Skip to main content
Top

2022 | OriginalPaper | Chapter

A Concept of IDS for CAN Protocol Based on Statics Theory

Authors : Md Rezanur Islam, Insu Oh, Munkhdelgerekh Batzorig, Seoyeon Kim, Kangbin Yim

Published in: Advances on Broad-Band Wireless Computing, Communication and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Day after day, modern attacks continue to hit the onboard network due to creating complexity of the group of software and hardware components utilized in vehicles. These new components display challenges within the improvement of compelling and responsive security mechanisms. A few intrusion detection systems (IDS) have been proposed to distinguish and defend vehicle systems from pernicious exercises. Here, in this study we depict statistical-based analysis which applied to intrusion detection method to secure car systems, with a specific accentuation on Control Area Network (CAN). This study underlines a portrayal of vulnerabilities, highlight threat models, easily recognize known attacks that are shown within the CAN.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lu, Z., Wang, Q., Qu, G., Liu, Z.: BARS: a Blockchain- based Anonymous Reputation System for Trust Management in VANETs.arXiv:1807.06159 [cs.CR] (2018) Lu, Z., Wang, Q., Qu, G., Liu, Z.: BARS: a Blockchain- based Anonymous Reputation System for Trust Management in VANETs.arXiv:​1807.​06159 [cs.CR] (2018)
2.
go back to reference Koscher, A., et al.: Experimental Security analysis of a modern automobile. In: Security and Privacy (SP), 2010 IEEE Symposium on IEEE, 2010, pp. 447–462 (2010) Koscher, A., et al.: Experimental Security analysis of a modern automobile. In: Security and Privacy (SP), 2010 IEEE Symposium on IEEE, 2010, pp. 447–462 (2010)
3.
go back to reference Miller, C., Valasek, C.: Adventures in automotive networks and control units. DEF CON 21, 260–264 (2013) Miller, C., Valasek, C.: Adventures in automotive networks and control units. DEF CON 21, 260–264 (2013)
4.
go back to reference Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2015) Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2015)
5.
go back to reference Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015) Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015)
6.
go back to reference Miller, C., Valasek, C.: Remote Exploitation of an Unaltered Passenger Vehicle, Black Hat USA (2015) Miller, C., Valasek, C.: Remote Exploitation of an Unaltered Passenger Vehicle, Black Hat USA (2015)
7.
go back to reference Lee, B.S., Park, M.K., Sung, K.G.: Developing an In-vehicle Network Education System Based on CAN (2006) Lee, B.S., Park, M.K., Sung, K.G.: Developing an In-vehicle Network Education System Based on CAN (2006)
8.
go back to reference An, Y., Park, J., Oh, I., Kim, M., Yim, K.: Design and implementation of a novel testbed for automotive security analysis. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds.) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2020. Advances in Intelligent Systems and Computing, vol. 1195. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-50399-4_23 An, Y., Park, J., Oh, I., Kim, M., Yim, K.: Design and implementation of a novel testbed for automotive security analysis. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds.) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2020. Advances in Intelligent Systems and Computing, vol. 1195. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-50399-4_​23
9.
go back to reference A study on the implementation and analysis method of the connected car accident scenario model (KISA-WP-2018-002) A study on the implementation and analysis method of the connected car accident scenario model (KISA-WP-2018-002)
10.
go back to reference Lee, H., Jeong, S.H., Kim, H.K.: In 2017 15th Annual Conference on Privacy, Security and Trust (PST). OTIDS: A novel intrusion detection system for in vehicle network by using remote frame (Calgary, 2017), pp. 57–5709 Lee, H., Jeong, S.H., Kim, H.K.: In 2017 15th Annual Conference on Privacy, Security and Trust (PST). OTIDS: A novel intrusion detection system for in vehicle network by using remote frame (Calgary, 2017), pp. 57–5709
11.
