Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network

被引:36
作者
Olufowobi, Habeeb [1 ]
Ezeobi, Uchenna [1 ]
Muhati, Eric [1 ]
Robinson, Gaylon [1 ]
Young, Clinton [2 ]
Zambreno, Joseph [2 ]
Bloom, Gedare [1 ]
机构
[1] Howard Univ, Washington, DC 20059 USA
[2] Iowa State Univ, Ames, IA USA
来源
PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19) | 2019年
关键词
CAN; intrusion detection; data injection; sequential methods; change-point detection; CUSUM;
D O I
10.1145/3309171.3309178
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The modern vehicle has transformed from a purely mechanical system to a system that embeds several electronic devices. These devices communicate through the in-vehicle network for enhanced safety and comfort but are vulnerable to cyber-physical risks and attacks. A well-known technique of detecting these attacks and unusual events is by using intrusion detection systems. Anomalies in the network occur at unknown points and produce abrupt changes in the statistical features of the message stream. In this paper, we propose an anomaly-based intrusion detection approach using the cumulative sum (CUSUM) change-point detection algorithm to detect data injection attacks on the controller area network (CAN) bus. We leverage the parameters required for the change-point algorithm to reduce false alarm rate and detection delay. Using real dataset generated from a car in normal operation, we evaluate our detection approach on three different kinds of attack scenarios.
引用
收藏
页码:25 / 30
页数:6
相关论文
共 21 条
[1]  
Blazek R.B., 2001, Proceedings of IEEE systems, man and cybernetics information assurance workshop, P220
[2]  
Checkoway Stephen., 2011, SEC'11
[3]  
Granjon Pierre., 2013, The CuSum Algorithm - A Small Review
[4]   Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures [J].
Hoppe, Tobias ;
Kiltz, Stefan ;
Dittmann, Jana .
COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 :235-248
[5]   Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis [J].
Huang, Yi ;
Tang, Jin ;
Cheng, Yu ;
Li, Husheng ;
Campbell, Kristy A. ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2016, 10 (02) :532-543
[6]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)
[7]   Experimental Security Analysis of a Modern Automobile [J].
Koscher, Karl ;
Czeskis, Alexei ;
Roesner, Franziska ;
Patel, Shwetak ;
Kohno, Tadayoshi ;
Checkoway, Stephen ;
Mccoy, Damon ;
Kantor, Brian ;
Anderson, Danny ;
Shacham, Hovav ;
Savage, Stefan .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :447-462
[8]  
Li CZ, 2008, 2008 42ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-3, P600, DOI 10.1109/CISS.2008.4558595
[9]   Adaptive rejection sampling with fixed number of nodes [J].
Martino, L. ;
Louzada, F. .
COMMUNICATIONS IN STATISTICS-SIMULATION AND COMPUTATION, 2019, 48 (03) :655-665
[10]  
Miller C., 2015, ILLMATICS