{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:28:23Z","timestamp":1744172903983,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031491863"},{"type":"electronic","value":"9783031491870"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49187-0_5","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T12:02:36Z","timestamp":1701345756000},"page":"79-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["VNGuard: Intrusion Detection System for\u00a0In-Vehicle Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7640-2821","authenticated-orcid":false,"given":"Yan Lin","family":"Aung","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9955-0199","authenticated-orcid":false,"given":"Shanshan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1065-9642","authenticated-orcid":false,"given":"Wang","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4843-5391","authenticated-orcid":false,"given":"Sudipta","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0594-0432","authenticated-orcid":false,"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8861-2793","authenticated-orcid":false,"given":"Anyu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Alkhatib, N., Ghauch, H., Danger, J.L.: SOME\/IP intrusion detection using deep learning-based sequential models in automotive ethernet networks. In: 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 0954\u20130962. IEEE (2021)","DOI":"10.1109\/IEMCON53756.2021.9623129"},{"issue":"7","key":"5_CR2","doi-asserted-by":"publisher","first-page":"4507","DOI":"10.1109\/TITS.2020.3017882","volume":"22","author":"J Ashraf","year":"2020","unstructured":"Ashraf, J., Bakhshi, A.D., Moustafa, N., Khurshid, H., Javed, A., Beheshti, A.: Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 22(7), 4507\u20134518 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Buscemi, A., Ponaka, M., Fotouhi, M., Koebel, C., Jomrich, F., Engel, T.: An intrusion detection system against rogue master attacks on gPTP. In: IEEE Vehicular Technology Conference (VTC2023-Spring), Florence, 20\u201323 June 2023 (2023)","DOI":"10.1109\/VTC2023-Spring57618.2023.10199964"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, P., Xu, K., Li, S., Han, M.: TCAN-IDS: intrusion detection system for internet of vehicle using temporal convolutional attention network. Symmetry 14(2) (2022)","DOI":"10.3390\/sym14020310"},{"key":"5_CR5","unstructured":"Deichmann, J., Ebel, E., Heineke, K., Heuss, R., Kellner, M., Steiner, F.: Autonomous driving\u2019s future: convenient and connected. https:\/\/www.mckinsey.com\/industries\/automotive-and-assembly\/our-insights\/autonomous-drivings-future-convenient-and-connected(Jan 2023)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Ernst, J.M., Michaels, A.J.: LIN bus security analysis. In: 44th Annual Conference of the IEEE Industrial Electronics Society, IECON 2018, pp. 2085\u20132090. IEEE (2018)","DOI":"10.1109\/IECON.2018.8592744"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TIFS.2022.3221893","volume":"18","author":"ML Han","year":"2023","unstructured":"Han, M.L., Kwak, B.I., Kim, H.K.: TOW-IDS: intrusion detection system based on three overlapped wavelets for automotive ethernet. IEEE Trans. Inf. Forensics Secur. 18, 411\u2013422 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Han, M.L., Kwak, B., Kim, H.K.: TOW-IDS: automotive ethernet intrusion dataset (2022). https:\/\/doi.org\/10.21227\/bz0w-zc12","DOI":"10.21227\/bz0w-zc12"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Huang, T., Zhou, J., Bytes, A.: ATG: an attack traffic generation tool for security testing of in-vehicle CAN bus. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018. Association for Computing Machinery, New York (2018)","DOI":"10.1145\/3230833.3230843"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-319-72359-4_38","volume-title":"Information Security Practice and Experience","author":"T Huang","year":"2017","unstructured":"Huang, T., Zhou, J., Wang, Y., Cheng, A.: On the security of in-vehicle hybrid network: status and challenges. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 621\u2013637. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72359-4_38"},{"key":"5_CR11","volume":"29","author":"S Jeong","year":"2021","unstructured":"Jeong, S., Jeon, B., Chung, B., Kim, H.K.: Convolutional neural network-based intrusion detection system for AVTP streams in automotive ethernet-based networks. Veh. Commun. 29, 100338 (2021)","journal-title":"Veh. Commun."