Detecting Low-Rate Replay-Based Injection Attacks on In-Vehicle Networks

被引:24
|
作者
Katragadda, Satya [1 ]
Darby, Paul J., III [2 ]
Roche, Andrew [2 ]
Gottumukkala, Raju [1 ,2 ]
机构
[1] Univ Louisiana Lafayette, Informat Res Inst, Lafayette, LA 70506 USA
[2] Univ Louisiana Lafayette, Coll Engn, Lafayette, LA 70506 USA
基金
美国国家科学基金会;
关键词
Vehicular networks; CAN bus; intrusion detection; injection attacks; sub-sequence mining;
D O I
10.1109/ACCESS.2020.2980523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of security in today & x2019;s in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle & x2019;s normal behavior. The attacker may exploit this vulnerability to launch targeted low-rate injection attacks which are difficult to detect because the network traffic during attacks looks like regular network traffic. In this paper, we propose a sequence mining approach to detect low-rate injection attacks in Control Area Network (CAN). We discuss four different types of replay attacks that can be used by the adversary, and evaluate the effectiveness of proposed method for varying attack characteristics and computational performance for each of the attacks. We observe that the proposed sequence-based anomaly detection achieves over 99 & x0025; f-score, and outperforms existing dictionary based and multi-variate Markov chain based approach. Given that the proposed technique only uses CAN identifiers, the techniques could be adaptable to any type of vehicle manufacturer.
引用
收藏
页码:54979 / 54993
页数:15
相关论文
共 50 条
  • [1] A Study on Low-rate DDoS Attacks in Real Networks
    Yang, Jin-Seok
    Park, Min-Woo
    Chung, Tai-Myoung
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [2] Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks
    Korkmaz, T
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 704 - 709
  • [3] On the Impact of Low-Rate Attacks
    Guirguis, Mina
    Bestavros, Azer
    Matta, Ibrahim
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2316 - 2321
  • [4] Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks
    Rabie, Rashed
    Drissi, Maroua
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 450 - 456
  • [5] A Particle Filter-based Approach for Effectively Detecting Low-rate Denial of Service Attacks
    Wu Zhijun
    Jiang Jun
    Yue Meng
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 86 - 90
  • [6] DAGA: Detecting Attacks to In-Vehicle Networks via N-Gram Analysis
    Stabili, Dario
    Ferretti, Luca
    Andreolini, Mauro
    Marchetti, Mirco
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (11) : 11540 - 11554
  • [7] In-Vehicle Network Injection Attacks Detection Based on Feature Selection and Classification
    Ji, Haojie
    Wang, Liyong
    Qin, Hongmao
    Wang, Yinghui
    Zhang, Junjie
    Chen, Biao
    AUTOMOTIVE INNOVATION, 2024, 7 (01) : 138 - 149
  • [8] In-Vehicle Network Injection Attacks Detection Based on Feature Selection and Classification
    Haojie Ji
    Liyong Wang
    Hongmao Qin
    Yinghui Wang
    Junjie Zhang
    Biao Chen
    Automotive Innovation, 2024, 7 : 138 - 149
  • [9] SEDP-based detection of low-rate DoS attacks
    Wu, Zhijun
    Yue, Meng
    Li, Douzhe
    Xie, Ke
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (11) : 1772 - 1788
  • [10] Low-Rate DoS Attacks Detection Based on Network Multifractal
    Wu, Zhijun
    Zhang, Liyuan
    Yue, Meng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 559 - 567