{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T16:02:00Z","timestamp":1773331320180,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03465-1","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T11:07:20Z","timestamp":1732532840000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Machine Learning-Based Intrusion Detection for Securing In-Vehicle CAN Bus Communication"],"prefix":"10.1007","volume":"5","author":[{"given":"Said Ben Hassane","family":"Samir","sequence":"first","affiliation":[]},{"given":"Martin","family":"Raissa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8391-3061","authenticated-orcid":false,"given":"Haifa","family":"Touati","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hadded","sequence":"additional","affiliation":[]},{"given":"Hakim","family":"Ghazzai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"3465_CR1","unstructured":"Benkhelifa A. Les syst\u00e9mes embarqu\u00e8s dans l\u2019automobile. Doctoral dissertation, Haute \u00e8cole de gestion de Gen\u00e9ve. 2018."},{"key":"3465_CR2","unstructured":"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9216166. Accessed 04 Feb 2024."},{"key":"3465_CR3","first-page":"23","volume":"1","author":"K Benz","year":"1886","unstructured":"Benz K. The birth of the Motorwagen. Hist Autom Technol. 1886;1:23\u201330.","journal-title":"Hist Autom Technol"},{"issue":"5","key":"3465_CR4","first-page":"1024","volume":"68","author":"M Johnson","year":"2019","unstructured":"Johnson M, Lee L. Advancements in vehicle communication systems. IEEE Trans Veh Technol. 2019;68(5):1024\u201335.","journal-title":"IEEE Trans Veh Technol"},{"key":"3465_CR5","unstructured":"Bosch GmbH R. Controller Area Network (CAN) Specification, Bosch Documentation. 1980."},{"key":"3465_CR6","unstructured":"ISO 11898. Road Vehicles\u2014Controller Area Network (CAN), International Organization for Standardization. 2020."},{"key":"3465_CR7","unstructured":"Avatefipour O, Malik H. State-of-the-art survey on in-vehicle network communication (CAN-bus) security and vulnerabilities. 2018."},{"issue":"5","key":"3465_CR8","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.13052\/jcsm2245-1439.1359","volume":"13","author":"T Ismail","year":"2024","unstructured":"Ismail T, Touati H, Hajlaoui N, Hadded M, Muhlethaler P, Bouzefrane S, Saidane LA. A comprehensive survey on vehicular communication security. J Cyber Secur Mobil. 2024;13(5):1007\u201338.","journal-title":"J Cyber Secur Mobil."},{"key":"3465_CR9","doi-asserted-by":"publisher","unstructured":"Ismail T, et al. Impact analysis of greedy behavior attacks in vehicular ad hoc networks. In: 2021 10th IFIP international conference on performance evaluation and modeling in wireless and wired networks (PEMWN), Ottawa. 2021. p. 1\u20136. https:\/\/doi.org\/10.23919\/PEMWN53042.2021.9664702.","DOI":"10.23919\/PEMWN53042.2021.9664702"},{"key":"3465_CR10","doi-asserted-by":"publisher","unstructured":"Hassine Y, Touati H. Vehicular platoons security: a review with an emphasis on Sybil attacks. In: 2023 12th IFIP\/IEEE international conference on performance evaluation and modeling in wired and wireless networks (PEMWN), Berlin, 2023. p. 1\u20136. https:\/\/doi.org\/10.23919\/PEMWN58813.2023.10304901.","DOI":"10.23919\/PEMWN58813.2023.10304901"},{"issue":"6","key":"3465_CR11","first-page":"56","volume":"25","author":"A Green","year":"2022","unstructured":"Green A, White J. Cybersecurity challenges in modern vehicles. Cybersecur Rev. 2022;25(6):56\u201367.","journal-title":"Cybersecur Rev"},{"issue":"1","key":"3465_CR12","first-page":"22","volume":"17","author":"R Adams","year":"2021","unstructured":"Adams R, et al. Vulnerabilities in CAN bus systems. J Cybersecur Res. 2021;17(1):22\u201334.","journal-title":"J Cybersecur Res"},{"key":"3465_CR13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MVT.2017.2736344","volume":"13","author":"B Groza","year":"2018","unstructured":"Groza B, Murvay S. Security solutions for the controller area network: bringing authentication to in-vehicle networks. IEEE Veh Technol Mag. 2018;13:40\u20137.","journal-title":"IEEE Veh Technol Mag"},{"key":"3465_CR14","doi-asserted-by":"publisher","first-page":"19250","DOI":"10.1109\/ACCESS.2024.3361829","volume":"12","author":"S Baccari","year":"2024","unstructured":"Baccari S, Hadded M, Ghazzai H, Touati H, Elhadef M. Anomaly detection in connected and autonomous vehicles: a survey, analysis, and research challenges. IEEE Access. 2024;12:19250\u201376. https:\/\/doi.org\/10.1109\/ACCESS.2024.3361829.","journal-title":"IEEE Access"},{"key":"3465_CR15","unstructured":"Electronics CSS. CAN Bus Explained. CSS Electronics: Aarhus, Jutland, DK. 2019."},{"key":"3465_CR16","doi-asserted-by":"publisher","unstructured":"https:\/\/doi.org\/10.3390\/s20082364. Accessed 28 July 2024.","DOI":"10.3390\/s20082364"},{"issue":"4","key":"3465_CR17","first-page":"345","volume":"33","author":"T Harris","year":"2019","unstructured":"Harris T. Prioritization and real-time communication in CAN bus. Real-Time Syst J. 2019;33(4):345\u201359.","journal-title":"Real-Time Syst J"},{"key":"3465_CR18","doi-asserted-by":"publisher","unstructured":"Seo E, Song HM, Kim HK. GIDS: GAN based intrusion detection system for in-vehicle network. In: 2018 16th annual conference on privacy, security and trust (PST), Belfast, Ireland, 2018. p. 1\u20136. https:\/\/doi.org\/10.1109\/PST.2018.8514157.","DOI":"10.1109\/PST.2018.8514157"},{"key":"3465_CR19","doi-asserted-by":"crossref","unstructured":"Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S. Experimental security analysis of a modern automobile. In: Proc. IEEE Symp. Secur. Privacy, 2010. p. 447462.","DOI":"10.1109\/SP.2010.34"},{"key":"3465_CR20","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/.vehcom.2018.09.004","volume":"14","author":"ML Han","year":"2018","unstructured":"Han ML, Kwak BI, Kim HK. Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh Commun. 2018;14:52\u201363. https:\/\/doi.org\/10.1016\/.vehcom.2018.09.004.","journal-title":"Veh Commun"},{"key":"3465_CR21","doi-asserted-by":"publisher","unstructured":"Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y. Long short-term memory-based intrusion detection system for in-vehicle controller area network bus. In: Proc. IEEE 44th Annu. Comput., Softw., Appl. Conf. (COMPSAC). 2020. p. 10\u201317. https:\/\/doi.org\/10.1109\/COMPSAC48688.2020.00011.","DOI":"10.1109\/COMPSAC48688.2020.00011"},{"key":"3465_CR22","doi-asserted-by":"publisher","unstructured":"M\u00fcter M, Asaj N. Entropy-based anomaly detection for in-vehicle networks. In: Proceedings of the 2011 IEEE intelligent vehicles symposium (IV) Baden-Baden, 5\u20139 June 2011. p. 1110\u20135. https:\/\/doi.org\/10.1109\/IVS.2011.5940552.","DOI":"10.1109\/IVS.2011.5940552"},{"key":"3465_CR23","doi-asserted-by":"publisher","unstructured":"Song HM, Kim HR, Kim HK. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In: Proceedings of the 2016 international conference on information networking (ICOIN), 2016. p. 63\u20138. https:\/\/doi.org\/10.1109\/ICOIN.2016.7427089.","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"3465_CR24","doi-asserted-by":"crossref","unstructured":"Cho K, Shin KG. Viden: attacker identification on in-vehicle networks. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, Dallas, 30 October\u20133 November 2017.","DOI":"10.1145\/3133956.3134001"},{"key":"3465_CR25","doi-asserted-by":"crossref","unstructured":"Seo E, Song HM, Kim HK. Gids: Gan based intrusion detection system for in-vehicle network. In: Proceedings of the 2018 16th annual conference on privacy, security and trust (PST), Belfast, 28\u201330 August 2018. p. 1\u20136.","DOI":"10.1109\/PST.2018.8514157"},{"key":"3465_CR26","doi-asserted-by":"publisher","first-page":"185489","DOI":"10.1109\/ACCESS.2020.3029307","volume":"8","author":"MD Hossain","year":"2020","unstructured":"Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y. LSTM-based intrusion detection system for in-vehicle can bus communications. IEEE Access. 2020;8:185489\u2013502. https:\/\/doi.org\/10.1109\/ACCESS.2020.3029307.","journal-title":"IEEE Access"},{"key":"3465_CR27","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1109\/TNSM.2020.3038991","volume":"18","author":"S Longari","year":"2020","unstructured":"Longari S, Valcarcel DHN, Zago M, Carminati M, Zanero S. CANnolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans Netw Serv Manag. 2020;18:1913\u201324.","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"3465_CR28","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.1109\/TIFS.2021.3069171","volume":"16","author":"ML Han","year":"2021","unstructured":"Han ML, Kwak B II, Kim HK. Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Trans Inf Forensics Secur. 2021;16:2941\u201356. https:\/\/doi.org\/10.1109\/TIFS.2021.3069171.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3465_CR29","doi-asserted-by":"publisher","first-page":"99595","DOI":"10.1109\/ACCESS.2021.3095962","volume":"9","author":"T Moulahi","year":"2021","unstructured":"Moulahi T, Zidi S, Alabdulatif A, Atiquzzaman M. Comparative performance evaluation of intrusion detection based on machine learning in in-vehicle controller area network bus. IEEE Access. 2021;9:99595\u2013605. https:\/\/doi.org\/10.1109\/ACCESS.2021.3095962.","journal-title":"IEEE Access"},{"key":"3465_CR30","unstructured":"https:\/\/ocslab.hksecurity.net\/Datasets\/car-hacking-dataset. Accessed 15 Feb 2024."},{"key":"3465_CR31","unstructured":"https:\/\/ocslab.hksecurity.net\/Dataset\/CAN-intrusion-dataset. Accessed 15 Feb 2024."},{"key":"3465_CR32","doi-asserted-by":"publisher","unstructured":"Abdelwahed S, Touati H. LSTM-based congestion detection in named data networks. In: Abraham A, Pllana S, Casalino G, Ma K, Bajaj A, editors. Intelligent systems design and applications. ISDA 2022. Lecture notes in networks and systems, vol 717. Cham: Springer; 2023. https:\/\/doi.org\/10.1007\/978-3-031-35510-3_14.","DOI":"10.1007\/978-3-031-35510-3_14"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03465-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03465-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03465-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T12:15:55Z","timestamp":1732536955000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03465-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"references-count":32,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["3465"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03465-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,25]]},"assertion":[{"value":"1 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"1082"}}