine learning techniques. This approach allows to add a measure of safety, even for
on-board electronics architectures already consolidated, without too much interference with
preexistent hardware and software.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>In the automotive field, numerous anomaly detection methods have been proposed. Most of these
solutions try to identify two categories of attacks: those based on the frequency of messages, such as
insertion or deletion of packets, and those that manipulate the payload.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] attacks are detected by checking the validity of the single frames with formal rules, and by
defining a certain number of forbidden message sequences by exploiting the correlation between the
target frame and contextual information regarding previously transmitted messages. A different rule
based on transition matrices was illustrated in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Another approach is presented in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], where anomalies are detected by looking at the inter frame
arrival times and at the frequencies of particular messages. This method can identify deviation from
normal traffic targeting particular ECUs, and is pretty accurate, but frequency alone cannot be relied
upon to discriminate an attack from an irregular noise situation in the CAN network.
      </p>
      <p>
        It is also possible to undertake a statistical approach, as it was done in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], where a rolling window
moves over a sequence of messages, focusing the attention on a portion of data in transit and
computing statistical measures as the standard deviation on offsets and time intervals between
messages.
      </p>
      <p>
        Also, many learning-based approaches were tested. Some of them are based on the time series of
payload values, and make extensive use of recurrent neural networks, in particular LSTM models [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
However, this approach takes advantage of knowledge of payload semantics, which in most cases is
unknown and proprietary. Another way to detect attacks in the network is to use a compound
classifier, fusing a one-class SVM for each ID, to obtain an overall anomaly score [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Some other
interesting approaches use a rolling window over the messages’ sequence and then use a CNN to
classify the matrices obtained from a pre-processing on the portion of messages focused by the
window [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This method proved to be very accurate in detecting known attacks and has been further
improved by adding an additional filter on packet traffic consisting of a CNN trained with the GAN
technique [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
3. CAN Bus
      </p>
      <p>
        CAN [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] is a network with a bus topology, which means that all devices on the network are
connected to a single line, or bus.
      </p>
      <p>At the transfer layer, the information is sent over the CAN bus through messages with a fixed
format and of limited length. Each frame is made up of various fields, the most significant of which
are:</p>
      <p>Identifier, an 11-bits identifier that also defines the priority of the message. The lower
the binary value, the higher the priority. Can be extended to 29 bits.</p>
      <p>Data, 64-bit field whose semantics are generally proprietary and specific to each ECU.</p>
      <p>A characteristic worth noticing is that there are no source and destination fields in a CAN packet:
message routing is regulated by the ID field. A CAN packet is broadcasted to the entire network, and
only some ECUs will process the packet based on the ID received.</p>
    </sec>
    <sec id="sec-3">
      <title>4. Attacks</title>
      <p>
        The first neural network of the presented IDS (ANN1) is trained in a supervised manner with a
dataset of different categories of known attacks. The goal of ANN1 is to discriminate between known
attacks and the normal condition by inferring over a sequence of data packets, in real time. The
datasets used for training are made of real CAN bus messages [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. They consist of logs of traffic
directly picked from the CAN bus through the OBD-II port of commercial vehicles where attacks
were carried out connecting a Raspberry Pi3 board to the bus and a laptop to the board. The following
paragraphs describe the types of known attacks that get detected by ANN1.
4.1.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Denial of Service (DoS)</title>
      <p>An attacker can inject high priority messages in a short cycle on the bus. DoS attack messages aim
at occupying the bus using the theoretically highest priority identifier, namely 0x000. Since all nodes
share a single bus, increasing occupancy of the bus can produce latencies of other messages and cause
threats regarding availability with no response to driver’s commands
4.2.</p>
    </sec>
    <sec id="sec-5">
      <title>Fuzzy</title>
      <p>An attacker can inject messages with randomly spoofed CAN ID, either with arbitrary data or with
spoofed data values. All these messages are functional and structurally correct, but they can cause
unintended vehicle behaviors. An attacker can passively observe in-vehicle traffic and select target
identifiers to produce unexpected behaviors. Unlike the DoS attack, Fuzzy is more specific and aims
at paralyzing a particular function of the vehicle.
