Skip to main content

2020 | OriginalPaper | Buchkapitel

Practical IDS on In-vehicle Network Against Diversified Attack Models

verfasst von : Junchao Xiao, Hao Wu, Xiangxue Li, Yuan Linghu

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A vehicle bus is a specialized internal communication network that interconnects components inside a vehicle. The Controller Area Network (CAN bus), a robust vehicle bus standard, allows microcontrollers and devices to communicate with each other. The community has seen many security breach examples that exploit CAN functionalities and other in-vehicle flaws. Intrusion detection systems (IDSs) on in-vehicle network are advantageous in monitoring CAN traffic and suspicious activities. Whereas, existing IDSs on in-vehicle network only support one or two attack models, and identifying abnormal in-vehicle CAN traffic against diversified attack models with better performance is more expected as can be then implemented practically. In this paper, we propose an intrusion detection system that can detect many different attacks. The method analyzes the CAN traffic generated by the in-vehicle network in real time and identifies the abnormal state of the vehicle practically. Our proposal fuses the autoencoder trick to the SVM model. More precisely, we introduce to the system an autoencoder that learns to compress CAN traffic data into extracted features (which can be uncompressed to closely match the original data). Then, the support vector machine is trained on the features to detect abnormal traffic. We show detailed model parameter configuration by adopting several concrete attacks. Experimental results demonstrate better detection performance (than existing proposals).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2015) Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2015)
2.
Zurück zum Zitat Foster, I., Prudhomme, A., et al.: Fast and vulnerable: a story of telematic failures. In: USENIX Workshop on Offensive Technologies (2015) Foster, I., Prudhomme, A., et al.: Fast and vulnerable: a story of telematic failures. In: USENIX Workshop on Offensive Technologies (2015)
3.
Zurück zum Zitat Li, X., Yu, Y., Sun, G., et al.: Connected vehicles’ security from the perspective of the in-vehicle network. IEEE Netw. 32(2), 58–63 (2018)CrossRef Li, X., Yu, Y., Sun, G., et al.: Connected vehicles’ security from the perspective of the in-vehicle network. IEEE Netw. 32(2), 58–63 (2018)CrossRef
4.
Zurück zum Zitat Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inform. 9(4), 2034–2042 (2013)CrossRef Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inform. 9(4), 2034–2042 (2013)CrossRef
5.
Zurück zum Zitat Muter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: Proceedings of IEEE Intelligent Vehicles Symposium (IV), June, pp. 1110–1115 (2011) Muter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: Proceedings of IEEE Intelligent Vehicles Symposium (IV), June, pp. 1110–1115 (2011)
6.
Zurück zum Zitat Ji, H., Wang, Y., Qin, H., Wang, Y., Li, H.: Comparative performance evaluation of intrusion detection methods for in-vehicle networks. IEEE Access 6, 37523–37532 (2018)CrossRef Ji, H., Wang, Y., Qin, H., Wang, Y., Li, H.: Comparative performance evaluation of intrusion detection methods for in-vehicle networks. IEEE Access 6, 37523–37532 (2018)CrossRef
7.
Zurück zum Zitat Larson, U.E., Nilsson, D.K., Jonsson, E.: An approach to specification-based attack detection for in-vehicle networks. In: 2008 Intelligent Vehicles Symposium, pp. 220–225. IEEE (2008) Larson, U.E., Nilsson, D.K., Jonsson, E.: An approach to specification-based attack detection for in-vehicle networks. In: 2008 Intelligent Vehicles Symposium, pp. 220–225. IEEE (2008)
8.
Zurück zum Zitat Wang, C., Zhao, Z., Gong, L., et al.: A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6(99), 9091–9098 (2018)CrossRef Wang, C., Zhao, Z., Gong, L., et al.: A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6(99), 9091–9098 (2018)CrossRef
9.
Zurück zum Zitat Hu, W., Liao, Y., Vemuri, V.R.: Robust anomaly detection using support vector machines. In: Proceedings of International Conference on Machine Learning, pp. 282–289 (2003) Hu, W., Liao, Y., Vemuri, V.R.: Robust anomaly detection using support vector machines. In: Proceedings of International Conference on Machine Learning, pp. 282–289 (2003)
10.
Zurück zum Zitat Lee, H., Jeong, S.H., Kim, H.K.: OTIDS: a novel intrusion detection system for in-vehicle network by using remote frame. PST (Privacy, Security and Trust) (2017) Lee, H., Jeong, S.H., Kim, H.K.: OTIDS: a novel intrusion detection system for in-vehicle network by using remote frame. PST (Privacy, Security and Trust) (2017)
11.
Zurück zum Zitat Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of USENIX (2016) Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of USENIX (2016)
12.
Zurück zum Zitat Cozzolino, D., Verdoliva, L.: Single-image splicing localization through autoencoder-based anomaly detection. IEEE International Workshop on Information Forensics and Security. IEEE (2017) Cozzolino, D., Verdoliva, L.: Single-image splicing localization through autoencoder-based anomaly detection. IEEE International Workshop on Information Forensics and Security. IEEE (2017)
13.
Zurück zum Zitat Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdiscip. Rev. Comput. Stat. 2(4), 433–459 (2010)CrossRef Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdiscip. Rev. Comput. Stat. 2(4), 433–459 (2010)CrossRef
14.
Zurück zum Zitat Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 1–27 (2011)CrossRef Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 1–27 (2011)CrossRef
15.
Zurück zum Zitat Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef
Metadaten
Titel
Practical IDS on In-vehicle Network Against Diversified Attack Models
verfasst von
Junchao Xiao
Hao Wu
Xiangxue Li
Yuan Linghu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-38961-1_40

Premium Partner