IEEE Open Journal of Vehicular Technology (Jan 2024)

Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks

  • Mohammed Almehdhar,
  • Abdullatif Albaseer,
  • Muhammad Asif Khan,
  • Mohamed Abdallah,
  • Hamid Menouar,
  • Saif Al-Kuwari,
  • Ala Al-Fuqaha

DOI
https://doi.org/10.1109/OJVT.2024.3422253
Journal volume & issue
Vol. 5
pp. 869 – 906

Abstract

Read online

The rapid evolution of modern automobiles into intelligent and interconnected entities presents new challenges in cybersecurity, particularly in Intrusion Detection Systems (IDS) for In-Vehicle Networks (IVNs). This survey paper offers an in-depth examination of advanced machine learning (ML) and deep learning (DL) approaches employed in developing sophisticated IDS for safeguarding IVNs against potential cyber-attacks. Specifically, we focus on the Controller Area Network (CAN) protocol, which is prevalent in in-vehicle communication systems, yet exhibits inherent security vulnerabilities. We propose a novel taxonomy categorizing IDS techniques into conventional ML, DL, and hybrid models, highlighting their applicability in detecting and mitigating various cyber threats, including spoofing, eavesdropping, and denial-of-service attacks. We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. Additionally, we explore emerging technologies, such as Federated Learning (FL) and Transfer Learning, to enhance the robustness and adaptability of IDS solutions. Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.

Keywords