Netinfo Security ›› 2025, Vol. 25 ›› Issue (6): 872-888.doi: 10.3969/j.issn.1671-1122.2025.06.003

Previous Articles     Next Articles

Intrusion Detection System for the Controller Area Network Bus of Intelligent Vehicles Based on Federated Learning

XUN Yijie1,2, CUI Jiarong1,2, MAO Bomin1,2(), QIN Junman1,2   

  1. 1. School of Cybersecurity, Northwestern Polytechnical University, Xi’an 710072, China
    2. Research & Development Institute of Northwestern Polytechnical University in Shenzhen, Shenzhen 518057, China
  • Received:2025-02-25 Online:2025-06-10 Published:2025-07-11

Abstract:

Intelligent vehicles have become an essential transportation tool for human daily travel. The Controller Area Network (CAN), a core communication protocol inside intelligent vehicles, faces significant security concerns. The CAN bus is vulnerable to malicious attacks due to factors such as weak communication interface access control, lack of authentication in data exchange, and the absence of source/destination addresses in messages. In-vehicle gateways and firewalls are limited by bandwidth and computational resources. It makes difficult to implement powerful encryption and authentication algorithms, which restricts their protective capabilities. Current Intrusion Detection Systems (IDS) that rely on single-class side-channel features, like voltage, clock, or data flow, have limited ability to detect various types of attacks. For example, the IDS based on clock skew cannot detect attacks that are not periodic. This study proposed a federated learning-based CAN bus intrusion detection system for intelligent vehicles. The vehicle collected multidimensional feature data for lightweight training and transmitted parameters to the cloud. The cloud gathered parameters from different vehicles using an asynchronous horizontal federated learning structure, conducted deep training with the eXtreme Gradient Boosting (XGBoost) algorithm, and sent trained model parameters back to the vehicle. The vehicle then performed detection and attack source tracing. Experiments on three real vehicles from different brands demonstrated that the system achieves high-precision detection of six typical attack types, including Bus-off, Spoofing, Same Origin MethodExecution (SOME), Fuzzing, Masquerade, and Replay attacks. The average detection latency was 0.0987 ms.

Key words: federated learning, intelligent vehicle, intrusion detection system, CAN bus

CLC Number: