Attacker Identification and Intrusion Detection for In-Vehicle Networks

被引:53
作者
Ning, Jing [1 ,2 ]
Wang, Jiadai [1 ,2 ]
Liu, Jiajia [3 ]
Kato, Nei [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[3] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Shaanxi, Peoples R China
[4] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
基金
中国国家自然科学基金;
关键词
Intrusion detection; Protocols; Voltage measurement; Anomaly detection; Feature extraction; Dimensionality reduction; Controller area network; intrusion detection; local outlier factor;
D O I
10.1109/LCOMM.2019.2937097
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As the most wide-spread in-vehicle data bus protocol, CAN (Controller Area Network) has attracted more and more attention due to its lack of security protection mechanism. A variety of attacks against CAN bus have emerged, posing serious threat to vehicle safety. Accordingly, some methods have been proposed to detect CAN bus attacks, however, they have certain shortcomings such as additional computing burden and obvious false detection rate. Therefore, using the physical characteristics of voltage signal on CAN bus, we propose an LOF (Local Outlier Factor)-based intrusion detection method, which can greatly reduce the false detection rate as well as improve the detection accuracy. The modification of CAN protocol and the additional computation burden can also be avoided. In addition, to the best of our knowledge, we are the first to implement bus-off intrusion detection on real vehicles.
引用
收藏
页码:1927 / 1930
页数:4
相关论文
共 10 条
[1]  
[Anonymous], 2018, P IEEE INT C COMM WO
[2]   Viden: Attacker Identification on In-Vehicle Networks [J].
Cho, Kyong-Tak ;
Shin, Kang G. .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1109-1123
[3]   Error Handling of In-vehicle Networks Makes Them Vulnerable [J].
Cho, Kyong-Tak ;
Shin, Kang G. .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1044-1055
[4]  
Duong TQ, 2014, IEEE GLOB COMM CONF, P3074, DOI 10.1109/GLOCOM.2014.7037277
[5]   Secure and Authentic Communication on Existing In-Vehicle Networks [J].
Groll, Andre ;
Ruland, Christoph .
2009 IEEE INTELLIGENT VEHICLES SYMPOSIUM, VOLS 1 AND 2, 2009, :1093-1097
[6]   Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks [J].
Groza, Bogdan ;
Murvay, Pal-Stefan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) :1037-1051
[7]   Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks [J].
Kneib, Marcel ;
Huth, Christopher .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :787-800
[8]   In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions [J].
Liu, Jiajia ;
Zhang, Shubin ;
Sun, Wen ;
Shi, Yongpeng .
IEEE NETWORK, 2017, 31 (05) :50-58
[9]   WIRELESS TELEMATICS SYSTEMS IN EMERGING INTELLIGENT AND CONNECTED VEHICLES: THREATS AND SOLUTIONS [J].
Luo, Qian ;
Liu, Jiajia .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) :113-119
[10]  
Song HM, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P63, DOI 10.1109/ICOIN.2016.7427089