go back to reference Wang, Q., Lu, Z., Qu, G.: An entropy analysis-based intrusion detection system for controller area network in vehicles. In System-on-Chip Conference (SOCC), 2018 31st IEEE International. IEEE (2018) Wang, Q., Lu, Z., Qu, G.: An entropy analysis-based intrusion detection system for controller area network in vehicles. In System-on-Chip Conference (SOCC), 2018 31st IEEE International. IEEE (2018)
14.
go back to reference Avalappampatty Sivasamy, A., Sundan, B.: A dynamic intrusion detection system based on multivariate Hotelling’s T2 statistics approach for network environments. Sci. World J. 1–9 (2015) Avalappampatty Sivasamy, A., Sundan, B.: A dynamic intrusion detection system based on multivariate Hotelling’s T2 statistics approach for network environments. Sci. World J. 1–9 (2015)
15.
go back to reference Qayyum, A., Islam, M.H., Jamil, M.: In Proceedings of the IEEE Symposium on Emerging Technologies. Taxonomy of statistical based anomaly detection techniques for intrusion detection (Islamabad, 2005), pp. 270–276 (2005) Qayyum, A., Islam, M.H., Jamil, M.: In Proceedings of the IEEE Symposium on Emerging Technologies. Taxonomy of statistical based anomaly detection techniques for intrusion detection (Islamabad, 2005), pp. 270–276 (2005)
17.
go back to reference Cho, K.T., Shin, K.G.:Viden: attacker identification on in-vehicle networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS 2017. New York, NY, USA: ACM, 2017, pp. 1109–1123 (2017). https://doi.org/10.1145/3133956.3134001 Cho, K.T., Shin, K.G.:Viden: attacker identification on in-vehicle networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS 2017. New York, NY, USA: ACM, 2017, pp. 1109–1123 (2017). https://​doi.​org/​10.​1145/​3133956.​3134001
18.
go back to reference Nowdehi, N., Aoudi, W., Almgren, M., Olovsson, T.: CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks. CoRR abs/1909.08407 (2019) Nowdehi, N., Aoudi, W., Almgren, M., Olovsson, T.: CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks. CoRR abs/1909.08407 (2019)
20.
go back to reference Cho, K.T., Shin, K.G.: In 25th {USENIX} Security Symposium ({USENIX} Security 16). Fingerprinting electronic control units for vehicle intrusion detection (Austin, 2016), pp. 911–927 (2016) Cho, K.T., Shin, K.G.: In 25th {USENIX} Security Symposium ({USENIX} Security 16). Fingerprinting electronic control units for vehicle intrusion detection (Austin, 2016), pp. 911–927 (2016)
21.
go back to reference Lokman, S.F., Othman, A.T., Abu-Bakar, M.H.: Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review. EURASIP J. Wirel. Commun. Netw. 2019, Article number: 184 (2019) Lokman, S.F., Othman, A.T., Abu-Bakar, M.H.: Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review. EURASIP J. Wirel. Commun. Netw. 2019, Article number: 184 (2019)
22.
go back to reference Deng, L., Yu, D.: Deep learning: methods and applications. Foundations and Trends®. Signal Process. 7(3–4), 197–387 (2014) Deng, L., Yu, D.: Deep learning: methods and applications. Foundations and Trends®. Signal Process. 7(3–4), 197–387 (2014)
23.
go back to reference Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS One 11(6), e0155781 (2016) Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS One 11(6), e0155781 (2016)
24.
go back to reference Erhan, D., Bengio, Y., Courville, A., Manzagol, P.A., Vincent, P., Bengio, S.: Why does unsupervised pre-training help deep learning? J. Mach. Learn. Res. 11(Feb), 625–660 (2010) Erhan, D., Bengio, Y., Courville, A., Manzagol, P.A., Vincent, P., Bengio, S.: Why does unsupervised pre-training help deep learning? J. Mach. Learn. Res. 11(Feb), 625–660 (2010)
25.
go back to reference Tariq, S., Lee, S., Kim, H.K., Woo, S.S.:, CAN-ADF: The controller area network attack detection framework. Comput. Secur. 94, 101857 (2020) Tariq, S., Lee, S., Kim, H.K., Woo, S.S.:, CAN-ADF: The controller area network attack detection framework. Comput. Secur. 94, 101857 (2020)
Metadata
Title
A Concept of IDS for CAN Protocol Based on Statics Theory
Authors
Md Rezanur Islam
Insu Oh
Munkhdelgerekh Batzorig
Seoyeon Kim
Kangbin Yim
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-90072-4_32