Vis enkel innførsel

dc.contributor.authorGeorgsen, Roar Elias
dc.date.accessioned2016-09-16T09:25:10Z
dc.date.available2016-09-16T09:25:10Z
dc.date.issued2016
dc.identifier.urihttp://hdl.handle.net/11250/2407762
dc.description.abstractThis project examines the feasibility of machine learning based fingerprinting of CAN transceivers for the purpose of uniquely identifying signal sources during intrusion detection. A working multi-node CAN bus development environment was constructed, and an OpenCL Deep Learning Python Wrapper was ported to the platform. Multiple Machine Learning Algorithms were compared Systematically, and two models fully implemented on a SoC ARM/FPGA device, with computationally intensive tasks running as Software Defined Hardware using an OpenCL FPGA interface. The implementation achieves a higher hit rate than earlier work based on least-mean squares and convolution Digital Signals Processing (DSP). Performance on learning tasks is comparable to high end CPU devices, indicating that FPGA is a cost effective solution for utilizing machine learning in embedded systems. While statistical methods are not sufficient on their own, these results demonstrate that machine learning based methods are now viable in embedded devices, presenting a useful way to circumvent security issues faced by Controller Area Networks on the protocol level.nb_NO
dc.language.isoeng
dc.subjectIntrusion Detectionnb_NO
dc.subjectCAN busnb_NO
dc.subjectMachine Learningnb_NO
dc.subjectController Area Networksnb_NO
dc.titleMachine Learning Based Intrusion Detection in Controller Area Networksnb_NO
dc.typeBachelor thesisnb_NO
dc.source.pagenumber36nb_NO


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel