2020
DOI: 10.1109/tvt.2019.2961344
|View full text |Cite
|
Sign up to set email alerts
|

SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 105 publications
(71 citation statements)
references
References 38 publications
0
59
0
Order By: Relevance
“…In the second experiment, the WINDS is tested on the realworld vehicle attacks and compared with baseline frequencybased IDS and other existing methods; GIDS [11], DCNN [14], and SAIDuCANT [32], which are based on generative adversarial nets, deep convolutional neural network, and a specification of CAN timing, respectively. The results for the real-vehicle attacks are summarized in Table VII.…”
Section: ) Real Vehicle Attacksmentioning
confidence: 99%
“…In the second experiment, the WINDS is tested on the realworld vehicle attacks and compared with baseline frequencybased IDS and other existing methods; GIDS [11], DCNN [14], and SAIDuCANT [32], which are based on generative adversarial nets, deep convolutional neural network, and a specification of CAN timing, respectively. The results for the real-vehicle attacks are summarized in Table VII.…”
Section: ) Real Vehicle Attacksmentioning
confidence: 99%
“…The controller area network (CAN) protocol specification has been utilised by Olufowobi et al in [28] as specification source. Larson et al in [29] employ the CAN protocol version 2 and the CANOpen application layer draft standard 3.01 as specification source to extract the expected behaviour of electronic control unit of an in-vehicle network.…”
Section: A Specification Sourcementioning
confidence: 99%
“…The dataset presented a quite complex structure to analyse since it contained a high number of different attack types, more than 2000, with just one occurrence, sent totally at random. Olufowobi et al [38] implemented an IDS based on a supervised learning approach and tested the model using the described dataset but only including the messages sent at regular or with a minimum interval time. We included in the analysis all kinds of messages and despite the complex structure of the CAN bus dataset, the proposed methods showed a high performance in identifying even the attack messages sent totally at random at arbitrary times on the CAN bus.…”
Section: Related Workmentioning
confidence: 99%
“…Olufowobi et al suggested a specification-based IDS using a response time analysis of the CAN bus. They restricted the analysis only checking periodic and sporadic messages [38]. Seo et al proposed an anomaly-based IDS using a deep-learning model, in particular, generative adversarial nets (GAN) [27].…”
Section: Dataset Detection Rate (%) Precision (%) Fpr (False Positivementioning
confidence: 99%