Abstract
Communication-based train control (CBTC) system is a typical cyber-physical system with open wireless communication that is vulnerable to attacks. To protect the security of wireless communication in the CBTC system, machine learning-based intrusion detection system (IDS) has been extensively researched. However, the performance of a machine learning-based IDS highly depends on feature design, and the spatial and temporal correlation of network data attributes makes it difficult to design features manually. Meanwhile, this type of IDS can only detect known attacks that are contained in the training dataset and fail to detect new attacks (i.e., zero-day attacks). To cope with the above issue, we propose a novel IDS based on transfer learning for the CBTC system. The proposed IDS leverages an optimized one-dimensional convolutional neural network block and long short-term memory to automatically extract spatial and temporal features from the original data. Furthermore, a knowledge transfer method is utilized to transfer the features to enable zero-day attack detection. We evaluate the proposed IDS on a dataset representing the CBTC system network data. The results show that the proposed IDS can achieve 99.32% accuracy for known attacks and 93.21% average F1-Score for zero-day attacks.








Similar content being viewed by others
Data availability
No datasets were generated or analysed during the current study.
References
Wang, X., Liu, L., Zhu, L., Tang, T.: Joint security and QoS provisioning in train-centric CBTC systems under sybil attacks. IEEE Access 7, 91169–91182 (2019)
Farooq, J., Soler, J.: Radio communication for communications-based train control (CBTC): a tutorial and survey. IEEE Commun. Surv. Tutor. 19(3), 1377–1402 (2017)
IEEE 802.11: Wireless LANs (2011). http://standards.ieee.org/about/get/802/ 802.11.html
Bu, B., Yu, F.R., Tang, T., Gao, C.: Performance improvements of communication-based train control (CBTC) systems with unreliable wireless networks. Wirel. Netw. 20, 53–71 (2014)
Nazir, R., Laghari, A.A., Kumar, K., David, S., Ali, M.: Survey on wireless network security. Arch. Comput. Methods Eng. 1–20 (2021)
Chopra, S.S., Dillon, T., Bilec, M.M., Khanna, V.: A network-based framework for assessing infrastructure resilience: a case study of the London metro system. J. R. Soc. Interface 13(118), 20160113 (2016)
Kour, R., Aljumaili, M., Karim, R., Tretten, P.: eMaintenance in railways: issues and challenges in cybersecurity. Proc. Inst. Mech. Eng. Part F J. Rail Rapid Transit 233(10), 1012–1022 (2019)
Gao, B., Bu, B.: A novel intrusion detection method in train-ground communication system. IEEE Access 7, 178726–178743 (2019)
Zhao, Y., Yu, H., Liang, Y., Jiang, H., Marine, G., Ren, Y.: Sanitizable cross-system authorization for secure communication in intelligent connected vehicle. IEEE Trans. Veh. Technol. (2023)
Jiang, H., Ren, Y., Fang, J., Yang, Y., Xu, L., Yu, H.: Ship: a state-aware hybrid incentive program for urban crowd sensing with for-hire vehicles. IEEE Trans. Intell. Transp. Syst. (2023)
Zhao, Y., Yu, H., Liang, Y., Conti, M., Bazzi, W., Ren, Y.: A sanitizable access control with policy-protection for vehicular social networks. IEEE Trans. Intell. Transp. Syst. (2023)
Ren, Y., Lan, Z., Liu, L., Yu, H.: Emsin: enhanced multi-stream interaction network for vehicle trajectory prediction. IEEE Trans. Fuzzy Syst. (2024)
Ren, Y., Jiang, H., Feng, X., Zhao, Y., Liu, R., Yu, H.: ACP-based modeling of the parallel vehicular crowd sensing system: framework, components and an application example. IEEE Trans. Intell. Veh. 8(2), 1536–1548 (2022)
Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. (CSUR) 47(4), 1–33 (2015)
Heidari, A., Jabraeil Jamali, M.A.: Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 1–28 (2022)
Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686–728 (2018)
Kong, X.-Y., Yang, G.-H.: An intrusion detection method based on self-generated coding technology for stealthy false data injection attacks in train-ground communication systems. IEEE Trans. Ind. Electron. (2022). https://doi.org/10.1109/TIE.2022.3213899
