Show simple item record

dc.contributor.authorShanker, Shreejith
dc.date.accessioned2022-06-30T07:19:42Z
dc.date.available2022-06-30T07:19:42Z
dc.date.createdAug 29-31en
dc.date.issued2022
dc.date.submitted2022en
dc.identifier.citationShashwat Khandelwal and Shanker Shreejith, A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs, International Conference on Field Programmable Logic and Applications (FPL), Belfast, UK, Aug 29-31, 2022en
dc.identifier.otherY
dc.identifier.urihttp://hdl.handle.net/2262/99602
dc.description.abstractRising connectivity in vehicles is enabling new capabilities like connected autonomous driving and advanced driver assistance systems (ADAS) for improving the safety and reliability of next-generation vehicles. This increased access to in-vehicle functions compromises critical capabilities that use legacy in-vehicle networks like Controller Area Network (CAN), which has no inherent security or authentication mechanism. Intrusion detection and mitigation approaches, particularly using machine learning models, have shown promising results in detecting multiple attack vectors in CAN through their ability to generalise to new vectors. However, most deployments require dedicated computing units like GPUs to perform line-rate detection, consuming much higher power. In this paper, we present a lightweight multi-attack quantised machine learning model that is deployed using Xilinx’s Deep Learning Processing Unit IP on a Zynq Ultrascale+ (XCZU3EG) FPGA, which is trained and validated using the public CAN Intrusion Detection dataset. The quantised model detects denial of service and fuzzing attacks with an accuracy of above 99% and a false positive rate of 0.07%, which are comparable to the state-of-the-art techniques in the literature. The Intrusion Detection System (IDS) execution consumes just 2.0 W with software tasks running on the ECU and achieves a 25% reduction in per-message processing latency over the state-of-the-art implementations. This deployment allows the ECU function to coexist with the IDS with minimal changes to the tasks, making it ideal for real-time IDS in in-vehicle systems.en
dc.language.isoenen
dc.rightsYen
dc.subjectController Area Networken
dc.subjectMachine Learningen
dc.subjectFPGAen
dc.titleA Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAsen
dc.title.alternativeInternational Conference on Field Programmable Logic and Applications (FPL)en
dc.typeConference Paperen
dc.type.supercollectionscholarly_publicationsen
dc.type.supercollectionrefereed_publicationsen
dc.identifier.peoplefinderurlhttp://people.tcd.ie/shankers
dc.identifier.rssinternalid244358
dc.rights.ecaccessrightsopenAccess
dc.relation.sourceCAR Hacking dataseten
dc.subject.TCDThemeSmart & Sustainable Planeten
dc.subject.TCDThemeTelecommunicationsen
dc.subject.TCDTagAutomotive Electronicsen
dc.subject.TCDTagComputer/Data/Network Securityen
dc.subject.TCDTagField Programmable Gate Arrays (FPGAs)en
dc.subject.TCDTagMACHINE LEARNINGen
dc.subject.TCDTagNETWORK SECURITYen
dc.subject.TCDTagReconfigurable Computingen
dc.subject.TCDTagdeep learningen
dc.relation.sourceurihttps://ocslab.hksecurity.net/datasets/can intrusion-dataseten
dc.identifier.orcid_id0000-0002-9717-1804
dc.status.accessibleNen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record