20 results on '"In-vehicle Network Security"'
Search Results
2. Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks
- Author
-
Lin, Jiaying, Wei, Yehua, Li, Wenjia, Long, Jing, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Wang, Guojun, editor, Choo, Kim-Kwang Raymond, editor, Ko, Ryan K. L., editor, Xu, Yang, editor, and Crispo, Bruno, editor
- Published
- 2022
- Full Text
- View/download PDF
3. LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network
- Author
-
Hridoy, Syed Akib Anwar, Zulkernine, Mohammad, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Park, Noseong, editor, Sun, Kun, editor, Foresti, Sara, editor, Butler, Kevin, editor, and Saxena, Nitesh, editor
- Published
- 2020
- Full Text
- View/download PDF
4. SecCAN: A Practical Secure Control Area Network for Automobiles.
- Author
-
Ullah, Mohammad Arman, Ghafoor, Sheikh, Rogers, Mike, and Prowell, Stacy
- Abstract
Controller Area Networks (CAN) are the backbone for communication among devices in modern automobiles. Although CAN bus is reliable, simple, low-cost, and low-power, which are desirable traits for embedded systems, it suffers from many security vulnerabilities. Unfortunately, security solutions for general purpose computers and networks do not generalize to CAN. First, many security solutions cannot be adopted by the automobile industry because they do not abide by constraints such as cost, real-time requirements, and backward compatibility. Furthermore, almost all the current proposed solutions violate one or more practical constraints of CAN, and so will be difficult for the automobile industry to adopt. Second, current research works in securing CAN only address a small subset of security vulnerabilities. We have developed a secure CAN protocol called SecCAN that uses lightweight encryption and message authentication using segmentation based shared secret group keys. Experiments with simulation and real ECU testbed show that our proposed protocol can effectively prevent masquerade and replay attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
5. CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN
- Author
-
Samuel Woo, Daesung Moon, Taek-Young Youn, Yousik Lee, and Yongeun Kim
- Subjects
Controller area network ,in-vehicle network security ,moving target defense ,network address shuffling ,vehicular cyber kill chain ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
New vehicles have become increasingly targeted for cyber-attacks as their rate of digitalization is accelerated. Research on vehicle hacking has highlighted the security vulnerabilities of in-vehicle controller area networks (CANs) as the biggest problem. In particular, a CAN does not offer access control, authentication, or confidentiality, so it fails to prevent reconnaissance operations conducted by an adversary. Because its static configuration (CAN ID, data frame transmission cycle, and data field format) is used in an in-vehicle network environment, the adversary can conduct reconnaissance and easily acquire information to be used for an attack. One of the moving target defense strategies, network address shuffling (NAS), is an extremely practical security solution that can prevent in-vehicle CAN reconnaissance acts. In this paper, we propose a CAN ID shuffling technique using NAS. Our proposed security solution aims to increase the cost burden for the adversary to analyze CAN data frames. To evaluate the performance of the proposed security solution, we conducted an evaluation based on a labcar. Our proposed security solution may be implemented without altering the unique characteristics of the CAN standard. Hence, it can be used as a practical countermeasure to solve the problems affecting in-vehicle CANs.
- Published
- 2019
- Full Text
- View/download PDF
6. On the Security of In-Vehicle Hybrid Network: Status and Challenges
- Author
-
Huang, Tianxiang, Zhou, Jianying, Wang, Yi, Cheng, Anyu, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Liu, Joseph K., editor, and Samarati, Pierangela, editor
