GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection

📅 2025-07-29
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
CAN bus networks are vulnerable to flooding, fuzzing, replay, and spoofing attacks due to the absence of encryption and authentication. To address this, this paper proposes a lightweight anomaly detection framework integrating graph-structured learning with time-series modeling. Specifically, CAN message sliding windows are innovatively modeled as dynamic graphs that preserve temporal relationships—enabling the first structured representation of CAN protocol semantics. A joint architecture combining graph convolutional networks (GCNs) and overcomplete autoencoders generates structure-aware graph embeddings, while gated recurrent units (GRUs) capture inter-window temporal dependencies. Optimal window size is determined via Shannon entropy analysis, eliminating manual feature engineering. Evaluated on real-world in-vehicle datasets, the method achieves significant improvements in detection accuracy and robustness, effectively identifying all four canonical CAN attack types.

Technology Category

Application Category

📝 Abstract
Modern in-vehicle networks face various cyber threats due to the lack of encryption and authentication in the Controller Area Network (CAN). To address this security issue, this paper presents GUARD-CAN, an anomaly detection framework that combines graph-based representation learning with time-series modeling. GUARD-CAN splits CAN messages into fixed-length windows and converts each window into a graph that preserves message order. To detect anomalies in the timeaware and structure-aware context at the same window, GUARD-CAN takes advantage of the overcomplete Autoencoder (AE) and Graph Convolutional Network (GCN) to generate graph embedding vectors. The model groups these vectors into sequences and feeds them into the Gated Recurrent Unit (GRU) to detect temporal anomaly patterns across the graphs. GUARD-CAN performs anomaly detection at both the sequence level and the window level, and this allows multi-perspective performance evaluation. The model also verifies the importance of window size selection through an analysis based on Shannon entropy. As a result, GUARD-CAN shows that the proposed model detects four types of CAN attacks (flooding, fuzzing, replay and spoofing attacks) effectively without relying on complex feature engineering.
Problem

Research questions and friction points this paper is trying to address.

Detects CAN network anomalies using graph and time-series models
Identifies four attack types without complex feature engineering
Evaluates performance via multi-perspective window and sequence analysis
Innovation

Methods, ideas, or system contributions that make the work stand out.

Graph-based representation learning for CAN messages
Combines Autoencoder and Graph Convolutional Network
Uses GRU for temporal anomaly pattern detection
🔎 Similar Papers
No similar papers found.