Detecting Attacks against Safety-Critical ADAS based on In-Vehicle Network Message Patterns

被引:4
作者
Gutierrez, Christopher [1 ]
Juliato, Marcio [1 ]
Ahmed, Shabbir [1 ]
Sastry, Manoj [1 ]
机构
[1] Intel Labs, Hillsboro, OR 97124 USA
来源
49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019): INDUSTRY TRACK | 2019年
关键词
Intrusion detection; Network security; Advanced driver assistance systems; Vehicle safety;
D O I
10.1109/DSN-Industry.2019.00009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vehicles on the road today are Internet-enabled devices, providing navigation, safety, and entertainment to passengers. It is possible for an attacker to compromise these devices to gain remote access to the in-vehicle network, allowing control of the vehicle. To detect the presence of masqueraded messages, we propose a Message Time-series Intrusion Detection System (MTS IDS), which is based on the principle that ADAS messages exhibit regular (benign) patterns.We demonstrate the feasibility of detecting masquerade injection attacks that attempt to negatively influence Advanced Driver-assistance Systems such as Adaptive Cruise Control (ACC) and Lane Centering Systems (LCS). Our results show a MTS IDS detects masquerade messages against ACC and LCS ADAS systems with F1-scores of 0.9889 and 0.98705, respectively. While no computing system can be completely secure, these results can help increase resilience of ADAS and autonomous vehicles against masquerading attacks, and therefore improve road and passenger safety.
引用
收藏
页码:9 / 12
页数:4
相关论文
共 8 条
  • [1] Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
  • [2] VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System
    Choi, Wonsuk
    Joo, Kyungho
    Jo, Hyo Jin
    Park, Moon Chan
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 2114 - 2129
  • [3] Greenberg Andy., 2016, JEEP HACKERS ARE BAC
  • [4] Greenberg Andy, 2015, Hackers remotely kill a jeep on the highway awith me in it
  • [5] Kumar P, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P531, DOI 10.1109/CCAA.2016.7813777
  • [6] Lab K., 2015, Black hat usa 2015: The full story of how that jeep was hacked
  • [7] Linkedin, AUT VEH SAF
  • [8] National Highway Traffic Safety Administration, Automated Vehicles for Safety