SOME/IP Intrusion Detection System Using Real-Time and Retroactive Anomaly Detection

被引:5
作者
Koyama, Takuma [1 ]
Tanaka, Masashi [1 ]
Miyajima, Asami [1 ]
Ukai, Shintaro [2 ]
Sugashima, Takeshi [2 ]
Egawa, Masumi [2 ]
机构
[1] NTT Social Informat Labs, Tokyo, Japan
[2] DENSO Corp, Kariya, Aichi, Japan
来源
2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING) | 2022年
关键词
vehicle security; automotive Ethernet; SOME/IP; intrusion detection system; anomaly detection;
D O I
10.1109/VTC2022-Spring54318.2022.9860928
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the amount of in-vehicle data and number of in-vehicle functions have increased, automotive Ethernet and IP-based protocols have been adopted in vehicles. The scalable service-oriented middleware over IP (SOME/IP) protocol is designed for sending periodic or direct control messages and for updating or appending scalable functions. International regulation UN R-155 requires security monitoring to analyze and detect cyber-threats, vulnerabilities, and cyber-attacks from vehicle data and logs. SOME/IP also should be monitored from the perspective of security. We report a classification of use cases and possible attack patterns for SOME/IP, and we propose an intrusion detection system (MS) that achieves high accuracy by combining two whitelist-based anomaly detection algorithms. The first is a real-time algorithm that compares received SOME/IP packets with a normal communication model to determine whether they are anomalies. The attack patterns covered in this paper include sophisticated malicious packets that are difficult for the real-time detection algorithm to distinguish from normal packets. Hence, the second algorithm performs retroactive detection by determining whether packets are anomalous from long-term time characteristics spanning an entire SOME/IP session. Although the retroactive algorithm takes longer for detection, we confirm a high level of detection accuracy for the proposed IDS, with a true positive rate of 0.91 and a false positive rate of 0.052.
引用
收藏
页数:7
相关论文
共 18 条
[11]  
Li Y., 2020, 2020 27 AS PAC SOFTW
[12]   Field classification, modeling and anomaly detection in unknown CAN bus networks [J].
Markovitz, Moti ;
Wool, Avishai .
VEHICULAR COMMUNICATIONS, 2017, 9 :43-52
[13]  
Matheus K., 2021, KONIGSEDER AUTOMOTIV
[14]  
Miller C., 2015, BLACK HAT US
[15]  
Song HM, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P63, DOI 10.1109/ICOIN.2016.7427089
[16]  
Taylor A, 2015, 2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), P45, DOI 10.1109/WCICSS.2015.7420322
[17]  
Volker L., 2013, AUTOMOTIVE BUS SYSTE
[18]   Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods [J].
Zelle, Daniel ;
Lauser, Timm ;
Kern, Dustin ;
Krauss, Christoph .
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,