2019
DOI: 10.1186/s13638-019-1484-3
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review

Abstract: The modern vehicles nowadays are managed by networked controllers. Most of the networks were designed with little concern about security which has recently motivated researchers to demonstrate various kinds of attacks against the system. In this paper, we discussed the vulnerabilities of the Controller Area Network (CAN) within invehicle communication protocol along with some potential attacks that could be exploited against it. Besides, we present some of the security solutions proposed in the current state o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 138 publications
(57 citation statements)
references
References 61 publications
0
57
0
Order By: Relevance
“…A traditional IDS is unable to detect malfunction attacks on the CAN bus; thus, it is challenging for it to distinguish unknown attacks. Based on the requirements and functionalities, there are different types of IDS: signature-based, anomaly-based, misuse-based, and hybrid [7], [8]. A signature-based IDS is unable to detect unknown attacks, whereas an anomaly-based IDS is capable of detecting unknown and malfunction attacks.…”
Section: Introductionmentioning
confidence: 99%
“…A traditional IDS is unable to detect malfunction attacks on the CAN bus; thus, it is challenging for it to distinguish unknown attacks. Based on the requirements and functionalities, there are different types of IDS: signature-based, anomaly-based, misuse-based, and hybrid [7], [8]. A signature-based IDS is unable to detect unknown attacks, whereas an anomaly-based IDS is capable of detecting unknown and malfunction attacks.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, different machine learning techniques have been used, for example, neural network classifiers, Bayesian classifiers, Bayesian regularized neural networks, naive Bayes, support vector machines (SVM), and self-organization maps (SOM) [28,29].…”
Section: Related Workmentioning
confidence: 99%
“…The CAN bus is a message-based protocol designed for in-vehicle networks. It enables numerous electronic components, throughout the in-vehicle system, to communicate with each other through a single/dual-wire bus [29]. Consequently, all the nodes in a CAN bus can receive all packet transmissions and a frame is defined as a structure [30].…”
Section: Control Area Network (Can)mentioning
confidence: 99%
“…The CAN facilitates the interaction of 20 to 100 Electronic Control Units (ECU) which coordinate, monitor and control loads of internal vehicle components such as engine system, brake system and telematics system through the exchange of information among them [1]. Nevertheless, the exchange of information within the CAN bus system has exposed it to external penetration threats which can harm drivers, the operating environment as well as other vehicles [2,3]. CAN works by broadcasting packets to its bus which means all nodes and ECUs attached to the bus can receive all transmitted packets.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, nodes and ECUs have no authentication mechanism for identifying the legitimacy or source of packets which makes them vulnerable to attacks. When the CAN is compromised, attackers can inject malicious messages to ECUs that can trigger physical action such as steering and braking, manipulate speedometer display information, etc [3,4]. The attacks on the In-vehicular network can be analyzed in terms of attack surface and attack vector [5]; In the attack surface aspect, the attack can be launched directly through the On-Board Diagnostic II (OBD-II) port or indirectly through firmware such as the media player.…”
Section: Introductionmentioning
confidence: 99%