2015 IEEE International Workshop on Information Forensics and Security (WIFS) 2015
DOI: 10.1109/wifs.2015.7368559
|View full text |Cite
|
Sign up to set email alerts
|

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles

Abstract: Abstract-Mobile cyber-physical systems, such as automobiles, drones and robotic vehicles, are gradually becoming attractive targets for cyber attacks. This is a challenge because intrusion detection systems built for conventional computer systems tend to be unsuitable. They can be too demanding for resource-restricted cyber-physical systems or too inaccurate due to the lack of realworld data on actual attack behaviours. Here, we focus on the security of a small remote-controlled robotic vehicle. Having observe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 56 publications
(24 citation statements)
references
References 19 publications
0
21
0
Order By: Relevance
“…Disrupt communication typically by overwhelming the network with large volumes of meaningless or false data, such as fake alert messages about road accidents and congestion [30], [31], [32], [26], [33], [27], [34], [35], [36], [37] Bus-off attack Exploit the error-handling scheme of in-vehicle networks, by deceiving an uncompromised ECU into thinking it is defective, and eventually forcing itself or even the whole network to shut down [38] Message Distortion Generate distorted reliability message in a vehicular network and activate distribution of this message to a neighbouring vehicle [39] Timing attack An integrity attack that alters message timeslots [40] Replay attack A valid data transmission, such as a command or a sensor reading, is recorded and maliciously repeated at a later point.…”
Section: Attackmentioning
confidence: 99%
“…Disrupt communication typically by overwhelming the network with large volumes of meaningless or false data, such as fake alert messages about road accidents and congestion [30], [31], [32], [26], [33], [27], [34], [35], [36], [37] Bus-off attack Exploit the error-handling scheme of in-vehicle networks, by deceiving an uncompromised ECU into thinking it is defective, and eventually forcing itself or even the whole network to shut down [38] Message Distortion Generate distorted reliability message in a vehicular network and activate distribution of this message to a neighbouring vehicle [39] Timing attack An integrity attack that alters message timeslots [40] Replay attack A valid data transmission, such as a command or a sensor reading, is recorded and maliciously repeated at a later point.…”
Section: Attackmentioning
confidence: 99%
“…By utilizing leveraging physical dynamics of robots, Guo et al [7] have developed a new robotic intrusion detection system (IDS), which can detect actuator attacks as well as sensor attacks for lightweight robots subject to random noises. Through the method of decision tree to generate simple detection rules, Vuong et al [8] evaluated the small-scale remote control of robots against denial of service and command injection attacks. In addition, a novel framework for integrity analysis of robotic systems has been presented, whose output can be used to avoid the inherent design flaws in the system and reduce the damage that may be caused by undiscovered attackers [9].…”
Section: Related Workmentioning
confidence: 99%
“…This system is aimed at ensuring the availability of the transmitted data. In [8] an intrusion detection system based on the signature analysis is considered. The authors conducted a series of experiments to create a standard template describing the normal behavior of the robot in the absence of any external influence, as well as random behavioral anomalies.…”
Section: Maintaining the Integrity Of The Specificationsmentioning
confidence: 99%