Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network
被引:36
作者:
论文数: 引用数:
h-index:
机构:
Olufowobi, Habeeb
[1
]
Ezeobi, Uchenna
论文数: 0引用数: 0
h-index: 0
机构:
Howard Univ, Washington, DC 20059 USAHoward Univ, Washington, DC 20059 USA
Ezeobi, Uchenna
[1
]
Muhati, Eric
论文数: 0引用数: 0
h-index: 0
机构:
Howard Univ, Washington, DC 20059 USAHoward Univ, Washington, DC 20059 USA
Muhati, Eric
[1
]
Robinson, Gaylon
论文数: 0引用数: 0
h-index: 0
机构:
Howard Univ, Washington, DC 20059 USAHoward Univ, Washington, DC 20059 USA
Robinson, Gaylon
[1
]
论文数: 引用数:
h-index:
机构:
Young, Clinton
[2
]
Zambreno, Joseph
论文数: 0引用数: 0
h-index: 0
机构:
Iowa State Univ, Ames, IA USAHoward Univ, Washington, DC 20059 USA
Zambreno, Joseph
[2
]
Bloom, Gedare
论文数: 0引用数: 0
h-index: 0
机构:
Howard Univ, Washington, DC 20059 USAHoward Univ, Washington, DC 20059 USA
Bloom, Gedare
[1
]
机构:
[1] Howard Univ, Washington, DC 20059 USA
[2] Iowa State Univ, Ames, IA USA
来源:
PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19)
|
2019年
关键词:
CAN;
intrusion detection;
data injection;
sequential methods;
change-point detection;
CUSUM;
D O I:
10.1145/3309171.3309178
中图分类号:
TP301 [理论、方法];
学科分类号:
081202 ;
摘要:
The modern vehicle has transformed from a purely mechanical system to a system that embeds several electronic devices. These devices communicate through the in-vehicle network for enhanced safety and comfort but are vulnerable to cyber-physical risks and attacks. A well-known technique of detecting these attacks and unusual events is by using intrusion detection systems. Anomalies in the network occur at unknown points and produce abrupt changes in the statistical features of the message stream. In this paper, we propose an anomaly-based intrusion detection approach using the cumulative sum (CUSUM) change-point detection algorithm to detect data injection attacks on the controller area network (CAN) bus. We leverage the parameters required for the change-point algorithm to reduce false alarm rate and detection delay. Using real dataset generated from a car in normal operation, we evaluate our detection approach on three different kinds of attack scenarios.