4.3.</p>
    </sec>
    <sec id="sec-6">
      <title>Impersonation</title>
    </sec>
    <sec id="sec-7">
      <title>5. Pre-Processing</title>
      <p>An attacker can manage to stop message transmission from a target node and can plant/manipulate
an impersonating node that will take its role. If a victim node stops transmitting, all messages sent by
the targeted node will be removed from the bus.</p>
      <p>The two datasets have been divided into windows of traffic logged from the bus. Each of these
windows contain a number of packets, that during tests varied from a minimum of 8 to a maximum of
128. The most informative fields in CAN packets are the ID and the payload. To enhance the system
flexibility, semantic comprehension of payload data was not accounted.</p>
      <p>Only sequences of IDs were used to train the models. However, in log files IDs are formatted as
hexadecimals, therefore they are not suited to be fed to a neural network directly. Windows of IDs
have been converted into grayscale images with the two encodings pictured below.</p>
    </sec>
    <sec id="sec-8">
      <title>6. Supervised Training</title>
      <p>In this chapter the different neural network architectures will be illustrated. Each of these
architectures have been mantained small enough to fit memory constrained hardware. Two strategies
ensured high detection accuracies: using RNNs, being the relationship of IDs sequences temporal
rather than spatial, and using data fusion via the exploitation of other data available from the datasets.
Each model proposed have been tested on different window sizes ranging from 8 to 128 CAN
messages. All models have been trained using the same optimizer and the same hyperparameters.
6.1.</p>
    </sec>
    <sec id="sec-9">
      <title>CNN Model 6.2.</title>
    </sec>
    <sec id="sec-10">
      <title>RNN Model</title>
      <p>The CNN model consists of 3 convolutional layers and a fully connected layer with 32 units which
precedes the last layer that outputs four probability values, one for each class of attacks. Each
convolutional layer has 3x3 filters. The number of filters increases while going deeper in the network.
Each convolutional layer is followed by a BatchNormalization, a ReLU activation function and a
Dropout layer (at training time only).</p>
      <p>The RNN model consists of 32 LSTM cells followed by two fully connected layers with
respectively 64 and 32 units. Finally, the output layer is the same as the one in the CNN model. In this
way, in respect to CNNs complexity of models is consistently reduced.
6.3.</p>
    </sec>
    <sec id="sec-11">
      <title>Data Fusion</title>
      <p>
        Looking at time intervals between subsequent messages enables the detection of a set of known
attacks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The sequence of timestamps available in the datasets was divided into windows. Each
window was normalized by subtracting its first value from each timestamp and then dividing by the
mean time elapsed in the transmission of a normal window, to remove outliers.
      </p>
      <p>The data fusion models were built as the concatenation of two models, one taking as input the
sequences of IDs and the other taking as input the sequences of timestamps. The first model has the
same structure as defined in the previous section. The second has the same architecture but uses
onedimensional filters. After the convolutional layers, each model output is flattened and concatenated.</p>
      <p>As expected, the number of trainable parameters grows compared to above models. However, at
the expense of a limited increase in model complexity, the performance in classifying attacks is
considerably enhanced, in particular for convolutional models and bigger windows.
