2018
DOI: 10.1109/access.2018.2848106
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…Given the vulnerability of CAN bus with respect to lack of encryption and authentication, many researchers have proposed different anomaly detection techniques for detecting injection attacks. A comprehensive survey of anomaly detection can be found in [1], [23], [24]. This includes rule/frequency-based techniques, sequence-based and machine learning-based techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Given the vulnerability of CAN bus with respect to lack of encryption and authentication, many researchers have proposed different anomaly detection techniques for detecting injection attacks. A comprehensive survey of anomaly detection can be found in [1], [23], [24]. This includes rule/frequency-based techniques, sequence-based and machine learning-based techniques.…”
Section: Related Workmentioning
confidence: 99%
“…5, very few works have compared their proposed solutions with others that have similar conditions. It is necessary to evaluate and validate the significant differences of the proposed method among different methods so that the concerned method can achieve optimal performance [87].…”
Section: Discussion and Summarymentioning
confidence: 99%
“…This article helps to understand the advantages of test methods in the detection performance of in-vehicle networks. Furthermore, it promotes the application of detection technologies to safety issues in the automotive industry [24]. Zhang et al took intrusion detection system (IDS) as the research object, established an IDS model based on data mining, obtained experimental results, and drew relevant experimental conclusions.…”
Section: Literature Reviewmentioning
confidence: 99%