Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Hybrid RNN-LSTM Networks for Enhanced Intrusion Detection in Vehicle CAN Systems

View through CrossRef
Electric vehicles (EVs) use electric motors for propulsion, relying on electric energy stored in batteries or other energy storage devices. The standard communication protocol used in EVs is the Control Area Network (CAN), a communication protocol widely used in the automotive industry for networking and communication between various components within a vehicle. CAN protocol, designed without any care about protection, as automotive systems become more connected, the vulnerability to cyber threats, including intrusion attacks. The most common intrusion attacks on EVs are Denial of Service (DoS), Fuzzy, and Impersonation Attacks. These become a significant challenge due to the imperative need for robust Intrusion Detection Systems (IDS) in CAN networks. This paper explores the application of advanced deep learning techniques, specifically Recurrent Neural Networks (RNN) and Long Short-Term Memory (LSTM) networks, to enhance the effectiveness of intrusion detection in the EV domain. We will use a hybrid Deep-learning model to improve the analysis. First, we will apply the RNN model, and the output will come as input for the second model, LSTM. Our proposed hybrid model achieved an accuracy of 93%. The outcomes of this research contribute to advancing cybersecurity measures in vehicular networks, ensuring the integrity and safety of connected vehicles. The applicability of RNN and LSTM techniques in the context of CAN networks demonstrates their potential to evolve as integral components of next-generation intrusion detection systems, fostering a secure and resilient automotive ecosystem.   
Title: Hybrid RNN-LSTM Networks for Enhanced Intrusion Detection in Vehicle CAN Systems
Description:
Electric vehicles (EVs) use electric motors for propulsion, relying on electric energy stored in batteries or other energy storage devices.
The standard communication protocol used in EVs is the Control Area Network (CAN), a communication protocol widely used in the automotive industry for networking and communication between various components within a vehicle.
CAN protocol, designed without any care about protection, as automotive systems become more connected, the vulnerability to cyber threats, including intrusion attacks.
The most common intrusion attacks on EVs are Denial of Service (DoS), Fuzzy, and Impersonation Attacks.
These become a significant challenge due to the imperative need for robust Intrusion Detection Systems (IDS) in CAN networks.
This paper explores the application of advanced deep learning techniques, specifically Recurrent Neural Networks (RNN) and Long Short-Term Memory (LSTM) networks, to enhance the effectiveness of intrusion detection in the EV domain.
We will use a hybrid Deep-learning model to improve the analysis.
First, we will apply the RNN model, and the output will come as input for the second model, LSTM.
Our proposed hybrid model achieved an accuracy of 93%.
The outcomes of this research contribute to advancing cybersecurity measures in vehicular networks, ensuring the integrity and safety of connected vehicles.
The applicability of RNN and LSTM techniques in the context of CAN networks demonstrates their potential to evolve as integral components of next-generation intrusion detection systems, fostering a secure and resilient automotive ecosystem.
  .

Related Results

Energy-efficient architectures for recurrent neural networks
Energy-efficient architectures for recurrent neural networks
Deep Learning algorithms have been remarkably successful in applications such as Automatic Speech Recognition and Machine Translation. Thus, these kinds of applications are ubiquit...
Optimization Of Intrusion Detection Using Likely Point PSO And Enhanced LSTM-RNN Hybrid Technique In Communication Networks
Optimization Of Intrusion Detection Using Likely Point PSO And Enhanced LSTM-RNN Hybrid Technique In Communication Networks
“Intrusion detection system (IDS)” is a significant component of maintaining secure communication networks and all network managers have embraced it to their happiness.  Several me...
RNN-LSTM BASED REGULAR HEALTH FACTOR ANALYSIS IN MEDICAL ENVIRONMENT
RNN-LSTM BASED REGULAR HEALTH FACTOR ANALYSIS IN MEDICAL ENVIRONMENT
In an era where fast-paced routines, high stress, and unhealthy habits have become the norm, modern society is facing a surge in health problems such as high blood pressure, diabet...
Runoff Simulation in Data-Scarce Alpine Regions: Comparative Analysis Based on LSTM and Physically Based Models
Runoff Simulation in Data-Scarce Alpine Regions: Comparative Analysis Based on LSTM and Physically Based Models
Runoff simulation is essential for effective water resource management and plays a pivotal role in hydrological forecasting. Improving the quality of runoff simulation and forecast...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Heteroscedasticity effects as component to future stock market predictions using RNN-based models
Heteroscedasticity effects as component to future stock market predictions using RNN-based models
Heteroscedasticity effects are useful for forecasting future stock return volatility. Stock volatility forecasting provides business insight into the stock market, making it valuab...
Comparative Evaluation of Deep Learning Techniques in Streamflow Monthly Prediction of the Zarrine River Basin
Comparative Evaluation of Deep Learning Techniques in Streamflow Monthly Prediction of the Zarrine River Basin
Predicting monthly streamflow is essential for hydrological analysis and water resource management. Recent advancements in deep learning, particularly long short-term memory (LSTM)...
A Deep Learning Framework for Intrusion Detection and Multimodal Biometric Image Authentication
A Deep Learning Framework for Intrusion Detection and Multimodal Biometric Image Authentication
Nowadays, a demand is increased all over the world in the field of information security and security regulations. Intrusion detection (ID) plays a significant role in providing sec...

Back to Top