Next Article in Journal
A Gray-Box Stability Analysis Method of Grid-Connected Inverter Considering Synchronization Dynamics
Previous Article in Journal
A Period Training Method for Heterogeneous UUV Dynamic Task Allocation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Brief Report

Intrusion Detection in Intelligent Connected Vehicles Based on Weighted Self-Information

1
School of Electronic and Information Engineering, Soochow University, Suzhou 215006, China
2
School of Electronic and Information Engineering, Wuxi University, Wuxi 214105, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(11), 2510; https://doi.org/10.3390/electronics12112510
Submission received: 2 May 2023 / Revised: 25 May 2023 / Accepted: 29 May 2023 / Published: 2 June 2023
(This article belongs to the Special Issue Automotive Cyber Security)

Abstract

:
The Internet of Vehicles (IoV) empowers intelligent and tailored services for intelligent connected vehicles (ICVs). However, with the increasing number of onboard external communication interfaces, ICVs face the challenges of malicious network intrusions. The closure of traditional vehicles had led to in-vehicle communication protocols, including the most commonly applied controller area network (CAN), and a lack of security and privacy protection mechanisms. Therefore, to protect the connected vehicles and IoV systems from being attacked, an intrusion-detection method is proposed based on the features extracted from the arbitration identifier (ID) field of CAN messages. Specifically, a sliding window is used to continuously extract a frame of streaming CAN messages first. Afterward, the weighted self-information of the CAN message ID is defined, and both the weighted self-information and the normalized value of an ID are extracted as features. Based on the extracted features, a lightweight one-class classifier, the local outlier factor (LOF), is used to identify the outliers and detect malicious network intrusion attacks. Simulation experiments were conducted based on the public CAN dataset provided by the HCR Lab. The proposed method, using four different one-class classifiers, was analyzed, and it is also benchmarked with three information entropy-based intrusion-detection methods in the literature. The experimental results indicate that, compared to the benchmarks, the proposed method dramatically improves the detection accuracy for injection attacks, namely denial-of-service (DoS) and spoofing, especially when the number of injected messages is low.

