An Intrusion Detection Method of Data Tampering Attack in Communication-Based Train Control System

被引:0
|
作者
Zhang, Wei [1 ]
Bu, Bing [1 ]
Wang, Hongwei [1 ]
机构
[1] Beijing Jiaotong Univ, State Key Lab Traff Control & Safety, Beijing 100044, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
Communication-based train control (CBTC) technologies are widely applied in order to improve the efficiency and safety of urban rail transit systems. With the increase of informatization and automation through utilization of communication, computer and control technologies, amounts of potential security vulnerabilities are introduced into CBTC systems, where malicious attacks could be implemented. Some attacks, such as data tampering attacks cannot be efficiently detected by traditional intrusion detection systems (IDS), which can affect the safety operation of CBTC systems, e.g., rear-end collisions. Based on the operation principles and information exchange characteristics of CBTC systems, the paper firstly proposes a model to measure the effects of data tampering attacked on trains, and an intrusion detection method is developed based on the running status of the train through Kalman filter and chi(2) detector. The method improves the chi(2) detector to detect data tampering attacks and continuously output alarms during the attack. The improved method has higher accuracy and a lower false negative rate.
引用
收藏
页码:345 / 350
页数:6
相关论文
共 50 条
  • [1] A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system
    Lu, He
    Zhao, Yanan
    Song, Yajing
    Yang, Yang
    He, Guanjie
    Yu, Haiyang
    Ren, Yilong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 8477 - 8492
  • [2] Analysis of Safety Impact of Data in Communication-Based Train Control System
    Chen, Yujia
    Zeng, Xiaoqing
    Yuan, Tengfei
    [J]. Tongji Daxue Xuebao/Journal of Tongji University, 2021, 49 (03): : 391 - 399
  • [3] Intrusion Detection Methods in Communication-Based Train Control Systems Based on Relative Entropy and Trust Evaluation
    Hu, Liru
    Bu, Bing
    [J]. 2021 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2021, : 3939 - 3944
  • [4] A Safety Management and Signaling System Integration Method for Communication-Based Train Control System
    Yan F.
    Gao C.
    Tang T.
    Zhou Y.
    [J]. Urban Rail Transit, 2017, 3 (2) : 90 - 99
  • [5] A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System
    Yang Li
    Wei Xiukun
    Wen Chenglin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (05) : 992 - 1001
  • [6] A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System
    YANG Li
    WEI Xiukun
    WEN Chenglin
    [J]. Chinese Journal of Electronics, 2023, 32 (05) : 992 - 1001
  • [7] WHAT IS COMMUNICATION-BASED TRAIN CONTROL?
    Pascoe, Robert D.
    Eichorn, Thomas N.
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2009, 4 (04): : 16 - 21
  • [8] Assurance Evaluation for Test of Communication-Based Train Control System
    Zeng, Xiaoqing
    Xiong, Tiansheng
    Mori, Kinji
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3135 - +
  • [9] A Novel Intrusion Detection Model Using a Fusion of Network and Device States for Communication-Based Train Control Systems
    Song, Yajie
    Bu, Bing
    Zhu, Li
    [J]. ELECTRONICS, 2020, 9 (01)
  • [10] Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure
    Lakshminarayana, Subhash
    Karachiwala, Jabir Shabbir
    Chang, Sang-Yoon
    Revadigar, Girish
    Kumar, Sristi Lakshmi Sravana
    Yau, David K. Y.
    Hu, Yih-Chun
    [J]. WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 160 - 171