Real-Time Threat Intelligence Integration for Cybersecurity in Autonomous Vehicles - A Deep Learning Framework: Integrates real-time threat intelligence into cybersecurity systems for AVs using a deep learning framework

Authors

  • Dr. Mehmet Akın Associate Professor of Electrical Engineering, Istanbul Technical University, Turkey Author

Keywords:

Indicators of Compromise, Convolutional Neural Networks, Threat Indicators,

Abstract

The increasing dependence of Autonomous Vehicles (AVs) on complex software and network connectivity makes them vulnerable to cyberattacks. These attacks can potentially compromise control systems, leading to safety hazards and disruption of critical infrastructure. Real-time Threat Intelligence (RTTI) plays a crucial role in mitigating these risks by providing up-to-date information about emerging threats and vulnerabilities. This research paper proposes a deep learning framework for integrating RTTI into the cybersecurity systems of AVs.

The paper begins by outlining the cybersecurity challenges faced by AVs. The interconnected nature of AVs, with various sensors, communication modules, and control systems, creates a vast attack surface for malicious actors. Traditional signature-based intrusion detection systems struggle to keep pace with the evolving threat landscape.

This paper then explores the concept of RTTI and its benefits for AV cybersecurity. RTTI provides continuous insights into ongoing cyber threats, including attack vectors, vulnerabilities, and indicators of compromise (IOCs). By integrating RTTI with AV systems, we can proactively identify and respond to potential attacks, minimizing the risk of successful exploits.

The core of the paper presents a deep learning framework designed for real-time threat detection in AVs. The framework leverages the strengths of deep learning architectures, such as Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks, to analyze data streams from various AV sensors and network traffic.

The RTTI integration is achieved by incorporating threat indicators and attack vectors from external feeds into the training process of both anomaly and intrusion detection models. This allows the framework to adapt to new threats in real-time, enhancing its effectiveness.

The paper then discusses the evaluation methodology for the proposed framework. This includes defining performance metrics for anomaly and intrusion detection, followed by training and testing the model on realistic datasets that simulate AV sensor data and network traffic.

Finally, the paper presents the results of the evaluation, analyzing the framework's accuracy, precision, and recall in detecting various attack scenarios. The paper also discusses the limitations of the proposed framework and potential areas for future research.

Downloads

Download data is not yet available.

References

Abdulaziz, A. A., et al. "Cybersecurity for autonomous vehicles against malware attacks in smart-cities." Cluster Computing (2023): 1-14.

Alsulami, Abdulaziz A., et al. "Security strategy for autonomous vehicle cyber-physical systems using transfer learning." Journal of Cloud Computing 12.1 (2023): 181.

Tatineni, Sumanth. "Cloud-Based Reliability Engineering: Strategies for Ensuring High Availability and Performance." International Journal of Science and Research (IJSR) 12.11 (2023): 1005-1012.

Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.

Dorri, Mohammad, and Shabnam Osanloo. "Automatic Anomaly Detection—Generative Adversarial Networks (GANs) Based Anomaly Detection." IEEE Access 7 (2019): 16600-16610.

Guo, W., et al. "Lightweight deep learning for real-time traffic anomaly detection on edge devices." Sensors (Switzerland) 19.19 (2019): 4474.

Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.

Moustafa, N., et al. "Intrusion Detection Systems (IDS) for Cloud Security: A Review." Journal of Network and Computer Applications 109 (2018): 61-77.

Vemori, Vamsi. "Towards Safe and Equitable Autonomous Mobility: A Multi-Layered Framework Integrating Advanced Safety Protocols, Data-Informed Road Infrastructure, and Explainable AI for Transparent Decision-Making in Self-Driving Vehicles." Human-Computer Interaction Perspectives 2.2 (2022): 10-41.

Pascale, Francesco, et al. "Cybersecurity in automotive: an intrusion detection system in connected vehicles." Electronics (Switzerland) 10.15 (2021): 1765.

Rathore, M. S., et al. "Cybersecurity for Autonomous Vehicles: A Survey of Attacks and Defense Mechanisms." Cybersecurity 5.2 (2022): 14.

Rawat, G., et al. "Deep Learning for Cybersecurity: A Survey." Journal of Computer Science 29.1 (2023): 357-404.

Schmidt, M., et al. "Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication." Sensors (Switzerland) 14.12 (2024): 2494.

Shami, A. "Network Traffic Anomaly Detection Using Convolutional Neural Networks (CNNs) for Intrusion Detection Systems." 2018 4th International Conference on Computational Intelligence and Communication Technology (CICT). IEEE, 2018. 120-124.

Shone, N., et al. "A Survey of Federated Learning with On-Device Intelligence." IEEE Communications Surveys & Tutorials 23.3 (2021): 1710-1730.

Singh, D., et al. "Machine Learning for Intrusion Detection System: A Review." International Journal of Advanced Research in Computer Science and Software Engineering 6.6 (2016): 208-214.

Teso, R. D., et al. "A Survey of Intrusion Detection Systems (IDS) in Wireless Sensor Networks." Security and Communication Networks 9.18 (2016): 5038-5050.

Tian, C., et al. "Learning Deep Representations for Anomaly Detection." Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2017. 1882-1890.

Tsolis, D. "Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions." Sensors (Switzerland) 3.3 (2023): 257.

Xiao, L., et al. "Efficient Deep Learning for Real-Time Anomaly Detection and Localization in Industrial Sensor Networks." IEEE Transactions on Industrial Informatics 14.8 (2018): 4105-4114.

Downloads

Published

03-08-2023

How to Cite

[1]
Dr. Mehmet Akın, “Real-Time Threat Intelligence Integration for Cybersecurity in Autonomous Vehicles - A Deep Learning Framework: Integrates real-time threat intelligence into cybersecurity systems for AVs using a deep learning framework”, J. of Artificial Int. Research and App., vol. 3, no. 1, pp. 1–17, Aug. 2023, Accessed: Dec. 23, 2024. [Online]. Available: https://aimlstudies.co.uk/index.php/jaira/article/view/71

Similar Articles

31-40 of 102

You may also start an advanced similarity search for this article.