2019
DOI: 10.1109/tifs.2019.2895957
|View full text |Cite
|
Sign up to set email alerts
|

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks

Abstract: This paper presents a new masquerade attack called the cloaking attack and provides formal analyses for clock skewbased Intrusion Detection Systems (IDSs) that detect masquerade attacks in the Controller Area Network (CAN) in automobiles. In the cloaking attack, the adversary manipulates the message inter-transmission times of spoofed messages by adding delays so as to emulate a desired clock skew and avoid detection. In order to predict and characterize the impact of the cloaking attack in terms of the attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(22 citation statements)
references
References 32 publications
(36 reference statements)
0
22
0
Order By: Relevance
“…Ji et al [35] evaluate the performance of clock skew-based detection method compared with information entropy detection algorithm. However, the estimation process of clock skew as discussed above can be easily compromised by modifying the transmission of frames as demonstrated in [24]. Besides, Kulandaivel et al [22] point out that the calculation process of clock skew proposed in [14] can be affected by the period of CAN frames.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ji et al [35] evaluate the performance of clock skew-based detection method compared with information entropy detection algorithm. However, the estimation process of clock skew as discussed above can be easily compromised by modifying the transmission of frames as demonstrated in [24]. Besides, Kulandaivel et al [22] point out that the calculation process of clock skew proposed in [14] can be affected by the period of CAN frames.…”
Section: B Related Workmentioning
confidence: 99%
“…Besides voltage, the timing of signal is another physical characteristic which can be exploited for automotive IDS. The fundamental of approaches [14], [22]- [24] is based on the fact that the clock skew exists in the clocks of different ECUs which is unique and stable thus can be exploited as fingerprint to detect attack and pinpoint the source sender in automotive networks. The clock skew represents the difference in frequency among different ECUs.…”
Section: Introductionmentioning
confidence: 99%
“…Here, the author extracted functional vector and used in both the IDS with the one-class support vector machine (OCSVM) kernel (radial basis function (RBF)) and other IDSs 9,15 in a similar way. Ying et al 17 presented an IDS for cloaking attack with clock skewbased IDS as a solution for controller area network.…”
Section: Related Workmentioning
confidence: 99%
“…In order to evaluate the bit error ratio of IAT-based covert channels on real vehicles, we collected data for six representative messages (including message 0x180 that was transmitted from the testbed ECU) with different ID levels, periods, and noise levels from the Toyota Camry [8] and the UW EcoCAR [10], as shown in Table 2. The same EcoCAR dataset was used in [35]. Note that IAT noise is quantified in terms of the standard deviation (normalized by the period) and the range (the difference between the maximum IAT and the minimum IAT, normalized by the period).…”
Section: Evaluation Of Iat-based Covert Channelmentioning
confidence: 99%
“…The timing-based IDS in [5] exploits CAN message periodicity to estimate clock skew as a unique fingerprint to detect masquerade attacks. Nevertheless, it was later shown to be ineffective against the cloaking attack that modifies the inter-transmission time to emulate the clock skew of the targeted ECU [28,35]. The voltage-based IDSs [6,7,17,24] attempt to fingerprint the attacker through voltage signal characteristics.…”
Section: Introductionmentioning
confidence: 99%