Figure 3: Training loss (continuous lines) and validation
loss (dashed lines) of the two models on message ID 290 of
the CrySyS dataset.
Future Work. First of all, the elimination of
the early termination mechanism would potentially
yield better performance; early termination was nec-
essary in our experiments due to hardware-related
constraints. Second, the TCN architecture was kept
very simple on purpose to ensure a computationally
lightweight model. However, the learning abilities of
the network could be improved by increasing the fil-
ter size and the dilation factor between causal con-
volutions, and by stacking additional residual blocks
together. Third, it is worthwhile to investigate how
message-based and signal-based intrusion thresholds,
and the underlying intra-message signal correlation
influence the performance of both models for differ-
ent attack classes. Finally, correlations between sig-
nals across different message IDs could be consid-
ered leading to a more accurate representation of nor-
mal CAN bus behaviour. To this end, an architecture
combining multiple TCN blocks (modeling individual
message IDs a la CANet (Hanselmann et al., 2020))
could be used.
ACKNOWLEDGEMENTS
This work has been partially funded by the European
Commission via the H2020-ECSEL-2017 project SE-
CREDAS (Grant Agreement no. 783119). The re-
search presented in this paper and carried out at the
Budapest University of Technology and Economics
have been supported by the NRDI Office, Ministry
of Innovation and Technology, Hungary, within the
framework of the Artificial Intelligence National Lab-
oratory Programme, and the NRDI Fund based on the
charter of bolster issued by the NRDI Office.
REFERENCES
Aloysius, N. and Geetha, M. (2017). A review on deep
convolutional neural networks. In 2017 International
Conference on Communication and Signal Processing
(ICCSP), pages 0588–0592.
Bai, S., Kolter, J. Z., and Koltun, V. (2018). An empirical
evaluation of generic convolutional and recurrent net-
works for sequence modeling. ArXiv, abs/1803.01271.
Gazdag, A., Ferenczi, C., and Butty
´
an, L. (2020). Develop-
ment of a man-in-the-middle attack device for the can
bus. In 1st Conference on Information Technology and
Data Science.
Gazdag, A., Neubrandt, D., Butty
´
an, L., and Szalay, Z.
(2019). Detection of injection attacks in compressed
can traffic logs. In Hamid, B., Gallina, B., Shabtai,
A., Elovici, Y., and Garcia-Alfaro, J., editors, Secu-
rity and Safety Interplay of Intelligent Software Sys-
tems, pages 111–124, Cham. Springer International
Publishing.
Hanselmann, M., Strauss, T., Dormann, K., and Ulmer, H.
(2020). CANet: An unsupervised intrusion detection
system for high dimensional can bus data. IEEE Ac-
cess, 8:58194–58205.
He, Y. and Zhao, J. (2019). Temporal convolutional net-
works for anomaly detection in time series. Journal
of Physics: Conference Series, 1213:042050.
Hossain, M. A., Inoue, H., Ochiai, H., Fall, D., and
Kadobayashi, Y. (2020). LSTM-based intrusion de-
tection system for in-vehicle can bus communications.
IEEE Access, 8:185489–185502.
Khan, Z., Chowdhury, M., Islam, M., Huang, C.-Y., and
Rahman, M. (2020). Long short-term memory neural
network-based attack detection model for in-vehicle
network security. IEEE Sensors Letters, 4:1–4.
Kukkala, V. K., Thiruloga, S. V., and Pasricha, S. (2020).
INDRA: Intrusion detection using recurrent autoen-
coders in automotive embedded systems. IEEE Trans-
actions on Computer-Aided Design of Integrated Cir-
cuits and Systems, 39:3698–3710.
Lestyan, S.,
´
Acs, G., Bicz
´
ok, G., and Szalay, Z. (2019).
Extracting vehicle sensor signals from CAN logs for
driver re-identification. In Mori, P., Furnell, S., and
Camp, O., editors, Proceedings of the 5th Interna-
tional Conference on Information Systems Security
and Privacy, ICISSP 2019, Prague, Czech Republic,
February 23-25, 2019, pages 136–145. SciTePress.
Lin, Y., Chen, C., Xiao, F., Avatefipour, O., Alsubhi, K., and
Yunianta, A. (2021). An evolutionary deep learning
anomaly detection framework for in-vehicle networks
– CAN bus. IEEE Transactions on Industry Applica-
tions, to appear.
Lokman, S. F., Othman, A. T., Musa, S., and Husaini, A.
B. M. (2019). Deep contractive autoencoder-based
anomaly detection for in-vehicle controller area net-
work (CAN). In Husaini, A. B. M., Sidik, M.,
and Ochsner, A., editors, Progress in Engineering
Technology: Automotive, Energy Generation, Qual-
ity Control and Efficiency, pages 195–205. Springer
International Publishing, Cham.
Detecting Message Modification Attacks on the CAN Bus with Temporal Convolutional Networks
495