Car Hacking Identification through Fuzzy Logic Algorithms

被引:0
|
作者
Martinelli, Fabio [1 ]
Mercaldo, Francesco [1 ]
Nardone, Vittoria [2 ]
Santone, Antonella [2 ]
机构
[1] Natl Res Council Italy CNR, Inst Informat & Telemat, Pisa, Italy
[2] Univ Sannio, Dept Engn, Benevento, Italy
关键词
ATTACKS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Modern vehicles have lots of connectivity, this is the reason why protect in-vehicle network from cyber-attacks becomes an important issue. The Controller Area Network is a de facto standard for the in-vehicle network. However, lack of security features of CAN protocol makes vehicles vulnerable to attacks. The message injection attack is a representative attack type which injects fabricated messages to deceive original Electronic Control Units or to cause malfunctions. In this paper we propose a method able to detect four different type of attacks targeting the CAN protocol adopting fuzzy algorithms. We obtain encouraging results with a precision ranging from 0.85 to 1 using the fuzzy NN algorithm in the identification of attacks targeting CAN protocol.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Car hacking
    Borrows, Peter
    [J]. NEW SCIENTIST, 2013, 217 (2901) : 33 - 33
  • [2] Modelling, Simulation and Balancing of a Car Direction with Fiber Optic Gyroscope and Fuzzy Logic Algorithms
    Sag, Emirhan
    Coskun, Oguzhan
    Yilmaz, Gunes
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ELECO 2019), 2019, : 427 - 431
  • [3] Fuzzy system identification through hybrid genetic algorithms
    Tcholakian, AB
    Martins, A
    Pacheco, RCS
    Barcia, RM
    [J]. 1997 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS, 1997, : 428 - 433
  • [4] HACKING LOGIC
    SUNDHOLM, G
    [J]. JOURNAL OF PHILOSOPHY, 1981, 78 (03): : 160 - 168
  • [5] Improving the performance of Fuzzy Clustering algorithms through Outlier Identification
    Kaur, Prabhjot
    Gosain, Anjana
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, 2009, : 373 - +
  • [6] Locating sensors with fuzzy logic algorithms
    Larios, D. F.
    Barbancho, J.
    Molina, F. J.
    Leon, C.
    [J]. 2011 IEEE WORKSHOP ON MERGING FIELDS OF COMPUTATIONAL INTELLIGENCE AND SENSOR TECHNOLOGY (COMPSENS), 2011, : 57 - 64
  • [7] Fuzzy logic controlled genetic algorithms
    Wang, PY
    Wang, GS
    Song, YH
    Johns, AT
    [J]. FUZZ-IEEE '96 - PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, 1996, : 972 - 979
  • [8] Unofficial Hacking Algorithms
    Mamatha, G.
    Ashoka, B. M.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 322 - 325
  • [9] Fuzzy clustering algorithms for identification of Exocarpium Citrus Grandis through chromatography
    Hang Wei
    Li Lin
    Honglai Zhang
    Yangyang Xu
    Shaodong Deng
    Jiajing Yu
    Jiaming Hong
    Rui Chen
    Qinqun Chen
    [J]. Soft Computing, 2017, 21 : 1291 - 1300
  • [10] Fuzzy clustering algorithms for identification of Exocarpium Citrus Grandis through chromatography
    Wei, Hang
    Lin, Li
    Zhang, Honglai
    Xu, Yangyang
    Deng, Shaodong
    Yu, Jiajing
    Hong, Jiaming
    Chen, Rui
    Chen, Qinqun
    [J]. SOFT COMPUTING, 2017, 21 (05) : 1291 - 1300