- Published
- 2017
- Full Text
- View/download PDF
7. Otomotiv haberleşmesinde denetleyici alan ağı için hibrit bir saldırı savuşturma uygulaması.
- Author
-
BAKİ, Serkan and TUTKUN, Nedim
- Subjects
- *
ELECTRONIC control , *TELECOMMUNICATION , *TELECOMMUNICATION systems , *QUALITY of life , *RESEARCH methodology - Abstract
As technology develops rapidly, people are usually expected to increase their life quality day by day, especially in the automotive sector. As the automotive technology develops, the number of units, electronic control units (ECU) that fulfil the wishes of the people in the vehicle is increasing as day pass. The controller area network (CAN) is widely used due to the real-time performance and efficient communication of electronic control units that respond to the requests of the people in their vehicle. However, discussions on how to secure the network of CAN communication have increased recently. According to research, the control of this communication network, which is simple to control and vulnerable in nature, can be easily taken over by automotive hackers. It has been seen in the researches that the hackers who infiltrated the CAN communication network in the vehicle have effects not only on the vehicle but also on human health by remotely controlling the electronic control units. The researchers, who did not remain silent against the security gaps that emerged as automotive technology developed, covered the precautions that should be taken in their articles. The aim of this research is to defend the attacks by establishing a hacker detection unit (KBU) in the in-vehicle communication network and determining the presence of hacker and providing simple encrypted communication of electronic control units in multiple ways. The hybrid method used in this research includes both encrypted communication and an attack detection unit. As a result of the experiments, this hybrid structure of the method mentioned in this study provides both in-depth security in CAN communication and ensures that it does not compromise its canonical structure. [ABSTRACT FROM AUTHOR]
- Published
- 2021
8. A Distributed Anomaly Detection System for In-Vehicle Network Using HTM
- Author
-
Chundong Wang, Zhentang Zhao, Liangyi Gong, Likun Zhu, Zheli Liu, and Xiaochun Cheng
- Subjects
In-vehicle network security ,real-time anomaly detection ,HTM algorithm ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
With the development of 5G and Internet of Vehicles technology, the possibility of remote wireless attack on an in-vehicle network has been proven by security researchers. Anomaly detection technology can effectively alleviate the security threat, as the first line of security defense. Based on this, this paper proposes a distributed anomaly detection system using hierarchical temporal memory (HTM) to enhance the security of a vehicular controller area network bus. The HTM model can predict the flow data in real time, which depends on the state of the previous learning. In addition, we improved the abnormal score mechanism to evaluate the prediction. We manually synthesized field modification and replay attack in data field. Compared with recurrent neural networks and hidden Markov model detection models, the results show that the distributed anomaly detection system based on HTM networks achieves better performance in the area under receiver operating characteristic curve score, precision, and recall.
- Published
- 2018
- Full Text
- View/download PDF
9. ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks
- Author
-
Araya, Kibrom Desta, Ohira, Shuji, Arai, Ismail, Fujikawa, Kazutoshi, Araya, Kibrom Desta, Ohira, Shuji, Arai, Ismail, and Fujikawa, Kazutoshi
- Abstract
The number of computer controlled vehicles throughout the world is rising at a staggering speed. Even though this enhances the driving experience, it opens a new security hole in the automotive industry. To alleviate this issue, we are proposing an intrusion detection system (IDS) to the controller area network (CAN), which is the de facto communication standard of present-day vehicles. We implemented an IDS based on the analysis of ID sequences. The IDS uses a trained Long-Short Term Memory (LSTM) to predict an arbitration ID that will appear in the future by looking back to the last 20 packet arbitration IDs. The output from the LSTM network is a softmax probability of all the 42 arbitration IDs in our test car. The softmax probability is used in two approaches for IDS. In the first approach, a single arbitration ID is predicted by taking the class which has the highest softmax probability. This method only gave us an accuracy of 0.6. Applying this result in a real vehicle would give us a lot of false negatives, hence we devised a second approach that uses log loss as an anomaly signal. The evaluated log loss is compared with a predefined threshold to see if the result is in the anomaly boundary. Furthermore, We have tested our approach using insertion, drop and illegal ID attacks which greatly outperform the conventional method with practical F1 scores of 0.9, 0.84, and 1.0 respectively., 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops),23-27 March 2020,Austin, TX, USA, USA
- Published
- 2023
10. Security Based Protocol Design for In-Vehicle Controller Area Network
- Author
-
Sukumaran, Soumya and George, Neenu
- Published
- 2016
11. Hierarchical Anomaly Detection Model for In-Vehicle Networks Using Machine Learning Algorithms
