CANLP: Intrusion Detection for Controller Area Networks using Natural Language Processing and Embedded Machine Learning
| dc.contributor.advisor | Poovendran, Radha | |
| dc.contributor.author | Balasubramanian, Kavya | |
| dc.date.accessioned | 2024-10-16T03:12:52Z | |
| dc.date.issued | 2024-10-16 | |
| dc.date.submitted | 2024 | |
| dc.description | Thesis (Master's)--University of Washington, 2024 | |
| dc.description.abstract | The Controller Area Network (CAN) protocol is the most widely used standard in the automotive industry for in-vehicle networks. However, the CAN protocol lacks essential security features such as encryption and message authentication. Absence of such security features has been shown to make the vehicle network vulnerable to exploits by an adversary. Although multiple types ofintrusion detection systems (IDS) have been developed for CAN, it can be difficult to deploy them in real-time with low latency. Many of these IDSs are unable to isolate a specific transmitting Electronic Control Unit (ECU) and CAN frame on which an attack has been mounted, which makes it challenging to design defense mechanisms. In this thesis, we develop CANLP, a Natural Language Processing (NLP)-based intrusion detection system to determine whether each transmitted message originated from a legitimate ECU or an adversary. CANLP uses Term Frequency-Inverse Document Frequency (TF-IDF), a NLP technique to discern complex features associated with CAN data and trains machine learning models to identify three types of attacks- fuzzing, spoofing, and masquerade. When an attack is detected, CANLP identifies the compromised transmitter ECU and malicious CAN frame, which is important for developing resilient systems. Extensive experiments on 4 publicly available vehicle network datasets (which represent data collected from over three vehicle makes and four models) show that CANLP performs attack classification with high F1-scores of 0.9974. We also show thatCANLP can be deployed for attack detection on resource-constrained hardware through experiments on a testbed with latency as low as < 0.05 ms, hence improving the accuracy-compute tradeoff and making it perfect for real-world automotive applications. | |
| dc.embargo.lift | 2025-10-16T03:12:52Z | |
| dc.embargo.terms | Restrict to UW for 1 year -- then make Open Access | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.other | Balasubramanian_washington_0250O_27483.pdf | |
| dc.identifier.uri | https://hdl.handle.net/1773/52497 | |
| dc.language.iso | en_US | |
| dc.rights | CC BY-NC-ND | |
| dc.subject | Controller Area Network | |
| dc.subject | Deep Learning | |
| dc.subject | Embedded ML | |
| dc.subject | Intrusion Detection | |
| dc.subject | Natural Language Processing | |
| dc.subject | Security | |
| dc.subject | Electrical engineering | |
| dc.subject | Computer science | |
| dc.subject.other | Electrical and computer engineering | |
| dc.title | CANLP: Intrusion Detection for Controller Area Networks using Natural Language Processing and Embedded Machine Learning | |
| dc.type | Thesis |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Balasubramanian_washington_0250O_27483.pdf
- Size:
- 3.79 MB
- Format:
- Adobe Portable Document Format
