Traffic anomaly detection algorithm for CAN bus using similarity analysis

被引:2
|
作者
Wang, Chao [1 ]
Xu, Xueqiao [1 ]
Xiao, Ke [1 ]
He, Yunhua [1 ]
Yang, Guangcan [1 ]
机构
[1] North China Univ Technol, Sch Informat Sci & Technol, Beijing 100144, Peoples R China
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 03期
关键词
Automotive safety; CAN bus; Anomaly detection; INTRUSION DETECTION;
D O I
10.1016/j.hcc.2024.100207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus network, the Controller Area Network (CAN) bus is vulnerable to attacks, as security was not considered in its original design. This paper proposes SIDuBzip2, a traffic anomaly detection method for the CAN bus based on the bzip2 compression algorithm. The proposed method utilizes the pseudo-periodic characteristics of CAN bus traffic, constructing time series of CAN IDs and calculating the similarity between adjacent time series to identify abnormal traffic. The method consists of three parts: the conversion of CAN ID values to characters, the calculation of similarity based on bzip2 compression, and the optimal solution of model parameters. The experimental results demonstrate that the proposed SIDuBzip2 method effectively detects various attacks, including Denial of Service , replay, basic injection, mixed injection, and suppression attacks. In addition, existing CAN bus traffic anomaly detection methods are compared with the proposed method in terms of performance and delay, demonstrating the feasibility of the proposed method. (c) 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Volume Traffic Anomaly Detection Using Hierarchical Clustering
    Son, Choonho
    Cho, Seok-Hyung
    Yoo, Jae-Hyoung
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 291 - 300
  • [42] Traffic Surveillance and anomaly detection using image processing
    Shashikar, Siddharth
    Upadhyaya, Vikas
    2017 FOURTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2017, : 256 - 261
  • [43] Collective Anomaly Detection Techniques for Network Traffic Analysis
    Ahmed M.
    Annals of Data Science, 2018, 5 (4) : 497 - 512
  • [44] Distributed System for Botnet Traffic Analysis and Anomaly Detection
    Kozik, Rafal
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 330 - 335
  • [45] State of the Art Analysis of Network Traffic Anomaly Detection
    Roy, Debdutta Barman
    Chaki, Rituparna
    2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2014, : 186 - 192
  • [46] Network Traffic Anomaly Detection Based on Wavelet Analysis
    Du, Zhen
    Ma, Lipeng
    Li, Huakang
    Li, Qun
    Sun, Guozi
    Liu, Zichang
    2018 IEEE/ACIS 16TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATION (SERA), 2018, : 94 - 101
  • [47] Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint
    Zheng, Kaixuan
    Zou, Shihong
    Xu, Guosheng
    Bi, Zixiang
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 450 - 456
  • [48] Network Traffic Analysis based on Collective Anomaly Detection
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2014, : 1141 - 1146
  • [49] A Deep Similarity Metric Method Based on Incomplete Data for Traffic Anomaly Detection in IoT
    Kang, Xu
    Song, Bin
    Sun, Fengyao
    APPLIED SCIENCES-BASEL, 2019, 9 (01):
  • [50] Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning
    Dou, Shaoyu
    Yang, Kai
    Jiao, Yang
    Qiu, Chengbo
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 888 - 902