6.4.</p>
    </sec>
    <sec id="sec-12">
      <title>One-Hot Vector Encoding</title>
      <p>
        One-hot vector encoding proved to offer better results in the classification of images extracted
from CAN bus traffic [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>The CNN model tested with OHV encoded data is composed of three convolutional layers, with
respectively 4, 8 and 16 channels. Each layer has a filter with a 3x5 kernel that is moved over the
image with a stride of 1x2. At the end, between the flattened matrix and the output layer there is a
dense layer composed of 32 neurons. The use of a rectangular stride allowed for a consistent
reduction of the number of parameters.</p>
      <p>The RNN model instead maintains the same structure presented in 6.2, with the only difference in
the input size.</p>
    </sec>
    <sec id="sec-13">
      <title>7. GAN Training</title>
      <p>A drawback of the supervised approach to machine learning in anomaly detection is that it relies
on known attacks. Slight variations to attacks forming the dataset will increase the possibility to be
confused with normal situations. Approaches based on distinguishing the normal behavior from
anomalies, based only on attack-free data, could have a high false positive rate. It is possible though
to train a network to generate data similar to the ones of the given dataset, and at the same time train a
second network to distinguish among generated data and real data. This mechanism is called
Generative Adversarial Network training. This approach results in a reliable discriminator that could
enable protection against unknown attacks and also helps reduce the false positive samples yielded by
a supervised model. In the next sections architectures and setups of the second part of the proposed
system (ANN2) will be illustrated.</p>
    </sec>
    <sec id="sec-14">
      <title>CNN Discriminator</title>
      <p>The CNN discriminator is composed of 3 convolutional layers, each of them with a 3x3 kernel and
respectively 128, 64 and 32 channels, and a single neuron as output. Each layer is followed by a
Leaky ReLU function and a Dropout layer.</p>
      <p>
        The associated generator takes a random vector of 256 values as the input of a dense layer with
13*5*8 units, that is reshaped in a three-dimensional object. The network is then composed of 3
Conv2DTranspose layers. The first two consist of rectangular filters of dimension 5x3, moved with a
stride of 2x1. They have 4 and 3 filters respectively. The last layer has only one channel and uses a
4x3 kernel moved in 1x1 strides. Each layer is followed by a ReLU function and a Dropout layer. The
last layer squeezes the values of the generated image in the range [
        <xref ref-type="bibr" rid="ref1">-1, 1</xref>
        ] applying a ‘tanh’ activation
function.
7.2.
      </p>
    </sec>
    <sec id="sec-15">
      <title>DNN Discriminator</title>
      <p>The DNN discriminator is composed of 2 dense layers, with bi-dimensional input and respectively
96 and 48 units, and a single neuron as output. Each layer is followed by a Leaky ReLU function and
a Dropout layer.</p>
      <p>
        The associated generator takes a random vector of 256 values as the input of a dense layer with
1*12*256 units, that is then reshaped in a three-dimensional object. The network is then composed of
four Conv2DTranspose layers. Each of them moves its filters along a stride of 2x2. The first two
layers have 3x3-sized filters while the last two have 5x5. Each layer is followed by a ReLU function
and a Dropout layer. The last layer squeezes the values of the generated image in the range [
        <xref ref-type="bibr" rid="ref1">-1, 1</xref>
        ]
applying a ‘tanh’ activation function.
7.3.
      </p>
    </sec>
    <sec id="sec-16">
      <title>Training Setup</title>
      <p>Each architecture of ANN2 has been tested with three different setups:
• DCGAN: the last neuron of the discriminator incorporates a sigmoid activation function. The
loss function used is the Minimax loss and the optimizer used is Adam with a learning rate of 1e-3.
BatchNormalization is added after each layer of the two networks.
• WGAN: the last neuron of the discriminator can output any real value, however the weights
of each layer in the discriminator are clipped in the range [-0.01, 0.01] after each iteration. The
loss function used is the Wasserstein loss and the optimizer used is RMSprop with a learning rate
of 5e-5. The discriminator is trained for 5 times the iterations of the generator.
• WGAN-GP: the last neuron of the discriminator can output any real value, however a
penalization factor (Gradient Penalty) is added to the loss after each iteration. The loss function
used is the Wasserstein loss and the optimizer used is Adam with a learning rate of 2e-5,
beta_1=0.5 and beta_2=0.9. The discriminator is trained for 5 times the iterations of the generator.</p>
      <p>Gradient penalty factor λ has been fixed to 10.
100
95
()%90
y
ca 85
r
u
cc 80
A
75
70</p>
      <p>1
0,99
0,98
0,97
e
ro0,96
cS0,95
CU0,94
A0,93
0,92
0,91
0,9</p>
    </sec>
    <sec id="sec-17">
      <title>8. Results</title>
    </sec>
    <sec id="sec-18">
      <title>8.1. Supervised Training</title>
      <p>In Figure 6, average accuracies of architectures presented in Supervised Training, over OTIDS
dataset, can be compared over different window sizes. Accuracy is calculated as the sum of true
positives and true negatives over the sum of all the samples of each class in the test dataset. The AUC
score is also reported in Figure 6. Detailed measurements on individual classes and on GIDS dataset
are reported in Appendix A.</p>
      <p>Analysing the results, a trend can be extrapolated from each test, that shows how the accuracy in
detecting a particular situation is almost everywhere increasing with bigger windows. This is possibly
due to the fact that the model has more data to relies on to predict the various classes. Instead, with
smaller windows, the model is biased to predict more a single class with respect to the others.
