Anomaly Detection in Intra-Vehicle Networks
- URL: http://arxiv.org/abs/2205.03537v1
- Date: Sat, 7 May 2022 03:38:26 GMT
- Title: Anomaly Detection in Intra-Vehicle Networks
- Authors: Ajeet Kumar Dwivedi
- Abstract summary: Modern vehicles are connected to a range of networks, including intra-vehicle networks and external networks.
With the loopholes in the existing traditional protocols, cyber-attacks on the vehicle network are rising drastically.
This paper discusses the security issues of the CAN bus protocol and proposes an Intrusion Detection System (IDS) that detects known attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The progression of innovation and technology and ease of inter-connectivity
among networks has allowed us to evolve towards one of the promising areas, the
Internet of Vehicles. Nowadays, modern vehicles are connected to a range of
networks, including intra-vehicle networks and external networks. However, a
primary challenge in the automotive industry is to make the vehicle safe and
reliable; particularly with the loopholes in the existing traditional
protocols, cyber-attacks on the vehicle network are rising drastically.
Practically every vehicle uses the universal Controller Area Network (CAN) bus
protocol for the communication between electronic control units to transmit key
vehicle functionality and messages related to driver safety. The CAN bus
system, although its critical significance, lacks the key feature of any
protocol authentication and authorization. Resulting in compromises of CAN bus
security leads to serious issues to both car and driver safety. This paper
discusses the security issues of the CAN bus protocol and proposes an Intrusion
Detection System (IDS) that detects known attacks on in-vehicle networks.
Multiple Artificial Intelligence (AI) algorithms are employed to provide
recognition of known potential cyber-attacks based on messages, timestamps, and
data packets traveling through the CAN. The main objective of this paper is to
accurately detect cyberattacks by considering time-series features and attack
frequency. The majority of the evaluated AI algorithms, when considering attack
frequency, correctly identify known attacks with remarkable accuracy of more
than 99%. However, these models achieve approximately 92% to 97% accuracy when
timestamps are not taken into account. Long Short Term Memory (LSTM), Xgboost,
and SVC have proved to the well-performing classifiers.
Related papers
- Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data [2.147995542780459]
Cyber-attacks, including hijacking and spoofing, pose significant threats to connected cars.
This paper presents a novel approach for identifying potential attacks through Radio Access Network (RAN) event monitoring.
The major contribution of this paper is a location anomaly detection module that identifies devices that appear in multiple locations simultaneously.
arXiv Detail & Related papers (2024-07-02T22:42:45Z) - Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data [57.22545280370174]
On Path Diagnostic - Intrusion & Inference (OPD-II) is a novel path inference attack leveraging a physical car model and a map matching algorithm.
We implement our attack on a set of four different cars and a total number of 41 tracks in different road and traffic scenarios.
arXiv Detail & Related papers (2024-06-30T04:21:46Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - GCNIDS: Graph Convolutional Network-Based Intrusion Detection System for CAN Bus [0.0]
We present an innovative approach to intruder detection within the CAN bus, leveraging Graph Convolutional Network (GCN) techniques.
Our experimental findings substantiate that the proposed GCN-based method surpasses existing IDSs in terms of accuracy, precision, and recall.
Our proposed approach holds significant potential in fortifying the security and safety of modern vehicles.
arXiv Detail & Related papers (2023-09-18T21:42:09Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Infrastructure-based End-to-End Learning and Prevention of Driver
Failure [68.0478623315416]
FailureNet is a recurrent neural network trained end-to-end on trajectories of both nominal and reckless drivers in a scaled miniature city.
It can accurately identify control failures, upstream perception errors, and speeding drivers, distinguishing them from nominal driving.
Compared to speed or frequency-based predictors, FailureNet's recurrent neural network structure provides improved predictive power, yielding upwards of 84% accuracy when deployed on hardware.
arXiv Detail & Related papers (2023-03-21T22:55:51Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - CAN-BERT do it? Controller Area Network Intrusion Detection System based
on BERT Language Model [2.415997479508991]
We propose CAN-BERT", a deep learning based network intrusion detection system.
We show that the BERT model can learn the sequence of arbitration identifiers (IDs) in the CAN bus for anomaly detection.
In addition to being able to identify in-vehicle intrusions in real-time within 0.8 ms to 3 ms w.r.t CAN ID sequence length, it can also detect a wide variety of cyberattacks with an F1-score of between 0.81 and 0.99.
arXiv Detail & Related papers (2022-10-17T21:21:37Z) - CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an
In-Vehicle CAN Bus Based on Deep Features of Voltage Signals [48.813942331065206]
We propose a security hardening system for in-vehicle networks.
The proposed system includes two mechanisms that process deep features extracted from voltage signals measured on the CAN bus.
arXiv Detail & Related papers (2021-06-15T06:12:33Z) - MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet
of Vehicles [12.280524044112708]
A hybrid intrusion detection system (IDS) is proposed to detect both known and unknown attacks on vehicular networks.
The proposed system can detect various types of known attacks with 99.99% accuracy on the CAN-intrusion-dataset.
The average processing time of each data packet on a vehicle-level machine is less than 0.6 ms.
arXiv Detail & Related papers (2021-05-26T17:36:35Z) - An Adversarial Attack Defending System for Securing In-Vehicle Networks [6.288673794889309]
We propose an Adversarial Attack Defending System (AADS) for securing an in-vehicle network.
Our experimental results demonstrate that adversaries can easily attack the LSTM-based detection model with a success rate of over 98%.
arXiv Detail & Related papers (2020-08-25T21:23:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.