Gao, B., Bu, B., Zhang, W., Li, X.: An intrusion detection method based on machine learning and state observer for train-ground communication systems. IEEE Trans. Intell. Transp. Syst. 23(7), 6608–6620 (2021)
Song, Y., Bu, B., Zhu, L.: A novel intrusion detection model using a fusion of network and device states for communication-based train control systems. Electronics 9(1), 181 (2020)
Dwivedi, S., Vardhan, M., Tripathi, S.: Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Comput. 1–20 (2021)
Han, X., Yin, R., Lu, Z., Jiang, B., Liu, Y., Liu, S., Wang, C., Li, N.: Stidm: a spatial and temporal aware intrusion detection model. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 370–377 (2020). IEEE
Lo, W., Alqahtani, H., Thakur, K., Almadhor, A., Chander, S., Kumar, G.: A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic. Veh. Commun. 35, 100471 (2022)
Yang, L., Shami, A.: A transfer learning and optimized CNN based intrusion detection system for internet of vehicles. In: ICC 2022-IEEE International Conference on Communications, pp. 2774–2779 (2022). IEEE
Yosinski, J., Clune, J., Bengio, Y., Lipson, H.: How transferable are features in deep neural networks? Adv. Neural Inf. Process. Syst. 27 (2014)
Xiao, J., Xiao, Y., Li, J., Gong, C., Nie, X., Gao, H., Sun, B., Liu, H., Wang, G.: Advanced nanoengineering strategies endow high-performance layered transition-metal oxide cathodes for sodium-ion batteries, SmartMat, 4, e1211 (2023)
Li, X., Hu, Z., Xu, M., Wang, Y., Ma, J.: Transfer learning based intrusion detection scheme for internet of vehicles. Inf. Sci. 547, 119–135 (2021)
Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 2, 222–232 (1987)
Yin, B., Bu, B., Gao, B., Li, Q.: A hybrid intrusion detection method using improved stacking ensemble algorithm and false positive elimination strategy for CBTC. In: 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), pp. 4253–4258 (2022). IEEE
California, I.: KDDCup1999 (2007). http://kdd.ics.uci.edu/databases /kddcup99/KDDCUP99
Wang, Z., Xie, X., Chen, L., Song, S., Wang, Z.: Intrusion detection and network information security based on deep learning algorithm in urban rail transit management system. IEEE Trans. Intell. Transp. Syst. 24(2), 2135–2143 (2023)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84–90 (2017)
Goikolea, E., Palomares, V., Wang, S., de Larramendi, I.R., Guo, X., Wang, G., Rojo, T.: Na-Ion Batteries–Approaching Old and New Challenges. Adv. Energy Mater. 10, 2002055 (2020)
Kasim, Ö.: A robust DNS flood attack detection with a hybrid deeper learning model. Comput. Electr. Eng. 100, 107883 (2022)
Kim, J., Kim, J., Kim, H., Shim, M., Choi, E.: CNN-based network intrusion detection against denial-of-service attacks. Electronics 9(6), 916 (2020)
Kasim, Ö.: An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Comput. Netw. 180, 107390 (2020)
Aktar, S., Nur, A.Y.: Towards DDoS attack detection using deep learning approach. Comput. Secur. 129, 103251 (2023)
Guo, Y.: A review of machine learning-based zero-day attack detection: challenges and future directions. Comput. Commun. 198, 175–185 (2023)
Mbona, I., Eloff, J.H.: Detecting zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access 10, 69822–69838 (2022)
Soltani, M., Ousat, B., Siavoshani, M.J., Jahangir, A.H.: An adaptable deep learning-based intrusion detection system to zero-day attacks. J. Inf. Secur. Appl. 76, 103516 (2023)
Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J.-N., Bayne, E., Bellekens, X.: Utilising deep learning techniques for effective zero-day attack detection. Electronics 9(10), 1684 (2020)
Mehedi, S.T., Anwar, A., Rahman, Z., Ahmed, K., Islam, R.: Dependable intrusion detection system for IoT: a deep transfer learning based approach. IEEE Trans. Ind. Inf. 19(1), 1006–1017 (2022)
