2018
DOI: 10.2197/ipsjjip.26.306
|View full text |Cite
|
Sign up to set email alerts
|

Supervised and Unsupervised Intrusion Detection Based on CAN Message Frequencies for In-vehicle Network

Abstract: Modern vehicles are equipped with Electronic Control Units (ECUs) and external communication devices. The Controller Area Network (CAN), a widely used communication protocol for ECUs, does not have a security mechanism to detect improper packets; if attackers exploit the vulnerability of an ECU and manage to inject a malicious message, they are able to control other ECUs to cause improper operation of the vehicle. With the increasing popularity of connected cars, it has become an urgent matter to protect in-ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(17 citation statements)
references
References 12 publications
(21 reference statements)
0
16
0
Order By: Relevance
“…the attacker floods the bus with messages intended to override legitimate messages in the CAN bus [9], [10]. Machine learning methods have been applied on injection attacks, but these techniques have not been tested against low-rate attacks [11]. Detecting low-rate attacks is non-trivial in the domain of network security [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…the attacker floods the bus with messages intended to override legitimate messages in the CAN bus [9], [10]. Machine learning methods have been applied on injection attacks, but these techniques have not been tested against low-rate attacks [11]. Detecting low-rate attacks is non-trivial in the domain of network security [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…The frequencies of packets were also explored to detect anomalies by sliding window to measure the inter-packets timing [19]. In addition, statistical analyses were employed for the detection of anomalies from CAN IDs frequencies [20]. Besides, clockwise, remote frame and network time protocol (NTP) based features have also been proposed for intrusion detection in CAN [21][22][23].The summary of the related works in given in Table I.…”
Section: Related Workmentioning
confidence: 99%
“…Pawelec et al 47 test the effectiveness of employing DNN to predict CAN message at the bit level, which would offer the IDS capability but avoiding reverse engineering proprietary encodings of CAN messages. Kuwahara et al 48 study the applicability of statistical anomaly detection methods to identify malicious CAN messages, where a pipeline technology is proposed to extract the timestamp and ID information in each messages quickly, and the efficiency of the proposed method is evaluated in real message datasets and in supervised and unsupervised cases. Besides NNs, other artificial intelligence algorithms, such as LSTM, 49 Bayesian networks, 50 hidden Markov models, 51 SVM, 52 compound classifier, 53 and singular spectrum analysis 54 are also introduced to build an IDS for CAN bus.…”
Section: The State‐of‐the‐art Work About Security Protection Of In‐vehicle Networkmentioning
confidence: 99%