Following the same principle of adding data to get a more reliable detection, data fusion models prove
to be more accurate.</p>
      <p>As it is clear, RNN models yields better results than CNN on almost all the different attacks and
window sizes. Also, the limited complexity of the models let this solution be the best choice to be
deployed on an ECU. Using the 64-message long window on the combined RNN, the average
accuracy achieved is 99.77%.</p>
      <sec id="sec-18-1">
        <title>Average Accuracy of Supervised Models</title>
        <p>8
16
32
64
128</p>
        <sec id="sec-18-1-1">
          <title>Buffer Size (# of messages)</title>
          <p>Looking now at the different encodings, fixing the window to 64 messages, there is a positive
aspect in using OHV for CNN models. However, for RNN models there is a drop in accuracy of
8
16
32
64</p>
          <p>128</p>
        </sec>
        <sec id="sec-18-1-2">
          <title>Buffer Size (# of messages)</title>
        </sec>
      </sec>
      <sec id="sec-18-2">
        <title>AUC Score of Supervised Models</title>
        <p>CNN
RNN
CNN Fusion
RNN Fusion
detecting Impersonation attack. It is also worth noticing that inputs for OHV models are almost four
times bigger. This results in an increasing complexity of models.
8.2.</p>
      </sec>
    </sec>
    <sec id="sec-19">
      <title>GAN Training</title>
      <p>Evaluation have been done comparing the output of the discriminator with a threshold, that can be
roughly evaluated from the mean outputs on test set. Assuming that the outputs of the discriminator
can be modelled as a normal distribution, a threshold have been fixed in a way that 99% of attack-free
data can be correctly classified. This choice would be beneficial in a possible use case, where it is
desirable a low false negative rate.</p>
      <p>
        Confirming the tests on [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], CNN discriminator proved to fail in distinguishing attacks from the
normal situation, However, one of the main purposes of GANs has been achieved. Looking at the
generated data they seem pretty similar to the real ones. Problems in convergence were encountered,
as the loss functions reached a stalemate after few iterations. In this way the discriminator had only
the chance to see a small amount of different samples, which do not allow it to differentiate the output
on the various attacks. This problem can be summarized as Mode Collapse.
      </p>
      <p>DNN discriminator making use of Minimax loss suffer of convergence problems. In OTIDS
dataset the output is similar to the one presented above, where known attacks cannot be discriminated.
Looking at the distribution of outputs of the model at the end of the training, it can be easily seen that
the intervals, in which each class falls in, overlap. Setting the threshold in a way that most of attack
free data can be correctly classified lead to poor results in classifying attacks properly.</p>
      <p>DNN discriminator with WGAN setup managed to reach a proper classification for two out of
three attacks in OTIDS dataset. The only one that is almost always misclassified as an attack-free case
is the Impersonation attack. In this setup, an important parameter to tune is the clipping range.
Increasing it can spread out the outputs, but beyond a certain limit the training becomes very unstable.</p>
      <p>DNN discriminator with GP-WGAN setup achieved the best results. In OTIDS dataset a perfect
separation between Fuzzy and DoS attacks from Normal data have been reached, However,
Impersonation still cannot be detected. Thus, it was possible to achieve a minimum level of protection
against specific types of attack, starting only from data concerning an attack-free situation.
9. Combined Detection</p>
      <p>The system used for attack detection is composed of ANN1 and ANN2. When the prediction of
ANN1 is not correct the input is passed to ANN2 that gives its response. Even if the performance of
discriminators themselves were not excellent, the combination of models improved them. Here below
results obtain on the OHV encoded dataset are reported. In all of them the supervised model used was
the CNN one, that proved to be the weakest, that is used as a binary classificator. Only results for
DNN discriminators are reported, as CNN ones proved to be useless and so they cannot bring any
improvement.