- Author
-
Seunghyun Park and Jin-Young Choi
- Subjects
controller area network ,intrusion detection system ,in-vehicle network security ,machine learning ,hierarchical approach ,anomaly detection ,Chemical technology ,TP1-1185 - Abstract
The communication and connectivity functions of vehicles increase their vulnerability to hackers. The unintended failure and malfunction of in-vehicle systems caused by external factors threaten the security and safety of passengers. As the controller area network alone cannot protect vehicles from external attacks, techniques to analyze and detect external attacks are required. Therefore, we propose a multi-labeled hierarchical classification (MLHC) intrusion detection model that analyzes and detects external attacks caused by message injection. This model quickly determines the occurrence of attacks and classifies the attack using only existing classified attack data. We evaluated the performance of the model by analyzing its learning space. We further verified the model by comparing its accuracy, F1 score and data learning and evaluation times with the two layers multi-class detection (TLMD) and single-layer multi-class classification (SLMC) models. The simulation results show that the MLHC model has the highest F1 score of 0.9995 and is 87.30% and 99.92% faster than the SLMC and TLMD models in terms of detection time, respectively. Consequently, the proposed model can classify both the type and existence or absence of attacks with high accuracy and can be used in interior communication environments of high-speed vehicles with a high throughput.
- Published
- 2020
- Full Text
- View/download PDF
12. Multilayered Framework for Securing Connected Autonomous Vehicle
- Author
-
Refat, Rafi Ud Daula
- Subjects
- Automotive cybersecurity, Artificial intelligence, Machine learning, In-vehicle network security, Deep learning
- Abstract
Connected autonomous vehicles (CAVs) hold the promise of not only enhancing functional safety but also improving mobility and the efficiency of transportation systems. The CAV is a cyber-physical system (CPS) that contains many networked electronic control units (ECUs), sensors, actuators, wireless interfaces, and an advanced driver assistant system (ADAS). Just like other CPS, CAVs rely on data gathered from the sensors, actuators, and software for critical decisionmaking to enhance efficiency, reliability, safety, and functionality. Besides, CAVs utilize connectivity to improve drivers’ and passengers’ experience by integrating built-in wireless interfaces like WiFi, Bluetooth, etc. The growing connectivity feature of modern vehicles is marking them more vulnerable to cyberattacks. Many researchers have successfully exploited the remote connectivityinduced attack surface. According to the recent industry report (1) on cyberattacks on CAVs indicated that more than 700 incidents were reported targeting vehicular systems between 2010-2020. Among them, in 27.63% of these incidents, attackers tried to control or manipulate the vehicle which could jeopardize passenger safety. Based on the literature, several intrusion detection-based solutions have been proposed to detect attacks on CAVs. While the solutions are effective against a certain range of attack vectors, they are limited in scope and effectiveness. For instance, existing solutions are unable to localize the attack. In addition, existing state-of-the-art require thousands of in-vehicular network (IVN) packets for intrusion detection. It is therefore important to develop reliable, robust, and real-time security solutions to safeguard CAVs by mitigating emerging cyber threats. This dissertation aims to address the aforementioned cybersecurity challenges of CAVs by developing a robust and reliable framework to safeguard against attacks at different points through a multi-layered framework. Each layer of the proposed solution aims at neutralizing cyberattacks on in-vehicle networks by breaking some critical links in the attack chain. The first layer of the proposed framework aims to protect IVNs by developing a sender identification algorithm that utilizes the unclonable signal attributes to fingerprint transmitting ECUs. The proposed framework is novel and efficient that leverages the uniqueness of physical signals to create images and uses a deep learning algorithm for attack detection and localization. The second layer aims to protect IVNs against firmware attacks using ECU behavioral fingerprinting through a data-driven graph theory-based approach. The proposed methodology takes advantage of a huge amount of IVN data to model the normal behavior of the network by using graph analytics and develops a network monitoring system to detect unusual behavior created by attackers. The effectiveness of the proposed multilayered framework is evaluated by conducting a series of experiments using bench testing and as well on vehicular public data. The experimental results suggest that the proposed multilayered framework is capable of detecting IVN message injection attacks with higher accuracy and can reliably localize the attacker on the network. Additionally, the thesis hypothesis and solution were validated by conducting market research through active participation in both the regional and final programs of the National Science Foundation (NSF) I-Corps. In the future, I plan to build a prototype of the proposed framework and deploy it in actual vehicles for rigorous field-testing.