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Koyama, T., Tanaka, M., Miyajima, A., Ukai, S., Sugashima, T., Egawa, M.: SOME\/IP intrusion detection system using real-time and retroactive anomaly detection. In: 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), pp. 1\u20137. IEEE (2022)","DOI":"10.1109\/VTC2022-Spring54318.2022.9860928"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Limbasiya, T., Teng, K.Z., Chattopadhyay, S., Zhou, J.: A systematic survey of attack detection and prevention in connected and autonomous vehicles. Veh. Commun. 100515 (2022)","DOI":"10.1016\/j.vehcom.2022.100515"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Lin, S.C., et al.: The architectural implications of autonomous driving: constraints and acceleration. In: Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 751\u2013766 (2018)","DOI":"10.1145\/3173162.3173191"},{"issue":"1","key":"5_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/MCE.2021.3137790","volume":"12","author":"D Man","year":"2023","unstructured":"Man, D., Zeng, F., Lv, J., Xuan, S., Yang, W., Guizani, M.: AI-based intrusion detection for intelligence internet of vehicles. IEEE Consum. Electron. Mag. 12(1), 109\u2013116 (2023). https:\/\/doi.org\/10.1109\/MCE.2021.3137790","journal-title":"IEEE Consum. Electron. Mag."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"P\u00e1ez, F., Kaschel, H.: A proposal for data authentication, data integrity and replay attack rejection for the LIN bus. In: 2021 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/CHILECON54041.2021.9702979"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"P\u00e1ez, F., Kaschel, H.: Towards a robust computer security layer for the LIN bus. In: 2021 IEEE International Conference on Automation\/XXIV Congress of the Chilean Association of Automatic Control (ICA-ACCA), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/ICAACCA51523.2021.9465340"},{"issue":"18","key":"5_CR18","doi-asserted-by":"publisher","first-page":"6901","DOI":"10.3390\/s22186901","volume":"22","author":"F P\u00e1ez","year":"2022","unstructured":"P\u00e1ez, F., Kaschel, H.: Design and testing of a computer security layer for the LIN bus. Sensors 22(18), 6901 (2022)","journal-title":"Sensors"},{"key":"5_CR19","volume":"27","author":"H Qin","year":"2021","unstructured":"Qin, H., Yan, M., Ji, H.: Application of controller area network (CAN) bus anomaly detection based on time series prediction. Veh. Commun. 27, 100291 (2021)","journal-title":"Veh. Commun."},{"issue":"11","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3570954","volume":"55","author":"S Rajapaksha","year":"2023","unstructured":"Rajapaksha, S., Kalutarage, H., Al-Kadri, M.O., Petrovski, A., Madzudzo, G., Cheah, M.: AI-based intrusion detection systems for in-vehicle networks: a survey. ACM Comput. Surv. 55(11), 1\u201340 (2023)","journal-title":"ACM Comput. Surv."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: GIDS: GAN based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"5_CR22","volume":"21","author":"HM Song","year":"2020","unstructured":"Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)","journal-title":"Veh. Commun."},{"key":"5_CR23","first-page":"220","volume":"25","author":"J Takahashi","year":"2017","unstructured":"Takahashi, J., et al.: Automotive attacks and countermeasures on LIN-bus. J. Inf. Process. 25, 220\u2013228 (2017)","journal-title":"J. Inf. Process."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Teck, A.Y.K., Garbelini, M.E., Chattopadhyay, S., Zhou, J.: VitroBench: manipulating in-vehicle networks and COTS ECUs on your bench: a comprehensive test platform for automotive cybersecurity research. Veh. Commun. 100649 (2023)","DOI":"10.1016\/j.vehcom.2023.100649"},{"key":"5_CR25","unstructured":"Upstream: 2023 global automotive cybersecurity report (2023). https:\/\/upstream.auto\/reports\/global-automotive-cybersecurity-report\/"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Liu, T., Zhao, H., Ma, C.: Risk analysis of CAN bus and ethernet communication security for intelligent connected vehicles. In: 2021 IEEE International Conference on Artificial Intelligence and Industrial Design (AIID), pp. 291\u2013295. IEEE (2021)","DOI":"10.1109\/AIID51893.2021.9456534"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49187-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:35:22Z","timestamp":1744148122000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49187-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031491863","9783031491870"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49187-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc23.cs.rug.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}