10.Conclusion and Further Works</p>
      <p>In this paper, we showed how we could reach state of the art performance on known attacks
classification using models with limited complexity. Furthermore, we showed how GAN training can
help expand the domain of training by going beyond known attacks, improving the results achieved
with supervised training techniques alone. Even more, we showed how the single use of the GAN
paradigm can guarantee a certain level of protection against cyber-attacks even if the model used has
never experienced any of them. That is, only data taken from an attack-free situation directly collected
from the system we want to protect are necessary to achieve a minimum amount of security.</p>
      <p>Of course, further research could be carried out on the basis of the methods proposed. Data fusion
can be extended with other data collected directly from the CAN bus. An example can be the clock
skew, that has already been used in other solutions, and that is more robust than timestamps.
Furthermore, from the supervised point of view other combinations of models, encoding and different
pre-processing techniques could be tested.</p>
      <p>From the GAN perspective, many other models have been presented in recent years, like the
StyleGAN or the CycleGAN. Furthermore, other techniques that haven’t been explored could be
added to the presented models, for example the spectral normalization of models’ weights, in order to
check for faster convergence during GAN training.</p>
      <p>However, to understand the degree of security that our system could provide, it would be a great
improvement to have access to more data. The effective deployment of the model on top of a real
CAN bus could result in a different behaviour.</p>
      <p>We expect that Generative Adversarial Networks will play an always greater role in the design of
security and safety systems in the future and that the field of GAN will be a field of fervent academic
and industrial research.
11.References</p>
      <p>Here we report some tables that comprehends more accurate measures on models’ behaviour.
12.Appendix A</p>
      <p>Legend:
= CNN
= RNN
= multi CNN
= multi RNN</p>
      <p>OHV
GIDS</p>
      <p>DCGAN</p>
      <p>WGAN
WGAN-GP</p>
      <p>DCGAN
combined</p>
      <p>WGAN
combined
WGAN-GP
combined</p>
      <p>DCGAN</p>
      <p>WGAN
WGAN-GP</p>
      <p>DCGAN
combined</p>
      <p>WGAN
combined
0.96
0.96
0.7</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. Ge e R.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>A Survey of Vehicle to Everything (V2X) Testing, Sensors</article-title>
          , vol.
          <volume>19</volume>
          , p.
          <fpage>334</fpage>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .3390/s19020334.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Herrewege</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Singelee</surname>
          </string-name>
          and
          <string-name>
            <given-names>I. Verbauwhede</given-names>
            ,
            <surname>CANAuth - A Simple</surname>
          </string-name>
          ,
          <article-title>Backward Compatible Broadcast Authentication Protocol for CAN bus</article-title>
          ,
          <source>in: Proceedings of the ECRYPT Workshop on Lightweight Cryptography</source>
          <year>2011</year>
          ,
          <article-title>Louvain-la-</article-title>
          <string-name>
            <surname>Neuve</surname>
          </string-name>
          , Belgium, pp.
          <fpage>229</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Siddiqui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gui</surname>
          </string-name>
          , J. Plusquellic e
          <string-name>
            <given-names>F.</given-names>
            <surname>Saqib</surname>
          </string-name>
          ,
          <article-title>Secure communication over CANBus</article-title>
          ,
          <source>in: Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, MWSCAS</source>
          <year>2017</year>
          , Boston, MA, USA,
          <year>August</year>
          6-
          <issue>9</issue>
          ,
          <year>2017</year>
          , pp.
          <fpage>1264</fpage>
          -
          <lpage>1267</lpage>
          . doi:
          <volume>10</volume>
          .1109/MWSCAS.
          <year>2017</year>
          .
          <volume>8053160</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Studnia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Alata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Nicomette</surname>
          </string-name>
          , M. Kaâniche e
          <string-name>
            <given-names>Y.</given-names>
            <surname>Laarouchi</surname>
          </string-name>
          ,
          <article-title>A language-based intrusion detection approach for automotive embedded networks</article-title>
          ,
          <source>Int. J. Embed. Syst.</source>
          , vol.
          <volume>10</volume>
          , p.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1504/IJES.
          <year>2018</year>
          .