1. Introduction

The upcoming 5G-Advance and 6G mobile communication networks can boost the development of the Internet of Vehicles (IoV). In the IoV, by the exploitation of embedded communications, sensing, and information-processing modules, intelligent connected vehicles (ICVs) can intelligently be aware of transportation environments and effectively exchange information with pedestrians, peer vehicles, and roadside infrastructures. The integration of communications, sensing, and computation facilitates ICVs with intelligent services such as advanced driver-assistance systems (ADAS) and autonomous driving [1,2].
Meanwhile, with the increasing number of embedded electronic control units (ECUs) and external communication interfaces, the in-vehicle network (IVN) has been developed from a simple point-to-point control bus to a distributed and heterogeneous communication and control network to guarantee controls and communications among the onboard modules [3]. A diagram of an ICV with a heterogeneous in-vehicle network in the IoV is provided in Figure 1.
With external communication interfaces, the IoV can provide intelligent and tailored services to connected vehicles while bringing potential malicious network intrusion to the IVN. The closure of traditional IVN has resulted in the existing in-vehicle communication protocols, especially the most widely deployed controller area network (CAN), and a lack of security and privacy protection mechanisms, including access control, authentication, and encryption. Due to the lack of access control mechanisms, attackers can directly invade the IVN by cracking external communication interfaces. If malicious intrusion cannot be detected in time, the attacker can manipulate the compromised vehicle by controlling the CAN bus. For example, Miller and Valasek forced a Jeep Cherokee running on the highway to brake and rush to the roadside by remotely intruding on the CAN bus. Chrysler had to recall 1.4 million vehicles [4]. The Keen Security Lab of Tencent implemented the remote intrusion and absolute control of the CAN bus of Tesla S series vehicles in parking and driving states through a Wi-Fi interface, forcing Tesla to update its IVN system [5,6].
Moreover, if the compromised vehicle fails to detect malicious network intrusion in time, the intruder can invade and control other connected vehicles through the IoV. However, the cost of updating and manufacturing makes it difficult to replace current in-vehicle network architecture and communication protocols such as the CAN bus. At the same time, due to the limitations of in-vehicle network resources, the network security mechanisms used for computer networks are too complex to be applied to IVNs directly. Therefore, it is critical to develop intrusion-detection methods for IVNs based on existing network architecture and protocols to detect malicious network intrusions in a timely and accurate manner, thus preventing further attacks and threats.
Malicious intruders manipulate the compromised vehicles by injecting messages. Message injection can incur an abnormal pattern of CAN message information entropy, which is the information entropy of the CAN message arbitration identifier (ID) per unit of time. Therefore, some research efforts have been dedicated to ID entropy-based intrusion detection. Müter and Asaj detected flooding and injection attacks with a specific ID based on the fluctuations of the CAN message ID information entropy and relative entropy in a unit time window for the first time [7]. In [8], the authors further proposed the concept of relative distance to detect an injection attack with a legal ID. Using the information entropy of different message IDs in a unit time window as features, Wu et al. [9] proposed a novel sliding-window strategy with a fixed number of messages to avoid the interference of different baud rates and aperiodic CAN messages on the information entropy. Traditional message information entropy-based intrusion-detection methods can detect flooding attacks and other injection attacks with massive and high-frequency message injections. However, it can hardly detect attacks with few injected messages that have little impact on information entropy.
To resolve the above issues, a CAN message ID features-based intrusion-detection method is proposed in this work. First, a sliding window is used to continuously extract a frame of streaming CAN messages. Subsequently, the weighted self-information of the CAN message ID is defined, and both the weighted self-information and the normalized value of an ID are extracted as features. A lightweight one-class classifier, the local outlier factor (LOF), is then used to identify the outliers and detect malicious network intrusion attacks. Simulations have been conducted based on the public CAN dataset provided by the HCR Lab. The proposed method is analyzed using four different one-class classifiers, namely LOF, support vector data description (SVDD), isolation forest (iForest), and EllipticEnvelope. The traditional information entropy-based intrusion-detection methods in the literature [7,8,9] are adopted as benchmarks. Experimental results indicate that, compared to the benchmarks, the proposed method dramatically improves the detection accuracy of injection attacks, namely denial-of-service (DoS) and spoofing, especially when the number of injected messages is low. The results also unveil that, considering the detection accuracy and the time complexity, LOF is the preferred one-class classifier for this work.
The rest of the paper is organized as follows. The structure of the CAN data frame is introduced in Section 2 first. Afterward, the CAN message ID features-based intrusion-detection method is described in Section 3. In Section 4, the performance of the proposed method is evaluated. Finally, the paper is concluded in Section 5.

2. CAN Data Frame

The structure of the CAN data frame is shown in Figure 2.
  • SOF (Start Of Frame) and EOF (End Of Frame) indicate the range of the data frame.
  • Arbitration ID is a unique identifier for destination receiver filtering and priority identifying. The lower ID indicates the higher priority.
  • RTR (Remote Transfer Request) flags a remote frame.
  • IDE (IDentifier Extension) flags the extension format.
  • RB0 (Reserved Bit 0) is a reserved bit.
  • DLC (Data Length Code) indicates the length of the data payload. Data field comprises the data payload of the message.
  • CRC (Cyclic Redundancy Check) field checks the error of data transmission.
  • ACK (ACKnowledgement) flags the normal CRC.

3. Intrusion Detection Based on CAN Message ID Feature Extraction

The concept of weighted self-information of a CAN message ID is clarified first, followed by the two-dimensional ID features-based intrusion-detection method.

3.1. Weighted Self-Information of CAN Message ID

The structure of the CAN data frame is shown in Figure 2. The message ID occupies 11 bits in the frame, which is used to identify the destination and priority. The lower value of ID indicates a higher priority. Within a time window, the probability of message ID being i is calculated as
p i = n i / n a l l ,
where n i is the number of messages with ID i within the time window, while n a l l is the total number of all the messages within the time window.
The self-information is thus determined by
I i = log 2 p i .
The weighted self-information of a message ID being i is defined as
I i w = p i log 2 p i .
The entropy of message ID within a time window is calculated as
H ( I D ) = i I D I i w = i I D p i log p i ,
where I D is the set of all the message IDs showing up within the time window.

3.2. Local Outlier Factor (LOF)

The local outlier factor is a density-based unsupervised outlier detection method [10]. In this work, it is used as a one-class classifier, which can be applied to unknown attack detection. The LOF is detailed as follows.