- Published
- 2023
13. A Practical Security Architecture for In-Vehicle CAN-FD.
- Author
-
Woo, Samuel, Jo, Hyo Jin, Kim, In Seok, and Lee, Dong Hoon
- Abstract
The controller area network with flexible data rate (CAN-FD) is attracting attention as the next generation of in-vehicle network technology. However, security issues have not been completely taken into account when designing CAN-FD, although every bit of information transmitted could be critical to driver safety. If we fail to solve the security vulnerabilities of CAN-FD, we cannot expect Vehicle-Information and Communications Technology (Vehicle-ICT) convergence to continue to develop. Fortunately, secure in-vehicle CAN-FD communication environments can be constructed using the larger data payload of CAN-FD. In this paper, we propose a security architecture for in-vehicle CAN-FD as a countermeasure (designed in accordance with CAN-FD specifications). We considered the characteristics of the International Organization for Standardization (ISO) 26262 Automotive Safety Integrity Level and the in-vehicle subnetwork to design a practical security architecture. We also evaluated the feasibility of the proposed security architecture using three kinds of microcontroller unit and the CANoe software. Our evaluation findings may be used as an indicator of the performance level of electronic control units for manufacturing next-generation vehicles. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
14. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN.
- Author
-
Woo, Samuel, Jo, Hyo Jin, and Lee, Dong Hoon
- Abstract
Vehicle-IT convergence technology is a rapidly rising paradigm of modern vehicles, in which an electronic control unit (ECU) is used to control the vehicle electrical systems, and the controller area network (CAN), an in-vehicle network, is commonly used to construct an efficient network of ECUs. Unfortunately, security issues have not been treated properly in CAN, although CAN control messages could be life-critical. With the appearance of the connected car environment, in-vehicle networks (e.g., CAN) are now connected to external networks (e.g., 3G/4G mobile networks), enabling an adversary to perform a long-range wireless attack using CAN vulnerabilities. In this paper we show that a long-range wireless attack is physically possible using a real vehicle and malicious smartphone application in a connected car environment. We also propose a security protocol for CAN as a countermeasure designed in accordance with current CAN specifications. We evaluate the feasibility of the proposed security protocol using CANoe software and a DSP-F28335 microcontroller. Our results show that the proposed security protocol is more efficient than existing security protocols with respect to authentication delay and communication load. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
