Anomaly Detection System for Altered Signal Values within the Intra-Vehicle Network

被引:2
作者
Abbas, Mohamed [1 ,2 ]
Safar, Mona [1 ,2 ]
Salem, Ashraf [2 ]
机构
[1] Ain Shams Univ, Comp & Syst Engn Dept, Cairo, Egypt
[2] Mentor A Siemens Business, Cairo, Egypt
来源
2020 15TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2020) | 2020年
关键词
In-vehicle network; vehicle cybersecurity; anomaly detection; intrusion detection;
D O I
10.1109/dtis48698.2020.9081056
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A modern vehicle is a complex system of sensors, actuators, and electronic control units (ECUs) connected through different automotive networks. In the past, vehicle networks used to be isolated from the outside world which made them immune to attacks. However, recent technologies have made vehicles vulnerable to cyberattacks. This paper proposes a supervised prediction model that allows the ECUs to detect anomalies in the content of the received messages. The implementation introduces a novel approach to rely on the signal value instead of the bitstream values for feature selection. The advantage of this approach will be highlighted. Additionally, a discussion of anomaly detection in the AUTOSAR standard is presented showing how the implemented model can be integrated into a network of ECUs running AUTOSAR communication stacks. A thorough evaluation of the proposed model is presented on a generated dataset where different types of data anomalies are added.
引用
收藏
页数:6
相关论文
共 14 条
[1]   Intrusion Detection Systems for Intra-Vehicle Networks: A Review [J].
Al-Jarrah, Omar Y. ;
Maple, Carsten ;
Dianati, Mehrdad ;
Oxtoby, David ;
Mouzakitis, Alex .
IEEE ACCESS, 2019, 7 :21266-21289
[2]  
[Anonymous], 2015, Wired
[3]  
Autosar.org, SPEC COMM
[4]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)
[5]  
Marchetti M, 2017, IEEE INT VEH SYM, P1577, DOI 10.1109/IVS.2017.7995934
[6]  
Miller C., 2015, Black Hat USA
[7]  
Müter M, 2011, IEEE INT VEH SYM, P1110, DOI 10.1109/IVS.2011.5940552
[8]  
Muter M., 2010, 2010 Sixth International Conference on Information Assurance and Security (IAS 2010), P92, DOI 10.1109/ISIAS.2010.5604050
[9]  
Nie Sen, 2016, CAR HACKING RES REMO, P37
[10]  
Stabili D, 2017, 2017 AEIT INTERNATIONAL ANNUAL CONFERENCE