Detecting Low-Rate Replay-Based Injection Attacks on In-Vehicle Networks

被引:25
作者
Katragadda, Satya [1 ]
Darby, Paul J., III [2 ]
Roche, Andrew [2 ]
Gottumukkala, Raju [1 ,2 ]
机构
[1] Univ Louisiana Lafayette, Informat Res Inst, Lafayette, LA 70506 USA
[2] Univ Louisiana Lafayette, Coll Engn, Lafayette, LA 70506 USA
基金
美国国家科学基金会;
关键词
Vehicular networks; CAN bus; intrusion detection; injection attacks; sub-sequence mining;
D O I
10.1109/ACCESS.2020.2980523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of security in today & x2019;s in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle & x2019;s normal behavior. The attacker may exploit this vulnerability to launch targeted low-rate injection attacks which are difficult to detect because the network traffic during attacks looks like regular network traffic. In this paper, we propose a sequence mining approach to detect low-rate injection attacks in Control Area Network (CAN). We discuss four different types of replay attacks that can be used by the adversary, and evaluate the effectiveness of proposed method for varying attack characteristics and computational performance for each of the attacks. We observe that the proposed sequence-based anomaly detection achieves over 99 & x0025; f-score, and outperforms existing dictionary based and multi-variate Markov chain based approach. Given that the proposed technique only uses CAN identifiers, the techniques could be adaptable to any type of vehicle manufacturer.
引用
收藏
页码:54979 / 54993
页数:15
相关论文
共 34 条
[21]   Detecting in-vehicle intrusion via semi-supervised learning-based convolutional adversarial autoencoders [J].
Hoang, Thien-Nu ;
Kim, Daehee .
VEHICULAR COMMUNICATIONS, 2022, 38
[22]   Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks [J].
Lin, Jiaying ;
Wei, Yehua ;
Li, Wenjia ;
Long, Jing .
UBIQUITOUS SECURITY, 2022, 1557 :255-267
[23]   Detecting Injection Attacks in ADS-B Devices Using RNN-Based Models [J].
Khoei, Tala Talaei ;
Slimane, Hadjar Ould ;
Al Shamaileh, Khair ;
Devabhaktuni, Vijaya Kumar ;
Kaabouch, Naima .
2024 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE, ICNS, 2024,
[24]   Detecting insider attacks in medical cyber-physical networks based on behavioral profiling [J].
Meng, Weizhi ;
Li, Wenjuan ;
Wang, Yu ;
Au, Man Ho .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :1258-1266
[25]   Deep learning-based intrusion detection system for in-vehicle networks with knowledge graph and statistical methods [J].
Alqahtani, Hamed ;
Kumar, Gulshan .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2025, 16 (5-6) :3539-3555
[26]   Attention-CNN-LSTM based intrusion detection system (ACL-IDS) for in-vehicle networks [J].
Taneja, Amit ;
Kumar, Gulshan .
Soft Computing, 2024, 28 (23) :13429-13441
[27]   Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy [J].
Alfriehat, Nadia A. ;
Anbar, Mohammed ;
Karuppayah, Shankar ;
Rihan, Shaza Dawood Ahmed ;
Alabsi, Basim Ahmad ;
Momani, Alaa M. .
IEEE ACCESS, 2024, 12 :31136-31158
[28]   Fuzzy-Logic Based IDS for Detecting Jamming Attacks in Wireless Mesh IoT Networks [J].
Savva, Michael ;
Ioannou, Iacovos ;
Vassiliou, Vasos .
2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,
[29]   Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station [J].
Mondal, Koushik ;
Yadav, Satyendra Singh ;
Pal, Vipin ;
Singh, Akhilendra Pratap ;
Yogita, Yogita ;
Singh, Mangal .
INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2022, 13 (06)
[30]   Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks [J].
Lee, Hae Young .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (04) :964-967