Detecting Low-Rate Replay-Based Injection Attacks on In-Vehicle Networks

被引:24
|
作者
Katragadda, Satya [1 ]
Darby, Paul J., III [2 ]
Roche, Andrew [2 ]
Gottumukkala, Raju [1 ,2 ]
机构
[1] Univ Louisiana Lafayette, Informat Res Inst, Lafayette, LA 70506 USA
[2] Univ Louisiana Lafayette, Coll Engn, Lafayette, LA 70506 USA
基金
美国国家科学基金会;
关键词
Vehicular networks; CAN bus; intrusion detection; injection attacks; sub-sequence mining;
D O I
10.1109/ACCESS.2020.2980523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of security in today & x2019;s in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle & x2019;s normal behavior. The attacker may exploit this vulnerability to launch targeted low-rate injection attacks which are difficult to detect because the network traffic during attacks looks like regular network traffic. In this paper, we propose a sequence mining approach to detect low-rate injection attacks in Control Area Network (CAN). We discuss four different types of replay attacks that can be used by the adversary, and evaluate the effectiveness of proposed method for varying attack characteristics and computational performance for each of the attacks. We observe that the proposed sequence-based anomaly detection achieves over 99 & x0025; f-score, and outperforms existing dictionary based and multi-variate Markov chain based approach. Given that the proposed technique only uses CAN identifiers, the techniques could be adaptable to any type of vehicle manufacturer.
引用
收藏
页码:54979 / 54993
页数:15
相关论文
共 50 条
  • [31] Performance of Low-Rate NOMA-based Uplink Underlay Networks
    Rai, Sonali
    Gupta, Mayank
    Prakriya, Shankar
    2020 23RD INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC 2020), 2020,
  • [32] A comparative study on flood DoS and low-rate DoS attacks
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    J. China Univ. Post Telecom., SUPPL. 1 (116-121): : 116 - 121
  • [33] Protecting Internet services from low-rate DoS attacks
    Tang, Yajuan
    Luo, Xiapu
    Chang, Rocky
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 251 - 265
  • [34] Survey on research and progress of low-rate denial of service attacks
    Yang, J.-H. (yang@cernet.edu.cn), 1600, Chinese Academy of Sciences (25):
  • [35] Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey
    Wu Zhijun
    Li Wenjing
    Liu Liang
    Yue Meng
    IEEE ACCESS, 2020, 8 : 43920 - 43943
  • [36] On a novel pattern of distributed low-rate denial of service attacks
    Liu, Xiao-Ming
    Cheng, Gong
    Zhang, Miao
    Luo, Shou-Shan
    Journal of China Universities of Posts and Telecommunications, 2011, 18 (SUPPL.2): : 113 - 118
  • [37] Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system
    Yin, Long
    Xu, Jian
    Wang, Chen
    Wang, Qiang
    Zhou, Fucai
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 143
  • [38] Detecting and preventing replay attacks in industrial automation networks operated with profinet IO
    Pfrang, Steffen
    Meier, David
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (04): : 253 - 268
  • [39] Detection and defence method of low-rate DDoS attacks in vehicle edge computing network using information metrics
    Bai, Xiao
    Chen, Shanzhi
    Shi, Yan
    Liang, Chengzhi
    Lv, Xiaochen
    Yu, F. Richard
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2022, 40 (01) : 20 - 33
  • [40] Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
    Khan, Junaid
    Lim, Dae-Woon
    Kim, Young-Sik
    SENSORS, 2023, 23 (07)