Detecting CAN Masquerade Attacks with Signal Clustering Similarity
- URL: http://arxiv.org/abs/2201.02665v1
- Date: Fri, 7 Jan 2022 20:25:40 GMT
- Title: Detecting CAN Masquerade Attacks with Signal Clustering Similarity
- Authors: Pablo Moriano, Robert A. Bridges, Michael D. Iannacone
- Abstract summary: Fabrication attacks are the easiest to administer and the easiest to detect because they disrupt frame frequency.
masquerade attacks can be detected by computing time series clustering similarity using hierarchical clustering on the vehicle's CAN signals.
We develop a forensic tool as a proof of concept to demonstrate the potential of the proposed approach for detecting CAN masquerade attacks.
- Score: 2.2881898195409884
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Vehicular Controller Area Networks (CANs) are susceptible to cyber attacks of
different levels of sophistication. Fabrication attacks are the easiest to
administer -- an adversary simply sends (extra) frames on a CAN -- but also the
easiest to detect because they disrupt frame frequency. To overcome time-based
detection methods, adversaries must administer masquerade attacks by sending
frames in lieu of (and therefore at the expected time of) benign frames but
with malicious payloads. Research efforts have proven that CAN attacks, and
masquerade attacks in particular, can affect vehicle functionality. Examples
include causing unintended acceleration, deactivation of vehicle's brakes, as
well as steering the vehicle. We hypothesize that masquerade attacks modify the
nuanced correlations of CAN signal time series and how they cluster together.
Therefore, changes in cluster assignments should indicate anomalous behavior.
We confirm this hypothesis by leveraging our previously developed capability
for reverse engineering CAN signals (i.e., CAN-D [Controller Area Network
Decoder]) and focus on advancing the state of the art for detecting masquerade
attacks by analyzing time series extracted from raw CAN frames. Specifically,
we demonstrate that masquerade attacks can be detected by computing time series
clustering similarity using hierarchical clustering on the vehicle's CAN
signals (time series) and comparing the clustering similarity across CAN
captures with and without attacks. We test our approach in a previously
collected CAN dataset with masquerade attacks (i.e., the ROAD dataset) and
develop a forensic tool as a proof of concept to demonstrate the potential of
the proposed approach for detecting CAN masquerade attacks.
Related papers
- Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning [0.2812395851874055]
This paper introduces a novel framework for detecting masquerade attacks in the CAN bus using graph machine learning (ML)
We show that by representing CAN bus frames as message sequence graphs (MSGs) and enriching each node with contextual statistical attributes from time series, we can enhance detection capabilities.
Our method ensures a comprehensive and dynamic analysis of CAN frame interactions, improving robustness and efficiency.
arXiv Detail & Related papers (2024-08-10T04:17:58Z) - AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN [4.263056416993091]
Vehicular controller area networks (CANs) are susceptible to masquerade attacks by malicious adversaries.
We introduce a benchmark study of four different non-deep learning (DL)-based unsupervised online intrusion detection systems (IDS) for masquerade attacks in CAN.
We show that although benchmarked IDS are not effective at detecting every attack type, the method that relies on detecting changes at the hierarchical structure of clusters of time series produces the best results.
arXiv Detail & Related papers (2024-06-19T19:04:51Z) - Real-Time Zero-Day Intrusion Detection System for Automotive Controller
Area Network on FPGAs [13.581341206178525]
This paper presents an unsupervised-learning-based convolutional autoencoder architecture for detecting zero-day attacks.
We quantise the model using Vitis-AI tools from AMD/Xilinx targeting a resource-constrained Zynq Ultrascale platform.
The proposed model successfully achieves equal or higher classification accuracy (> 99.5%) on unseen DoS, fuzzing, and spoofing attacks.
arXiv Detail & Related papers (2024-01-19T14:36:01Z) - Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks [76.35478518372692]
We introduce epsilon-illusory, a novel form of adversarial attack on sequential decision-makers.
Compared to existing attacks, we empirically find epsilon-illusory to be significantly harder to detect with automated methods.
Our findings suggest the need for better anomaly detectors, as well as effective hardware- and system-level defenses.
arXiv Detail & Related papers (2022-07-20T19:49:09Z) - CARBEN: Composite Adversarial Robustness Benchmark [70.05004034081377]
This paper demonstrates how composite adversarial attack (CAA) affects the resulting image.
It provides real-time inferences of different models, which will facilitate users' configuration of the parameters of the attack level.
A leaderboard to benchmark adversarial robustness against CAA is also introduced.
arXiv Detail & Related papers (2022-07-16T01:08:44Z) - CANShield: Signal-based Intrusion Detection for Controller Area Networks [29.03951113836835]
We propose CANShield, a signal-based intrusion detection framework for the CAN bus.
CanShield consists of three modules: a data preprocessing module that handles the high-dimensional CAN data stream at the signal level; a data analyzer module consisting of multiple deep autoencoder networks, each analyzing the time-series data from a different temporal perspective; and an attack detection module that uses an ensemble method to make the final decision.
arXiv Detail & Related papers (2022-05-03T04:52:44Z) - Zero-Query Transfer Attacks on Context-Aware Object Detectors [95.18656036716972]
Adversarial attacks perturb images such that a deep neural network produces incorrect classification results.
A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check.
We present the first approach for generating context-consistent adversarial attacks that can evade the context-consistency check.
arXiv Detail & Related papers (2022-03-29T04:33:06Z) - Detecting message modification attacks on the CAN bus with Temporal
Convolutional Networks [0.3441021278275805]
We present a novel machine learning based intrusion detection method for CAN networks.
Our proposed temporal convolutional network-based solution can learn the normal behavior of CAN signals and differentiate them from malicious ones.
arXiv Detail & Related papers (2021-06-16T10:51:58Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Learning to Separate Clusters of Adversarial Representations for Robust
Adversarial Detection [50.03939695025513]
We propose a new probabilistic adversarial detector motivated by a recently introduced non-robust feature.
In this paper, we consider the non-robust features as a common property of adversarial examples, and we deduce it is possible to find a cluster in representation space corresponding to the property.
This idea leads us to probability estimate distribution of adversarial representations in a separate cluster, and leverage the distribution for a likelihood based adversarial detector.
arXiv Detail & Related papers (2020-12-07T07:21:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.