3.2.1. k-Distance

For a data point x i in a N sized dataset X , the Euclidean distance to the rest of the data points in the same set is calculated by
d i s t ( x i , x j ) = x i x j 2 , j 1 , N , j i ,
where · 2 is the l 2 norm.
The k-distance of data point x i is denoted as d i s t k ( x i ) . It is defined by there being at least k data points in the rest of the set that meet the condition d i s t ( x i , x j ) d i s t k ( x i ) and at most k 1 data points meet the condition d i s t ( x i , x j ) < d i s t k ( x i ) .
Based on the definition of k-distance, the set of k-nearest neighbors (kNN) of the data point x i is thus defined as
N b k ( x i ) = { x j X j i | d i s t ( x i , x j ) d i s t k ( x i ) } .
Please note that | N b k ( x i ) | k as there is possibly more than one data point with the kth distance.

3.2.2. Reachability Distance

The reachability distance (RD) from data point x i to x j is defined as
R D k ( x i , x j ) = max { d i s t ( x i , x j ) , d i s t k ( x j ) } ,
where d i s t ( x i , x j ) is the Euclidean distance between x i and x j , and d i s t k ( x j ) is the k-distance of x j . Please note that the RD is directional, such that R D k ( x i , x j ) may not be equal to R D k ( x j , x i ) .

3.2.3. Local Reachability Density

Based on kNN and RD, the local reachability density (LRD) of data point x i is given by
L R D k ( x i ) = | N b k ( x i ) | x j N b k ( x i ) R D k ( x i , x j ) ,
which evaluates the average reachability of x i to its kNN.

3.2.4. LOF Score

The LOF score is finally defined as
L O F k ( x i ) = 1 | N b k ( x i ) | x j N b k ( x i ) L R D k ( x j ) L R D k ( x i ) ,
where the local reachability density of data point x i is compared with that of its kNN. The LOF score is used for outlier detection,
L a b e l ( x i ) = i n l i e r , L O F k ( x i ) δ , o u t l i e r , L O F k ( x i ) > δ ,
where δ is the detection threshold determined by the specific applications.

3.3. Intrusion Detection Based on Extracted ID Features

A block diagram of the proposed ID features-based intrusion-detection method is depicted in Figure 3, and the pseudocode is listed in Algorithm 1. The specific procedures are provided as follows.
Algorithm 1 ID Features-based Intrusion Detection
  1:
Input: streaming CAN message number n = 0 , window size n a l l , threshold δ
  2:
while True do
  3:
   cumulate streaming CAN message n = n + 1
  4:
   if  n = n a l l  then
  5:
     # I D is the CAN message ID set of the time window
  6:
     for  i I D  do
  7:
        calculate the weighted self-information of ID i by (3) → I i w
  8:
        normalize the ID i by (11) → i ¯
  9:
        calculate the LOF score of ID i by (9) → L O F k ( [ I i w , i ¯ ] )
10:
        if  L O F k ( [ I i w , i ¯ ] ) > δ  then
11:
           intrusion alert
12:
        end if
13:
     end for
14:
      n = 0
15:
   end if
16:
end while
  • A sliding window is used to accumulate several consecutive messages, where the window size, namely the total number of messages within a sliding window, is n a l l .
  • Features of the message IDs are extracted. In this work, two features are extracted. One is the proposed to be weighted self-information. The other is the normalized ID, which is calculated as
    i ¯ = i / 0 x 07 ff ,
    where i I D , and 0x07ff is the upper limit of CAN message IDs due to the pre-defined length of 11 bits.
  • A lightweight one-class (OC) classifier LOF that takes the two-dimensional ID features as input is used to identify the abnormal messages incurred by the malicious network intrusion.

4. Performance Evaluation

In this section, the practical dataset used for simulation experiments and the metrics used for performance evaluation are introduced first. Subsequently, the simulation experiments are described, and an insightful analysis of the experimental results is provided.

4.1. Experimental Dataset

The public dataset provided by the HCR Lab of Korea University was adopted for the simulation experiments [11]. The dataset used for intrusion detection is described in Table 1. As illustrated in Table 1, we adopted 30,000 samples of the attack-free dataset that were collected from normal driving conditions. For the analysis of DoS and spoofing attack detection, 200 groups of attacks were randomly injected into the dataset, and the number of injected messages ranged from 5 to 50. A DoS attack floods the CAN using the message ID with the highest priority, i.e., 0x0000, to prevent normal communications and services. A spoofing attack pretends to be a normal ECU and sends messages with a legal ID, such as 0x0316, to manipulate the vehicles with malicious operations, such as urgent brake and acceleration. In the simulation experiments, attack-free data were used for classifier training and validation, where the ratios were 80% and 20%, and the data with attacks were used for testing. The window size was fixed at 50.

