2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI) 2016
DOI: 10.1109/rtsi.2016.7740627
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms

Abstract: This paper evaluates the effectiveness of information-theoretic anomaly detection algorithms applied to networks included in modern vehicles. In particular, we focus on providing an experimental evaluation of anomaly detectors based on entropy. Attacks to in-vehicle networks were simulated by injecting different classes of forged CAN messages in traces captured from a modern licensed vehicle. Experimental results show that if entropy-based anomaly detection is applied to all CAN messages it is only possible to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 124 publications
(57 citation statements)
references
References 15 publications
(26 reference statements)
0
57
0
Order By: Relevance
“…Christiansen et al [32] combine background subtraction and convolutional neural networks to detect anomalies/obstacles. Muter et al [11] and Marchetti et al [33] use entropy-based methods to detect anomalies (attacks) in in-vehicle networks. Faughnan et al measure the discrepancy between redundant sensor readings to detect hijacking in unmanned aerial vehicles [30].…”
Section: Related Workmentioning
confidence: 99%
“…Christiansen et al [32] combine background subtraction and convolutional neural networks to detect anomalies/obstacles. Muter et al [11] and Marchetti et al [33] use entropy-based methods to detect anomalies (attacks) in in-vehicle networks. Faughnan et al measure the discrepancy between redundant sensor readings to detect hijacking in unmanned aerial vehicles [30].…”
Section: Related Workmentioning
confidence: 99%
“…Non neural network based methods for anomaly detection on the CAN bus payload include signature based methods [15], finger printing [2], clustering methods [19], fuzzy logic [9], Hidden-Markov-Model based methods [12], and entropy based methods [8,11]. A comprehensive review of the strengths and weaknesses of these and other non-payload based methods can be found in [18].…”
Section: Related Researchmentioning
confidence: 99%
“…However, building such IDS for in-vehicle networks is challenging due to the large number and heterogeneity of ECUs as well as due to limited information exposed by CAN messages (since they are specific to manufacturers and/or vehicle model) [8]. While there exist IDSes for invehicle networks (e.g., by utilizing message frequency [168]- [170], entropy [171], clock skew [172], observing cyberphysical contexts [173]) these systems may not be able to detect attacks involving sporadic/irregular CAN messages. Researchers also proposed to replace the CAN technology and use other alternatives such as Ethernet [174]- [176].…”
Section: Threats To Intra-vehicle Components and Countermeasuresmentioning
confidence: 99%