Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
ACM Computer Science in Cars Symposium 2019
DOI: 10.1145/3359999.3360496
|View full text |Cite
|
Sign up to set email alerts
|

Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus

Abstract: Automotive electronics is rapidly expanding. An average vehicle contains million lines of software codes, running on 100 of electronic control units (ECUs), in supporting number of safety, driver assistance and infotainment functions. These ECUs are networked using a Controller Area Network (CAN). Security of the CAN bus has not historically been a major concern, however, recent research demonstrate that CAN has many vulnerabilities to cyber attacks. This paper presents a contextualised anomaly detector for mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…Frequency or time-based IDSs utilize the timing of CAN frames or the sequential nature of the IDs. In [18], the authors developed a context-aware anomaly detector for monitoring cyberattacks on the CAN bus using sequence modelling. The authors of [19] proposed an anomaly detection algorithm by modelling the normal behaviour of the CAN bus considering the recurring pattern of CAN IDs.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Frequency or time-based IDSs utilize the timing of CAN frames or the sequential nature of the IDs. In [18], the authors developed a context-aware anomaly detector for monitoring cyberattacks on the CAN bus using sequence modelling. The authors of [19] proposed an anomaly detection algorithm by modelling the normal behaviour of the CAN bus considering the recurring pattern of CAN IDs.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [19] proposed an anomaly detection algorithm by modelling the normal behaviour of the CAN bus considering the recurring pattern of CAN IDs. This is equivalent to 2-grams in the N-gram based model used in [18]. While N-gram based algorithms can capture the context, this often leads to high computational overhead as N increases.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Another context-aware IDS approach was presented by Kalutarage et al [100]. They present an anomaly-based IDS, aiming at contextualizing CAN messages.…”
Section: ) ''Context-aware Anomaly Detector For Monitoring Cyber Attacks On Automotive Can Bus'' [100]mentioning
confidence: 99%