{"id":"https://openalex.org/W4317600390","doi":"https://doi.org/10.1109/aiccsa56895.2022.10017800","title":"CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model","display_name":"CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model","publication_year":2022,"publication_date":"2022-12-01","ids":{"openalex":"https://openalex.org/W4317600390","doi":"https://doi.org/10.1109/aiccsa56895.2022.10017800"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa56895.2022.10017800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa56895.2022.10017800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016380325","display_name":"Natasha Alkhatib","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Natasha Alkhatib","raw_affiliation_strings":["T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","D\u00e9partement Communications & Electronique","Secure and Safe Hardware"],"affiliations":[{"raw_affiliation_string":"T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","institution_ids":[]},{"raw_affiliation_string":"D\u00e9partement Communications & Electronique","institution_ids":[]},{"raw_affiliation_string":"Secure and Safe Hardware","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048830959","display_name":"Maria Mushtaq","orcid":"https://orcid.org/0000-0003-0046-2582"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maria Mushtaq","raw_affiliation_strings":["T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","D\u00e9partement Communications & Electronique","Secure and Safe Hardware"],"affiliations":[{"raw_affiliation_string":"T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","institution_ids":[]},{"raw_affiliation_string":"D\u00e9partement Communications & Electronique","institution_ids":[]},{"raw_affiliation_string":"Secure and Safe Hardware","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112891552","display_name":"Hadi Ghauch","orcid":null},"institutions":[{"id":"https://openalex.org/I4210151275","display_name":"Laboratoire d\u2019Ing\u00e9nierie des Syst\u00e8mes Physiques et Num\u00e9riques","ror":"https://ror.org/055449294","country_code":"FR","type":"facility","lineage":["https://openalex.org/I190752583","https://openalex.org/I190861549","https://openalex.org/I4210134562","https://openalex.org/I4210151275"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Hadi Ghauch","raw_affiliation_strings":["T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","Communications Num\u00e9riques","D\u00e9partement Communications & Electronique"],"affiliations":[{"raw_affiliation_string":"T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","institution_ids":[]},{"raw_affiliation_string":"Communications Num\u00e9riques","institution_ids":["https://openalex.org/I4210151275"]},{"raw_affiliation_string":"D\u00e9partement Communications & Electronique","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054213189","display_name":"Jean\u2010Luc Danger","orcid":"https://orcid.org/0000-0001-5063-7964"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jean-Luc Danger","raw_affiliation_strings":["T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","D\u00e9partement Communications & Electronique","Secure and Safe Hardware"],"affiliations":[{"raw_affiliation_string":"T&#x00E9;l&#x00E9;com Paris, IP Paris,Palaiseau,France","institution_ids":[]},{"raw_affiliation_string":"D\u00e9partement Communications & Electronique","institution_ids":[]},{"raw_affiliation_string":"Secure and Safe Hardware","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016380325"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.8263,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.96580512,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9559000134468079,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8333078622817993},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6855984330177307},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.6218990683555603},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5395158529281616},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5290740132331848},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5092986822128296},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5071930885314941},{"id":"https://openalex.org/keywords/can-bus","display_name":"CAN