15. Security and privacy for in-vehicle networks.
- Author
-
Schweppe, Hendrik and Roudier, Yves
- Abstract
Mobile devices such as smartphones have gained more and more attention from security researchers and malware authors, the latter frequently attacking those platforms and stealing personal information. Vehicle on-board networks, in particular infotainment systems, are increasingly connected with such mobile devices and the internet and will soon make it possible to load and install third party applications. This makes them susceptible to new attacks similar to those which plague mobile phones and personal computers. The breach of privacy is equally sensitive in the vehicular domain. Even worse, broken security is a serious threat to car safety. In this paper, we show how traditional automotive communication systems can be instrumented with taint tracking tools in a security framework that allows to dynamically monitor data flows within and between control units to achieve elevated security and privacy. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
16. Rec-CNN: In-vehicle networks intrusion detection using convolutional neural networks trained on recurrence plots
- Author
-
Araya Kibrom Desta, Shuji Ohira, Ismail Arai, and Kazutoshi Fujikawa
- Subjects
Recurrence plots ,Automotive Engineering ,Intrusion detection ,Convolutional neural networks ,In-vehicle network security ,Electrical and Electronic Engineering ,LSTM ,CAN bus - Abstract
A controller area network (CAN) is a communication protocol for in-vehicle networks. Communication between electronic control units (ECUs) is facilitated by the CAN bus. This communication protocol provides no authentication or encryption to prevent the consequences of cyberattacks. As a security measure for this protocol, we have proposed an intrusion detection system (IDS) using a convolutional neural network (CNN). The CNN is trained on recurrence images generated from the encoded labels of CAN frame arbitration IDs, thus Rec-CNN. Using recurrence plots helps us capture the temporal dependency in the sequence of arbitration IDs unlike the state-of-art method, which does not capture this information. We have tested the proposed method on a publicly available dataset with denial of service (DoS), fuzzy, spoofing-gear, and spoofing-RPM attacks, resulting in an accuracy of 0.999. Furthermore, we have experimented with the method on our target vehicle. The proposed method can classify our simulated attacks with an accuracy of 0.999 in an attack frequency of 10 ms.
- Published
- 2022
- Full Text
- View/download PDF
17. ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks
- Author
-
Shuji Ohira, Ismail Arai, Araya Kibrom Desta, and Kazutoshi Fujikawa
- Subjects
050210 logistics & transportation ,Computer science ,Network packet ,business.industry ,05 social sciences ,Automotive industry ,Boundary (topology) ,In-vehicle Network Security ,Automotive ,020207 software engineering ,02 engineering and technology ,Intrusion detection system ,computer.software_genre ,Class (biology) ,CAN bus ,Intrusion Detection ,0502 economics and business ,Softmax function ,0202 electrical engineering, electronic engineering, information engineering ,Arbitration ,Data mining ,business ,LSTM ,computer - Abstract
The number of computer controlled vehicles throughout the world is rising at a staggering speed. Even though this enhances the driving experience, it opens a new security hole in the automotive industry. To alleviate this issue, we are proposing an intrusion detection system (IDS) to the controller area network (CAN), which is the de facto communication standard of present-day vehicles. We implemented an IDS based on the analysis of ID sequences. The IDS uses a trained Long-Short Term Memory (LSTM) to predict an arbitration ID that will appear in the future by looking back to the last 20 packet arbitration IDs. The output from the LSTM network is a softmax probability of all the 42 arbitration IDs in our test car. The softmax probability is used in two approaches for IDS. In the first approach, a single arbitration ID is predicted by taking the class which has the highest softmax probability. This method only gave us an accuracy of 0.6. Applying this result in a real vehicle would give us a lot of false negatives, hence we devised a second approach that uses log loss as an anomaly signal. The evaluated log loss is compared with a predefined threshold to see if the result is in the anomaly boundary. Furthermore, We have tested our approach using insertion, drop and illegal ID attacks which greatly outperform the conventional method with practical F1 scores of 0.9, 0.84, and 1.0 respectively., 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops),23-27 March 2020,Austin, TX, USA, USA
- Published
- 2020
18. CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN
- Author
-
Yongeun Kim, Taek-Young Youn, Samuel Woo, Daesung Moon, and Yousik Lee
- Subjects
General Computer Science ,Computer science ,0211 other engineering and technologies ,Vulnerability ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Access control ,02 engineering and technology ,network address shuffling ,Computer security ,computer.software_genre ,in-vehicle network security ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Controller area network ,vehicular cyber kill chain ,Hacker ,021110 strategic, defence & security studies ,Authentication ,Shuffling ,business.industry ,General Engineering ,020207 software engineering ,Adversary ,Countermeasure ,Network address ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,moving target defense ,lcsh:TK1-9971 ,computer ,Countermeasure (computer) - Abstract
New vehicles have become increasingly targeted for cyber-attacks as their rate of digitalization is accelerated. Research on vehicle hacking has highlighted the security vulnerabilities of in-vehicle controller area networks (CANs) as the biggest problem. In particular, a CAN does not offer access control, authentication, or confidentiality, so it fails to prevent reconnaissance operations conducted by an adversary. Because its static configuration (CAN ID, data frame transmission cycle, and data field format) is used in an in-vehicle network environment, the adversary can conduct reconnaissance and easily acquire information to be used for an attack. One of the moving target defense strategies, network address shuffling (NAS), is an extremely practical security solution that can prevent in-vehicle CAN reconnaissance acts. In this paper, we propose a CAN ID shuffling technique using NAS. Our proposed security solution aims to increase the cost burden for the adversary to analyze CAN data frames. To evaluate the performance of the proposed security solution, we conducted an evaluation based on a labcar. Our proposed security solution may be implemented without altering the unique characteristics of the CAN standard. Hence, it can be used as a practical countermeasure to solve the problems affecting in-vehicle CANs.