4.2. Evaluation Metrics

The metrics used for evaluation are accuracy (ACC), precision (PRE), recall (REC), and an F1-score (F1S) [12,13].
A C C = ( T P + T N ) / ( T P + F P + F N + T N ) ,
P R E = T P / ( T P + F P ) ,
R E C = T P / ( T P + F N ) ,
F 1 S = 2 P R E R E C / ( P R E + R E C ) ,
where TP, FN, FP, and TN refer to the true positive, false negative, false positive, and true negative results, respectively.

4.3. Experimental Results

To evaluate the performance of the proposed method, the traditional entropy-based method [7], sliding-window entropy-based method [9], and relative distance-based method [8] were adopted as benchmarks. In terms of the lightweight one-class classifiers, except for the LOF used in this work, SVDD [14], iForest [15], and EllipticEnvelope [16] were also considered.

4.3.1. Analysis of Attack Group Size

The detection accuracy of a DoS attack and spoofing attack under different numbers of injected messages per attack group are provided in Table 2 and Table 3, respectively. From Table 2 and Table 3, we can come to the following conclusions.
  • The relative distance-based method [8] can detect the spoofing attack with different attack group sizes accurately but can hardly be applied to the DoS attack detection due to its definition. In [8], the DoS attack is detected by the traditional entropy-based method [7].
  • The detection accuracy of the DoS attack and spoofing attack using the benchmarks, namely traditional entropy-based method [7] and sliding-window entropy-based method [9], is below 90% when the attack group size is smaller than 20, jumping to around 95% when the attack group size increases to 30. The reason for this is that the traditional methods calculate the overall information entropy of all CAN messages within a time window. Thus, the methods can detect the intrusion with massive and high-frequency message injection but can hardly detect the intrusion with few injected messages that have little impact on the information entropy.
  • The proposed method outperforms the benchmarks, especially when the number of injected messages is low. This is because the proposed method extracts the weighted self-information and normalized ID as features, which considers the information entropy of the messages with different IDs individually. Hence, it is more sensitive to the information entropy variation than the traditional methods considering the information entropy of all the messages.
  • In terms of the proposed method with different one-class classifiers, the detection accuracy of DoS attack ranking in descending order is LOF > SVDD > EllipticEnvelope > iForest. The detection accuracy of spoofing attack ranking in descending order is LOF > SVDD > iForest > EllipticEnvelope.

4.3.2. Analysis of One-Class Classifier

To further analyze the performance of the proposed method with different one-class classifiers under the small-scale attack, the accuracy, precision, recall, and F1-score of DoS and spoofing attack detection under the attack group size of 5 are listed in Table 4 and Table 5, respectively. For DoS attack detection, the average performance of these four metrics in descending order is LOF > SVDD > EllipticEnvelope > iForest. For spoofing attack detection, the average performance of these four metrics in descending order is LOF > iForest > SVDD > EllipticEnvelope.
The time complexity of one-class classifiers is compared in Table 6. It can be seen that the descending order of the complexity of these classifiers is SVDD > LOF > iForest > EllipticEnvelope.
Overall, in terms of detection accuracy, LOF and SVDD perform better than iForest and EllipticEnvelope. For time complexity, iForest and EllipticEnvelope are less complex than SVDD and LOF. Thus, there is a tradeoff between detection accuracy and time complexity. Considering the detection accuracy and the time complexity, LOF is the preferred one-class classifier for this work.

5. Conclusions

To protect connected vehicles and IoV systems from being attacked, a CAN message ID features-based intrusion-detection method was proposed in this work. First, a sliding window was used to continuously extract a frame of streaming CAN messages. Afterward, the weighted self-information of the CAN message ID was defined, and both the weighted self-information and the normalized value of an ID were extracted as features. Subsequently, a lightweight one-class classifier LOF was used to identify the outliers and detect the malicious network intrusion attack. Simulations were conducted based on a public CAN dataset. The proposed method was analyzed with four different one-class classifiers, namely LOF, SVDD, iForest, and EllipticEnvelope. The three traditional information entropy-based intrusion-detection methods were adopted as benchmarks. The experimental results indicated that the proposed method dramatically improved the detection accuracy of DoS and spoofing attacks compared to the benchmarks, especially when the number of injected messages was low. Furthermore, LOF was the preferred one-class classifier for the proposed ID features-based intrusion detection based on the analysis of the detection accuracy and time complexity.

