2021
DOI: 10.1109/tifs.2021.3098162
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs

Abstract: The smart features of modern cars are enabled by a number of Electronic Control Units (ECUs) components that communicate through an in-vehicle network, known as Controller Area Network (CAN) bus. The fundamental challenge is the security of the communication link where an attacker can inject messages (e.g., increase the speed) that may impact the safety of the driver. Most of existing practical IDS solutions rely on the knowledge of the identity of the ECUs, which is proprietary information. This paper propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(20 citation statements)
references
References 44 publications
0
16
0
Order By: Relevance
“…The detection accuracy of cosine graphsimilarity threshold reaches 97.32% of accuracy and the detection speed of 2.5 milliseconds. Unlike most MLbased studies in the literature, the technique proposed in [11] neither depend on the make or model of the car nor its proprietary information (i.e., CAN ID).…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The detection accuracy of cosine graphsimilarity threshold reaches 97.32% of accuracy and the detection speed of 2.5 milliseconds. Unlike most MLbased studies in the literature, the technique proposed in [11] neither depend on the make or model of the car nor its proprietary information (i.e., CAN ID).…”
Section: Related Workmentioning
confidence: 99%
“…Attackers take control of a connected vehicle by injecting messages into its CAN bus. To mitigate such attacks, we have developed an ML-based IDS that captures the pattern of the sequences of the CAN messages and represent them with a directed graph, which we call Messages-Sequence Graph (MSG), where the nodes represent the CAN IDs of the messages and the edges represent the sequences order of the messages, as depicted by Figure 3 [11].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
See 3 more Smart Citations