Leverage Sampling Methods and Deep Neural Networks for Fuzzer CAN Bus Message Detection
The Controller Area Network (CAN) is crucial for automotive safety, yet remains vulnerable to various fuzzing attacks that can compromise vehicle operations. This paper presents a comprehensive detection framework that identifies both common CAN vulnerabilities (DoS, Spoofing, Replay, and general Fu...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11009200/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The Controller Area Network (CAN) is crucial for automotive safety, yet remains vulnerable to various fuzzing attacks that can compromise vehicle operations. This paper presents a comprehensive detection framework that identifies both common CAN vulnerabilities (DoS, Spoofing, Replay, and general Fuzzing) and specific fuzzer attack types (identity, replay, random, brute force, and mutation-based) using deep learning-based models. We evaluate four recurrent neural network architectures, including standard RNN, Long Short-Term Memory (LSTM), Bidirectional LSTM (BiLSTM), and Gated Recurrent Unit (GRU), across three CAN datasets: the publicly available Hacking Car and OTIDS datasets, along with our proprietary Multi-FuzzerCAN dataset. To address the inherent class imbalance in attack data, we implement targeted random oversampling and random undersampling techniques tailored to each dataset’s distribution characteristics, significantly improving model performance. Our experimental results demonstrate that all four models achieve exceptional accuracy, recall, precision, and F1 scores across all datasets, with LSTM and BiLSTM architectures consistently outperforming other approaches. These findings establish the viability of combining deep learning models with data balancing techniques to enhance the resilience of automotive CAN networks against diverse cyber threats, especially multi-fuzzer attacks. |
|---|---|
| ISSN: | 2169-3536 |