Author Contributions

Conceptualization, T.Y. and J.H.; methodology, T.Y.; software, J.Y.; validation, T.Y., J.H. and J.Y.; formal analysis, T.Y.; investigation, J.H.; resources, J.H.; data curation, T.Y.; writing—original draft preparation, T.Y.; writing—review and editing, T.Y.; visualization, T.Y.; supervision, J.H.; project administration, J.H. and T.Y.; funding acquisition, T.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 62101373 and the Natural Science Foundation of Jiangsu Province under Grant BK20200858.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACKACKnowledgement
ADASadvanced driver-assistance systems
CANcontroller area network
CRCcyclic redundancy check
DLCdata length code
ECUelectronic control unit
EOFend of frame
ICVintelligent connected vehicle
IDidentifier in arbitration field
IDEidentifier extension
iForestisolation forest
IoVInternet of Vehicles
IVNin-vehicle network
LOFlocal outlier factor
RB0reserved bit 0
RTRremote transfer request
SVDDsupport vector data description

References

  1. Qi, Q.; Chen, X.; Khalili, A.; Zhong, C.; Zhang, Z.; Ng, D.W. Integrating sensing, computing, and communication in 6G wireless networks: Design and optimization. IEEE Trans. Commun. 2022, 70, 6212–6227. [Google Scholar] [CrossRef]
  2. Tang, F.; Kawamoto, Y.; Kato, N.; Liu, J. Future intelligent and secure vehicular network toward 6G: Machine-learning approaches. Proc. IEEE 2020, 108, 292–307. [Google Scholar] [CrossRef]
  3. Wu, W.; Li, R.; Xie, G.; An, J.; Bai, Y.; Zhou, J.; Li, K. A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 2020, 21, 919–933. [Google Scholar] [CrossRef]
  4. Miller, C.; Valasek, C. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 2015, 1–91. [Google Scholar]
  5. Nie, S.; Liu, L.; Du, Y. Free-fall: Hacking tesla from wireless to can bus. Brief. Black Hat USA 2017, 25, 1–16. [Google Scholar]
  6. Nie, S.; Liu, L.; Du, Y.; Zhang, W. Over-the-air: How we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars. Brief. Black Hat USA 2018, 1–19. [Google Scholar]
  7. Müter, M.; Asaj, N. Entropy-based anomaly detection for in-vehicle networks. In Proceedings of the 2011 IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany, 5–9 June 2011; pp. 1110–1115. [Google Scholar]
  8. Yu, H.; Qin, G.; Sun, M.; Yan, X.; Wang, X. Cyber security and anomaly detection method for in-vehicle CAN. J. Jilin Univ. (Eng. Technol. Ed.) 2016, 46, 1246–1253. [Google Scholar]
  9. Wu, W.; Huang, Y.; Kurachi, R.; Zeng, G.; Xie, G.; Li, R.; Li, K. Sliding window optimized information entropy analysis method for intrusion detection on in-vehicle networks. IEEE Access 2018, 6, 45233–45245. [Google Scholar] [CrossRef]
  10. Breunig, M.M.; Kriegel, H.P.; Ng, R.T.; Sander, J. LOF: Identifying density-based local outliers. In Proceedings of the SIGMOD/PODS00: ACM International Conference on Management of Data and Symposium on Principles of Database Systems, Dallas, TX, USA, 15–18 May 2000; pp. 93–104. [Google Scholar]
  11. Lee, H.; Jeong, S.H.; Kim, H.K. OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame. In Proceedings of the 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, Canada, 28–30 August 2017; pp. 57–5709. [Google Scholar]
  12. Ji, H.J.; Wang, Y.P.; Qin, H.M.; Wang, Y.J.; Li, H.G. Comparative performance evaluation of intrusion detection methods for in-vehicle networks. IEEE Access 2018, 6, 37523–37532. [Google Scholar] [CrossRef]
  13. Wang, K.; Zhang, A.H.; Sun, H.R.; Wang, B.L. Analysis of recent deep-learning-based intrusion detection methods for in-vehicle network. IEEE Trans. Intell. Transp. Syst. 2023, 24, 1843–1854. [Google Scholar] [CrossRef]
