Detecting Low-Rate Replay-Based Injection Attacks on In-Vehicle Networks

被引:24
|
作者
Katragadda, Satya [1 ]
Darby, Paul J., III [2 ]
Roche, Andrew [2 ]
Gottumukkala, Raju [1 ,2 ]
机构
[1] Univ Louisiana Lafayette, Informat Res Inst, Lafayette, LA 70506 USA
[2] Univ Louisiana Lafayette, Coll Engn, Lafayette, LA 70506 USA
基金
美国国家科学基金会;
关键词
Vehicular networks; CAN bus; intrusion detection; injection attacks; sub-sequence mining;
D O I
10.1109/ACCESS.2020.2980523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of security in today & x2019;s in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle & x2019;s normal behavior. The attacker may exploit this vulnerability to launch targeted low-rate injection attacks which are difficult to detect because the network traffic during attacks looks like regular network traffic. In this paper, we propose a sequence mining approach to detect low-rate injection attacks in Control Area Network (CAN). We discuss four different types of replay attacks that can be used by the adversary, and evaluate the effectiveness of proposed method for varying attack characteristics and computational performance for each of the attacks. We observe that the proposed sequence-based anomaly detection achieves over 99 & x0025; f-score, and outperforms existing dictionary based and multi-variate Markov chain based approach. Given that the proposed technique only uses CAN identifiers, the techniques could be adaptable to any type of vehicle manufacturer.
引用
收藏
页码:54979 / 54993
页数:15
相关论文
共 50 条
  • [21] Power spectrum entropy based detection and mitigation of low-rate DoS attacks
    Chen, Zhaomin
    Yeo, Chai Kiat
    Lee, Bu Sung
    Lau, Chiew Tong
    COMPUTER NETWORKS, 2018, 136 : 80 - 94
  • [22] Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle CAN Networks
    Shi, Dongxian
    Xu, Ming
    Wu, Ting
    Kou, Liang
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [23] Detecting Attacks against Safety-Critical ADAS based on In-Vehicle Network Message Patterns
    Gutierrez, Christopher
    Juliato, Marcio
    Ahmed, Shabbir
    Sastry, Manoj
    49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019): INDUSTRY TRACK, 2019, : 9 - 12
  • [24] Cooperative scenario based centralized defense mechanisms for low-rate TCP attacks
    Soo, Won-Ho
    Shim, Sang-Heon
    Han, Kyeong-Eun
    Yoo, Kyoung-Min
    Lee, Soon-Seok
    Kim, Young-Sun
    Kim, Young-Chon
    2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 526 - 530
  • [25] Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
    Nilsson, Dennis K.
    Larson, Ulf E.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2009, 1 (02) : 28 - 41
  • [26] On resilient consensus against replay attacks in operator-vehicle networks
    Zhu, Minghui
    Martinez, Sonia
    2012 AMERICAN CONTROL CONFERENCE (ACC), 2012, : 3553 - 3558
  • [27] Watermarking -based Discrete LQG Systems for Detecting Replay Attacks
    Zhang, Rui
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 1907 - 1911
  • [28] Multiple Attacks Intrusion Detection Framework for In-Vehicle Networks Based on Abnormal Data Features
    Ji, Haojie
    Chen, Biao
    Zuo, Zheng
    Xu, Chi
    CICTP 2021: ADVANCED TRANSPORTATION, ENHANCED CONNECTION, 2021, : 1669 - 1680
  • [29] Debugger-Based Record Replay and Dynamic Analysis for In-Vehicle Infotainment
    Eichelberger, Hanno
    Ruf, Juergen
    Kropf, Thomas
    Greiner, Thomas
    Rosenstiel, Wolfgang
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT V, 2014, 8583 : 387 - +
  • [30] The detection of low-rate DoS attacks using the SADBSCAN algorithm
    Tang, Dan
    Zhang, Siqi
    Chen, Jingwen
    Wang, Xiyin
    INFORMATION SCIENCES, 2021, 565 : 229 - 247