Print Email Facebook Twitter Detecting Message Modification Attacks on the CAN Bus with Temporal Convolutional Networks Title Detecting Message Modification Attacks on the CAN Bus with Temporal Convolutional Networks Author Chiscop, I. Gazdag, A. Bosman, J. Biczók, G. Publication year 2021 Abstract Multiple attacks have shown that in-vehicle networks have vulnerabilities which can be exploited. Securing the Controller Area Network (CAN) for modern vehicles has become a necessary task for car manufacturers. Some attacks inject potentially large amount of fake messages into the CAN network; however, such attacks are relatively easy to detect. In more sophisticated attacks, the original messages are modified, making the detection a more complex problem. In this paper, we present a novel machine learning based intrusion detection method for CAN networks. We focus on detecting message modification attacks, which do not change the timing patterns of communications. Our proposed temporal convolutional network-based solution can learn the normal behavior of CAN signals and differentiate them from malicious ones. The method is evaluated on multiple CAN-bus message IDs from two public datasets including different types of attacks. Performance results show that our lightweight approach compares favorably to the state-of-the-art unsupervised learning approach, achieving similar or better accuracy for a wide range of scenarios with a significantly lower false positive rate. Subject Vehicle SecurityIntrusion DetectionController Area NetworkMachine LearningTemporal Convolutional networks To reference this document use: http://resolver.tudelft.nl/uuid:9eefd274-e879-4e49-acae-f3eeed64c1ab TNO identifier 956091 Source Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), 488-496 Document type conference paper Files To receive the publication files, please send an e-mail request to TNO Library.