  14. Tax, D.M.; Duin, R.P. Support vector data description. Mach. Learn. 2004, 54, 45–66. [Google Scholar] [CrossRef] [Green Version]
  15. Liu, F.T.; Ting, K.M.; Zhou, Z.H. Isolation forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; pp. 413–422. [Google Scholar]
  16. Rousseeuw, P.J.; Driessen, K.V. A fast algorithm for the minimum covariance determinant estimator. Technometrics 1999, 41, 212–223. [Google Scholar] [CrossRef]
Figure 1. Diagram of an intelligent connected vehicle with a heterogeneous in-vehicle network in the Internet of Vehicles.
Figure 1. Diagram of an intelligent connected vehicle with a heterogeneous in-vehicle network in the Internet of Vehicles.
Electronics 12 02510 g001
Figure 2. Structure of CAN data frame.
Figure 2. Structure of CAN data frame.
Electronics 12 02510 g002
Figure 3. Diagram of the intrusion detection based on extracted ID features.
Figure 3. Diagram of the intrusion detection based on extracted ID features.
Electronics 12 02510 g003
Table 1. Experimental Dataset.
Table 1. Experimental Dataset.
CountID Range
Attack-free30,0000x0001∼0x07ff
DoS Attack31,000∼40,0000x0000∼0x07ff
Spoofing Attack31,000∼40,0000x0001∼0x07ff
Table 2. DoS attack detection accuracy vs attack group size.
Table 2. DoS attack detection accuracy vs attack group size.
Attack Group Size51020304050
Traditional Entropy79.0280.4681.5595.9496.2794.22
Sliding-Window Entropy78.5981.2585.3894.2695.6895.33
Relative Distance
Proposed + LOF97.4297.7397.5597.8597.7897.78
Proposed + SVDD97.1197.0797.0396.9896.8297.32
Proposed + iForest83.4682.5284.9582.3281.4980.72
Proposed + EllipticEnvelope89.9589.7690.1789.8589.4990.06
Table 3. Spoofing Attack Detection Accuracy vs Attack Group Size.
Table 3. Spoofing Attack Detection Accuracy vs Attack Group Size.
Attack Group Size51020304050
Entropy78.0378.9380.1097.1596.4695.15
Sliding-Window Entropy73.4679.3182.8694.3695.8494.18
Relative Distance99.2799.8099.2598.3097.2295.72
Proposed + LOF98.3398.5298.3398.6298.5398.59
Proposed + SVDD96.2896.8796.5396.8296.5296.20
Proposed + iForest98.0597.8997.6795.3990.6091.38
Proposed + EllipticEnvelope89.6589.7890.0089.7389.3889.09
Table 4. DoS Attack Detection: Attack Group Size = 5.
Table 4. DoS Attack Detection: Attack Group Size = 5.
ClassifierAccuracyPrecisionRecallF1-Score
LOF97.4297.9699.4498.69
SVDD97.1199.9397.0598.49
iForest83.4699.6383.190.54
EllipticEnvelope89.9599.1690.2694.56
Table 5. Spoofing Attack Detection: Attack Group Size = 5.
Table 5. Spoofing Attack Detection: Attack Group Size = 5.
ClassifierAccuracyPrecisionRecallF1-Score
LOF98.3398.8799.4599.16
SVDD96.8299.9096.8498.36
iForest98.0599.9298.0798.99
EllipticEnvelope89.6598.8690.5594.52
Table 6. Time Complexity of One-Class Classifier.
Table 6. Time Complexity of One-Class Classifier.
ClassifierLOFSVDDiForestEllipticEnvelope
Complexity O ( n 2 ) O ( n 3 ) O ( n l o g n ) O ( n )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, T.; Hu, J.; Yang, J. Intrusion Detection in Intelligent Connected Vehicles Based on Weighted Self-Information. Electronics 2023, 12, 2510. https://doi.org/10.3390/electronics12112510

AMA Style

Yu T, Hu J, Yang J. Intrusion Detection in Intelligent Connected Vehicles Based on Weighted Self-Information. Electronics. 2023; 12(11):2510. https://doi.org/10.3390/electronics12112510

Chicago/Turabian Style

Yu, Tianqi, Jianling Hu, and Jianfeng Yang. 2023. "Intrusion Detection in Intelligent Connected Vehicles Based on Weighted Self-Information" Electronics 12, no. 11: 2510. https://doi.org/10.3390/electronics12112510

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop