Proceedings of the 12th Annual Conference on Cyber and Information Security Research 2017
DOI: 10.1145/3064814.3064816
|View full text |Cite
|
Sign up to set email alerts
|

Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks

Abstract: Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the a ack surface for vehicles grows, exposing control networks to potentially life-critical a acks. is paper addresses the need for securing the controller area network (CA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
60
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 116 publications
(61 citation statements)
references
References 10 publications
1
60
0
Order By: Relevance
“…Third, the unsupervised detection results display the quantitative gain in the false detection rate of the ensemble over any of the constituent members with no expense to the true positive rate. This shows that the ensemble directly addresses the base rate fallacy and supports a growing body of literature in this area [9], [10], [11], [12], [13], [14], [15], [16]. Finally, our anomaly detection ensemble outperforms the supervised algorithms-perhaps surprising given that the latter is privy to other known malware profiles during training.…”
Section: A Contributionssupporting
confidence: 77%
“…Third, the unsupervised detection results display the quantitative gain in the false detection rate of the ensemble over any of the constituent members with no expense to the true positive rate. This shows that the ensemble directly addresses the base rate fallacy and supports a growing body of literature in this area [9], [10], [11], [12], [13], [14], [15], [16]. Finally, our anomaly detection ensemble outperforms the supervised algorithms-perhaps surprising given that the latter is privy to other known malware profiles during training.…”
Section: A Contributionssupporting
confidence: 77%
“…The increasing attack area of vehicles exposes the control network to life-threatening attacks. A method [15] is proposed to detect the abnormal flow pattern by detecting the abnormal refresh rate of some commands, so as to meet the need of protecting the CAN bus.…”
Section: Anomaly Detection Based On Traditional Methodsmentioning
confidence: 99%
“…The next trend in the CAN IDS research literature is to exploit the regular frequency of important CAN messages. Frequency anomalies have been explored to detect and prevent signal-injection attacks and potentially ECU reprogramming [9,16,17]. 3) ECU-fingerprinting IDS: After publication of the Jeep hack [2], in which some ECUs were silenced and others controlled to send spoofed messages in lieu of the silenced ECUs, CAN IDS research transitioned to more sophisticated methods all focused on automatic ECU identification as a stepping stone to IDS.…”
Section: A Related Can Ids Workmentioning
confidence: 99%
“…In short, even though packets are observable, there is no existing way to automatically know what mechanisms they control. This is a primary roadblock to defending CANs and calls for data analytics approaches to pioneer vehicle-agnostic detection and prevention capabilities [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%