Zhu, L., Yu, F.R., Ning, B., Tang, T.: Cross-layer handoff design in MIMO-enabled WLANs for communication-based train control (CBTC) systems. IEEE J. Sel. Areas Commun. 30(4), 719–728 (2012)
Kiranyaz, S., Avci, O., Abdeljaber, O., Ince, T., Gabbouj, M., Inman, D.J.: 1d convolutional neural networks and applications: a survey. Mech. Syst. Signal Process. 151, 107398 (2021)
Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International Conference on Machine Learning, pp. 448–456 (2015). PMLR
Cho, K., Van Merriënboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 (2014)
Gupta, A., Tatbul, N., Marcus, R., Zhou, S., Lee, I., Gottschlich, J.: Class-weighted evaluation metrics for imbalanced data classification. arXiv preprint arXiv:2010.05995 (2020)
Yang, L., Shami, A.: On hyperparameter optimization of machine learning algorithms: theory and practice. Neurocomputing 415, 295–316 (2020)
Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13(2) (2012)
Kirkpatrick, S., Gelatt, C.D., Jr., Vecchi, M.P.: Optimization by simulated annealing. Science 220(4598), 671–680 (1983)
Harris, C.R., Millman, K.J., Van Der Walt, S.J., Gommers, R., Virtanen, P., Cournapeau, D., Wieser, E., Taylor, J., Berg, S., Smith, N.J.: Array programming with NumPy. Nature 585(7825), 357–362 (2020)
Reback, J., McKinney, W., Van Den Bossche, J., Augspurger, T., Cloud, P., Klein, A., Hawkins, S., Roeschke, M., Tratner, J., She, C., et al.: pandas-dev/pandas: Pandas 1.0. 5. Zenodo (2020)
Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., Antiga, L., et al.: Pytorch: an imperative style, high-performance deep learning library. Adv. Neural Inf. Process. Syst. 32 (2019)
Rosay, A., Carlier, F., Leroux, P.: Mlp4nids: an efficient mlp-based network intrusion detection for cicids2017 dataset. In: Machine Learning for Networking: Second IFIP TC 6 International Conference, MLN 2019, Paris, France, 3–5 Dec, 2019, Revised Selected Papers 2, pp. 240–254 (2020). Springer
Li, W., Yan, Z., He, R., Zong, L., Zhang, F., Zhan, Y.: A novel machine learning based intrusion detection method for 5g empowered CBTC systems. In: 2022 International Wireless Communications and Mobile Computing (IWCMC), pp. 211–216 (2022). IEEE
Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18(1), 184–208 (2015)
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108–116 (2018)
Rosay, A., Carlier, F., Leroux, P.: Feed-forward neural network for network intrusion detection. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1–6 (2020). IEEE
Cui, J.-F., Xia, H., Zhang, R., Hu, B.-X., Cheng, X.-G.: Optimization scheme for intrusion detection scheme GBDT in edge computing center. Comput. Commun. 168, 136–145 (2021)
Navya, V., Adithi, J., Rudrawal, D., Tailor, H., James, N.: Intrusion detection system using deep neural networks (DNN). In: 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), pp. 1–6 (2021). IEEE
Yang, L., Moubayed, A., Shami, A.: MTH-IDS: a multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J. 9(1), 616–632 (2021)
Zavrak, S., İskefiyeli, M.: Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access 8, 108346–108358 (2020)
Neuschmied, H., Winter, M., Stojanović, B., Hofer-Schmitz, K., Božić, J., Kleb, U.: Apt-attack detection based on multi-stage autoencoders. Appl. Sci. 12(13), 6816 (2022)
Funding
This study was supported by the Beijing Municipal Natural Science Foundation (No. L211003).
Author information
Authors and Affiliations
Contributions
HL: Conceptualization, Methodology, Investigation, Software, Validation, Visualization, Writing—original draft. YZ: Investigation, Validation. YS: Methodology, Validation. YY: Software, Writing—review & editing. GH: Investigation, Writing—review & editing. HY: Investigation, Writing—review & editing. YR: Supervision, Funding acquisition, Writing—review & editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Lu, H., Zhao, Y., Song, Y. et al. A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system. Cluster Comput 27, 8477–8492 (2024). https://doi.org/10.1007/s10586-024-04376-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-024-04376-9