Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation

被引:21
作者
al-Khateeb, Haider [1 ]
Epiphaniou, Gregory [1 ]
Reviczky, Adam [2 ]
Karadimas, Petros [3 ]
Heidari, Hadi [3 ]
机构
[1] Univ Wolverhampton, Wolverhampton Cyber Res Inst, Sch Math & Comp Sci, Wolverhampton WV1 1LY, W Midlands, England
[2] Northumbria Univ, Dept Engn & Environm, London Campus, London E1 7HT, England
[3] Univ Glasgow, Sch Engn, Glasgow G12 8QQ, Lanark, Scotland
关键词
Connected cars; cyber physical systems; cyber threat; proactive detection; Bayesian estimation; Kalman filter; PREDICTION; VEHICLES; SYSTEMS; POLICY;
D O I
10.1109/JSEN.2017.2782751
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber-threats against such systems. In this paper, we introduce proactive anomaly detection to a use-case of hijacked connected cars to improve cyber-resilience. First, we manifest the opportunity of behavioral profiling for connected cars from recent literature covering related underpinning technologies. Then, we design and utilize a new data set file for connected cars influenced by the automatic dependent surveillance-broadcast surveillance technology used in the aerospace industry to facilitate data collection and sharing. Finally, we simulate the analysis of travel routes in real time to predict anomalies using predictive modeling. Simulations show the applicability of a Bayesian estimation technique, namely, Kalman filter. With the analysis of future state predictions based on the previous behavior, cyber-threats can be addressed with a vastly increased time window for a reaction when encountering anomalies. We discuss that detecting real-time deviations for malicious intent with the predictive profiling and behavioral algorithms can be superior in effectiveness than the retrospective comparison of known-good/known-bad behavior. When quicker action can be taken while connected cars encounter cyber-attacks, more effective engagement or interception of command and control will be achieved.
引用
收藏
页码:4822 / 4831
页数:10
相关论文
共 44 条
[1]  
Alemdar H, 2017, IEEE IJCNN, P2547, DOI 10.1109/IJCNN.2017.7966166
[2]  
Alpaydin E, 2014, ADAPT COMPUT MACH LE, P1
[3]  
[Anonymous], 2013, P 8 ANN CYB SEC INF
[4]  
[Anonymous], 2016, AUTONOMOUS VEHICLE N
[5]  
[Anonymous], 2016, Tech. rep.
[6]  
[Anonymous], NOVEL ANONYMITY QUAN
[7]  
[Anonymous], 2012, LNEE
[8]  
[Anonymous], P 2 INT C COMP INT R
[9]  
[Anonymous], 579 LINK U DEP EL EN
[10]   Modeling the impact of parking price policy on free-floating carsharing: Case study for Zurich, Switzerland [J].
Balac, Milos ;
Ciari, Francesco ;
Axhausen, Kay W. .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2017, 77 :207-225