- Published
- 2019
- Full Text
- View/download PDF
19. ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks
- Author
-
Araya, Kibrom Desta, Ohira, Shuji, Arai, Ismail, 30252729, Fujikawa, Kazutoshi, Araya, Kibrom Desta, Ohira, Shuji, Arai, Ismail, 30252729, and Fujikawa, Kazutoshi
- Abstract
The number of computer controlled vehicles throughout the world is rising at a staggering speed. Even though this enhances the driving experience, it opens a new security hole in the automotive industry. To alleviate this issue, we are proposing an intrusion detection system (IDS) to the controller area network (CAN), which is the de facto communication standard of present-day vehicles. We implemented an IDS based on the analysis of ID sequences. The IDS uses a trained Long-Short Term Memory (LSTM) to predict an arbitration ID that will appear in the future by looking back to the last 20 packet arbitration IDs. The output from the LSTM network is a softmax probability of all the 42 arbitration IDs in our test car. The softmax probability is used in two approaches for IDS. In the first approach, a single arbitration ID is predicted by taking the class which has the highest softmax probability. This method only gave us an accuracy of 0.6. Applying this result in a real vehicle would give us a lot of false negatives, hence we devised a second approach that uses log loss as an anomaly signal. The evaluated log loss is compared with a predefined threshold to see if the result is in the anomaly boundary. Furthermore, We have tested our approach using insertion, drop and illegal ID attacks which greatly outperform the conventional method with practical F1 scores of 0.9, 0.84, and 1.0 respectively.
- Published
- 2020
20. Hierarchical Anomaly Detection Model for In-Vehicle Networks Using Machine Learning Algorithms.
- Author
-
Park, Seunghyun and Choi, Jin-Young
- Subjects
ANOMALY detection (Computer security) ,IN-vehicle computing ,MACHINE learning ,COMPUTER network security - Abstract
The communication and connectivity functions of vehicles increase their vulnerability to hackers. The unintended failure and malfunction of in-vehicle systems caused by external factors threaten the security and safety of passengers. As the controller area network alone cannot protect vehicles from external attacks, techniques to analyze and detect external attacks are required. Therefore, we propose a multi-labeled hierarchical classification (MLHC) intrusion detection model that analyzes and detects external attacks caused by message injection. This model quickly determines the occurrence of attacks and classifies the attack using only existing classified attack data. We evaluated the performance of the model by analyzing its learning space. We further verified the model by comparing its accuracy, F1 score and data learning and evaluation times with the two layers multi-class detection (TLMD) and single-layer multi-class classification (SLMC) models. The simulation results show that the MLHC model has the highest F1 score of 0.9995 and is 87.30% and 99.92% faster than the SLMC and TLMD models in terms of detection time, respectively. Consequently, the proposed model can classify both the type and existence or absence of attacks with high accuracy and can be used in interior communication environments of high-speed vehicles with a high throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.