{"id":"https://openalex.org/W4399477579","doi":"https://doi.org/10.1145/3626232.3653249","title":"A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks","display_name":"A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks","publication_year":2024,"publication_date":"2024-06-10","ids":{"openalex":"https://openalex.org/W4399477579","doi":"https://doi.org/10.1145/3626232.3653249"},"language":"en","primary_location":{"id":"doi:10.1145/3626232.3653249","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3626232.3653249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062800510","display_name":"Maisha Maliha","orcid":"https://orcid.org/0009-0008-3260-3240"},"institutions":[{"id":"https://openalex.org/I141649380","display_name":"Western Michigan University","ror":"https://ror.org/04j198w64","country_code":"US","type":"education","lineage":["https://openalex.org/I141649380"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Maisha Maliha","raw_affiliation_strings":["Western Michigan University, Kalamazoo, MI, USA"],"affiliations":[{"raw_affiliation_string":"Western Michigan University, Kalamazoo, MI, USA","institution_ids":["https://openalex.org/I141649380"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077299535","display_name":"Shameek Bhattacharjee","orcid":"https://orcid.org/0000-0003-3596-9447"},"institutions":[{"id":"https://openalex.org/I141649380","display_name":"Western Michigan University","ror":"https://ror.org/04j198w64","country_code":"US","type":"education","lineage":["https://openalex.org/I141649380"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shameek Bhattacharjee","raw_affiliation_strings":["Western Michigan University, Kalamazoo, MI, USA"],"affiliations":[{"raw_affiliation_string":"Western Michigan University, Kalamazoo, MI, USA","institution_ids":["https://openalex.org/I141649380"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062800510"],"corresponding_institution_ids":["https://openalex.org/I141649380"],"apc_list":null,"apc_paid":null,"fwci":0.4449,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61005976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.789955735206604},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7460336685180664},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.6408452987670898},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.5633148550987244},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.5018332004547119},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3641124665737152},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3400285542011261},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.16583964228630066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.789955735206604},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7460336685180664},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.6408452987670898},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.5633148550987244},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.5018332004547119},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3641124665737152},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3400285542011261},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.16583964228630066},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3626232.3653249","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3626232.3653249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1567102157","https://openalex.org/W1629374427","https://openalex.org/W1988512354","https://openalex.org/W2046456139","https://openalex.org/W2156204309","https://openalex.org/W2464037380","https://openalex.org/W2744926043","https://openalex.org/W2751144136","https://openalex.org/W2792633639","https://openalex.org/W2892564986","https://openalex.org/W2897929592","https://openalex.org/W2906301639","https://openalex.org/W2962444737","https://openalex.org/W2970148885","https://openalex.org/W2990167939","https://openalex.org/W3007940922","https://openalex.org/W3106212564","https://openalex.org/W3140476622","https://openalex.org/W3204533646","https://openalex.org/W4223952478","https://openalex.org/W4229070083","https://openalex.org/W4308605894","https://openalex.org/W6950685506"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2364419519","https://openalex.org/W2360767377","https://openalex.org/W2017948608","https://openalex.org/W2360951146","https://openalex.org/W2622688551","https://openalex.org/W1550175370","https://openalex.org/W1990205660"],"abstract_inverted_index":{"Modern":[0],"smart":[1],"vehicles":[2],"have":[3],"a":[4,35,58,80,90,98,127,157,169,200],"Controller":[5],"Area":[6],"Network":[7],"(CAN)":[8],"that":[9,38,106,142,163],"supports":[10],"intra-vehicle":[11],"communication":[12],"between":[13,180],"intelligent":[14],"Electronic":[15],"Control":[16],"Units":[17],"(ECUs).":[18],"The":[19],"CAN":[20,66,71,87],"is":[21],"known":[22],"to":[23,26,78,125,185,204],"be":[24],"vulnerable":[25],"various":[27],"cyber":[28,44],"attacks.":[29],"In":[30],"this":[31],"paper,":[32],"we":[33,56,96,132,155],"propose":[34],"unified":[36],"framework":[37,207],"can":[39],"detect":[40],"multiple":[41],"types":[42],"of":[43,48,65,84,109,116,136,151],"attacks":[45],"(viz.,":[46],"Denial":[47],"Service,":[49],"Fuzzy,":[50],"Impersonation)":[51],"affecting":[52],"the":[53,62,70,85,119,134,137,144],"CAN.":[54],"Specifically,":[55],"construct":[57,79],"feature":[59],"by":[60,177],"observing":[61],"timing":[63],"information":[64],"packets":[67],"exchanged":[68],"over":[69,74],"bus":[72],"network":[73,88],"partitioned":[75],"time":[76,91,121,171,184],"windows":[77],"low":[81],"dimensional":[82],"representation":[83],"entire":[86],"as":[89],"series":[92,122,172],"latent":[93,123,129,140],"space.":[94],"Then,":[95,131],"apply":[97],"two":[99],"tier":[100],"anomaly":[101,173],"based":[102,159,174],"intrusion":[103,175],"detection":[104,146,189],"model":[105],"keeps":[107],"track":[108],"short":[110],"term":[111,114],"and":[112,187,195,208],"long":[113],"memory":[115],"deviations":[117],"in":[118],"initial":[120],"space,":[124],"create":[126],"'stateful":[128],"space'.":[130],"learn":[133],"boundaries":[135],"benign":[138,194],"stateful":[139],"space":[141],"specify":[143],"attack":[145,196],"criterion.":[147],"To":[148],"find":[149],"hyper-parameters":[150],"our":[152,206,211],"proposed":[153],"model,":[154],"formulate":[156],"preference":[158],"multi-objective":[160],"optimization":[161],"problem":[162],"optimizes":[164],"security":[165],"objectives":[166],"tailored":[167],"for":[168],"network-wide":[170],"detector":[176],"balancing":[178],"trade-offs":[179],"false":[181],"alarm":[182],"count,":[183],"detection,":[186],"missed":[188],"rate.":[190],"We":[191],"use":[192],"real":[193],"datasets":[197],"collected":[198],"from":[199],"Kia":[201],"Soul":[202],"vehicle":[203],"validate":[205],"show":[209],"how":[210],"performance":[212],"outperforms":[213],"existing":[214],"works.":[215]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
