A Deep Learning Perspective on Connected Automated Vehicle (CAV) Cybersecurity and Threat Intelligence

09/22/2021
by   Manoj Basnet, et al.
0

The automation and connectivity of CAV inherit most of the cyber-physical vulnerabilities of incumbent technologies such as evolving network architectures, wireless communications, and AI-based automation. This book chapter entails the cyber-physical vulnerabilities and risks that originated in IT, OT, and the physical domains of the CAV ecosystem, eclectic threat landscapes, and threat intelligence. To deal with the security threats in high-speed, high dimensional, multimodal data and assets from eccentric stakeholders of the CAV ecosystem, this chapter presents and analyzes some of the state of art deep learning-based threat intelligence for attack detection. The frontiers in deep learning, namely Meta-Learning and Federated Learning, along with their challenges have been included in the chapter. We have proposed, trained, and tested the deep CNN-LSTM architecture for CAV threat intelligence; assessed and compared the performance of the proposed model against other deep learning algorithms such as DNN, CNN, LSTM. Our results indicate the superiority of the proposed model although DNN and 1d-CNN also achieved more than 99 CAV-KDD dataset. The good performance of deep CNN-LSTM comes with the increased model complexity and cumbersome hyperparameters tuning. Still, there are open challenges on deep learning adoption in the CAV cybersecurity paradigm due to lack of properly developed protocols and policies, poorly defined privileges between stakeholders, costlier training, adversarial threats to the model, and poor generalizability of the model under out of data distributions.

READ FULL TEXT

page 1

page 2

page 6

page 8

page 12

page 18

research
08/03/2018

Cyber Threat Intelligence : Challenges and Opportunities

The ever increasing number of cyber attacks requires the cyber security ...
research
07/26/2020

Cyber Threat Intelligence for Secure Smart City

Smart city improved the quality of life for the citizens by implementing...
research
01/24/2022

STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems

The concept of traditional farming is changing rapidly with the introduc...
research
05/25/2020

Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Insider threats, as one type of the most challenging threats in cyberspa...
research
03/07/2021

Threat Modeling of Cyber-Physical Systems in Practice

Traditional Cyber-physical Systems(CPSs) were not built with cybersecuri...
research
04/07/2022

cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models

Cyber threat intelligence (CTI) is practical real-world information that...
research
12/11/2018

Intelligence-based Cybersecurity Awareness Training- an Exploratory Project

Cybersecurity training should be adaptable to evolving the cyber threat ...

Please sign up or login with your details

Forgot password? Click here to reset