          <volume>10010488</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Marchetti</surname>
          </string-name>
          e
          <string-name>
            <given-names>D.</given-names>
            <surname>Stabili</surname>
          </string-name>
          ,
          <article-title>Anomaly detection of CAN bus messages through analysis of ID sequences, in: Procedings of the IEEE Intelligent Vehicles Symposium</article-title>
          ,
          <string-name>
            <surname>IV</surname>
          </string-name>
          <year>2017</year>
          , Los Angeles, CA, USA, June 11-14,
          <year>2017</year>
          , pp.
          <fpage>1577</fpage>
          -
          <lpage>1583</lpage>
          . doi:
          <volume>10</volume>
          .1109/IVS.
          <year>2017</year>
          .
          <volume>7995934</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Taylor</surname>
          </string-name>
          , N. Japkowicz e
          <string-name>
            <given-names>S.</given-names>
            <surname>Leblanc</surname>
          </string-name>
          ,
          <article-title>Frequency-based anomaly detection for the automotive CAN bus</article-title>
          ,
          <source>in: Proceedings of the 2015 World Congress on Industrial Control Systems Security, WCICSS</source>
          <year>2015</year>
          , London, United Kingdom,
          <source>December 14-16</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>49</lpage>
          . doi:
          <volume>10</volume>
          .1109/WCICSS.
          <year>2015</year>
          .
          <volume>7420322</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Jeong e H. K. Kim</surname>
          </string-name>
          ,
          <article-title>OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame</article-title>
          ,
          <source>in: Proceedings of the 15th Annual Conference on Privacy, Security and Trust</source>
          ,
          <string-name>
            <surname>PST</surname>
          </string-name>
          <year>2017</year>
          , Calgary, AB, Canada,
          <source>August 28-30</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>66</lpage>
          . doi:
          <volume>10</volume>
          .1109/PST.
          <year>2017</year>
          .
          <volume>00017</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Taylor</surname>
          </string-name>
          , S. Leblanc e
          <string-name>
            <given-names>N.</given-names>
            <surname>Japkowicz</surname>
          </string-name>
          ,
          <article-title>Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks</article-title>
          ,
          <source>in: Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics</source>
          ,
          <string-name>
            <surname>DSAA</surname>
          </string-name>
          <year>2016</year>
          , Montreal, QC, Canada,
          <source>October 17-19</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>130</fpage>
          -
          <lpage>139</lpage>
          . doi:
          <volume>10</volume>
          .1109/DSAA.
          <year>2016</year>
          .
          <volume>20</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tomlinson</surname>
          </string-name>
          , J. W. Bryans e
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Shaikh</surname>
          </string-name>
          ,
          <article-title>Using a one-class compound classifier to detect invehicle network attacks</article-title>
          ,
          <source>in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO</source>
          <year>2018</year>
          , Kyoto, Japan,
          <source>July 15-19</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1926</fpage>
          -
          <lpage>1929</lpage>
          . doi:
          <volume>10</volume>
          .1145/3205651.3208223.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>H. M. Song</surname>
            ,
            <given-names>J. Woo e H. K.</given-names>
          </string-name>
          <string-name>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>In-vehicle network intrusion detection using deep convolutional neural network, Veh</article-title>
          . Commun., vol.
          <volume>21</volume>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .1016/j.vehcom.
          <year>2019</year>
          .
          <volume>100198</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Seo</surname>
          </string-name>
          ,
          <string-name>
            <surname>H. M. Song e H. K. Kim</surname>
          </string-name>
          ,
          <article-title>GIDS: GAN based Intrusion Detection System for In-Vehicle Network</article-title>
          ,
          <source>in: Proceedings of the 16th Annual Conference on Privacy, Security and Trust</source>
          ,
          <string-name>
            <surname>PST</surname>
          </string-name>
          <year>2018</year>
          , Belfast, Northern Ireland, Uk,
          <source>August 28-30</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/PST.
          <year>2018</year>
          .
          <volume>8514157</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Robert</given-names>
            <surname>Bosch</surname>
          </string-name>
          <string-name>
            <surname>GmbH</surname>
          </string-name>
          ,
          <source>CAN specification - version 2.0</source>
          ,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>