bus","score":0.49878764152526855},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.49366244673728943},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3569289743900299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3077252507209778},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.226437509059906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8333078622817993},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6855984330177307},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.6218990683555603},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5395158529281616},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5290740132331848},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5092986822128296},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5071930885314941},{"id":"https://openalex.org/C201762086","wikidata":"https://www.wikidata.org/wiki/Q728183","display_name":"CAN bus","level":2,"score":0.49878764152526855},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.49366244673728943},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3569289743900299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3077252507209778},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.226437509059906}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/aiccsa56895.2022.10017800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa56895.2022.10017800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-04260887v1","is_oa":false,"landing_page_url":"https://telecom-paris.hal.science/hal-04260887","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA), Dec 2022, Abu Dhabi, United Arab Emirates. pp.1-8, &#x27E8;10.1109/AICCSA56895.2022.10017800&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W1522301498","https://openalex.org/W1995443851","https://openalex.org/W2025768430","https://openalex.org/W2128728535","https://openalex.org/W2896457183","https://openalex.org/W2948384692","https://openalex.org/W2979202956","https://openalex.org/W3163001200","https://openalex.org/W3166388161","https://openalex.org/W3175560839","https://openalex.org/W3197115256","https://openalex.org/W3199174176","https://openalex.org/W3217476834","https://openalex.org/W4205488935","https://openalex.org/W4205965165","https://openalex.org/W4385245566","https://openalex.org/W4385605314","https://openalex.org/W6631190155","https://openalex.org/W6780226713"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"Due":[0],"to":[1,106,164,167,176],"the":[2,21,25,28,32,46,53,66,75,117,122,129,136,147],"rising":[3],"number":[4],"of":[5,78,124,191,196],"sophisticated":[6],"customer":[7],"functionalities,":[8],"electronic":[9],"control":[10],"units":[11],"(ECUs)":[12],"are":[13],"increasingly":[14],"integrated":[15],"into":[16],"modern":[17],"automotive":[18],"systems.":[19],"However,":[20],"high":[22],"connectivity":[23],"between":[24,197],"in-vehicle":[26,39,57,169],"and":[27,62,199],"external":[29],"networks":[30],"paves":[31],"way":[33],"for":[34,85,132],"hackers":[35],"who":[36],"could":[37],"exploit":[38],"network":[40,102],"protocols'":[41],"vulnerabilities.":[42],"Among":[43],"these":[44],"protocols,":[45],"Controller":[47],"Area":[48],"Network":[49],"(CAN),":[50],"known":[51],"as":[52],"most":[54],"widely":[55],"used":[56],"networking":[58],"technology,":[59],"lacks":[60],"encryption":[61],"authentication":[63],"mechanisms,":[64],"making":[65],"communications":[67],"delivered":[68],"by":[69,74],"distributed":[70],"ECUs":[71],"insecure.":[72],"Inspired":[73],"outstanding":[76],"performance":[77],"bidirectional":[79],"encoder":[80],"representations":[81],"from":[82],"transformers":[83],"(BERT)":[84],"improving":[86],"many":[87],"natural":[88],"language":[89,138],"processing":[90],"tasks,":[91],"we":[92],"propose":[93],"in":[94,128,171],"this":[95],"paper":[96],"\u201cCAN-BERT\u201d,":[97],"a":[98,188],"deep":[99],"learning":[100],"based":[101],"intrusion":[103],"detection":[104,134],"system,":[105],"detect":[107,187],"cyber":[108],"attacks":[109],"on":[110,146],"CAN":[111,130,180],"bus":[112,131],"protocol.":[113],"We":[114],"show":[115,156],"that":[116,157],"BERT":[118],"model":[119],"can":[120,185],"learn":[121],"sequence":[123,182],"arbitration":[125],"identifiers":[126],"(IDs)":[127],"anomaly":[133],"using":[135],"\u201cmasked":[137],"model\u201d":[139],"unsupervised":[140],"training":[141],"objective.":[142],"The":[143],"experimental":[144],"results":[145],"\u201cCar":[148],"Hacking:":[149],"Attack":[150],"&":[151],"Defense":[152],"Challenge":[153],"2020\u201d":[154],"dataset":[155],"\u201cCAN-BERT\u201d":[158],"outperforms":[159],"state-of-the-art":[160],"approaches.":[161],"In":[162],"addition":[163],"being":[165],"able":[166],"identify":[168],"intrusions":[170],"real-time":[172],"within":[173],"0.8":[174],"ms":[175,178],"3":[177],"w.r.t":[179],"ID":[181],"length,":[183],"it":[184],"also":[186],"wide":[189],"variety":[190],"cyberattacks":[192],"with":[193],"an":[194],"F1-score":[195],"0.81":[198],"0.99.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
