TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN)

被引:10
|
作者
Lee, Seyoung [1 ]
Jo, Hyo Jin [2 ]
Cho, Aram [3 ]
Lee, Dong Hoon [1 ]
Choi, Wonsuk [4 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, Seoul 02841, South Korea
[2] Soongsil Univ, Sch Software, Seoul 06978, South Korea
[3] Hyundai Motors, Hwaseong Si 18280, South Korea
[4] Hansung Univ, Div IT Convergence Engn, Seoul 02876, South Korea
关键词
Payloads; Automotive engineering; Processor scheduling; Intrusion detection; Standards; Software; Hardware; Automotive security; controller area network (CAN); electronic control unit (ECU); intrusion detection system (IDS); AUTHENTICATION;
D O I
10.1109/ACCESS.2022.3174356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern vehicles are becoming complex cyber-physical systems equipped with numerous electronic control units (ECUs). Over the controller area network (CAN), these ECUs communicate with each other to share information related to vehicle status as well as commands to efficiently control the vehicle. However, the increasing complexity of modern vehicles has inadvertently expanded potential attack surfaces, making them vulnerable to cyber attacks. In light of this, researchers are currently working to demonstrate remote vehicle maneuvering by compromising ECUs, and as a countermeasure to such malicious manipulation, to study automotive intrusion detection systems (IDSs) as potential remedies. In general, CAN messages are transmitted periodically, and as such, many researchers have relied on frequency-based IDSs in their solutions proposals. However, an attacker can bypass this defense by suspending the communication of the target ECU from the network and injecting malicious messages with the same frequency as the suspended messages. As a result, an attacker is able to masquerade as the original transmission frequency. In this paper, we propose a Transmission-resuming Time-based IDS (TTIDS), which is designed to detect such attacks. TTIDS detects when an ECU periodically transmitting messages is suspended, and then it estimates when the suspended ECU resumes periodic transmission. With this projection, TTIDS detects malicious messages transmitted while the ECU is suspended. We conduct the evaluation of TTIDS on two real vehicles and present the results, which show the TTIDS is able to effectively detect an enhanced attack that bypasses existing frequency-based IDSs with a false positive rate of 0.213% and a false negative rate of 0.027%.
引用
下载
收藏
页码:52139 / 52153
页数:15
相关论文
共 50 条
  • [21] Graph-Based Intrusion Detection System for Controller Area Networks
    Islam, Riadul
    Refat, Rafi Ud Daula
    Yerram, Sai Manikanta
    Malik, Hafiz
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (03) : 1727 - 1736
  • [22] VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network
    Schell, Oleg
    Kneib, Marcel
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 225 - 232
  • [23] A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network
    Wang, Qian
    Qian, Yiming
    Lu, Zhaojun
    Shoukry, Yasser
    Qu, Gang
    PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, : 86 - 91
  • [24] Real-time zero-day Intrusion Detection System for Automotive Controller Area Network on FPGAs
    Khandelwal, Shashwat
    Shreejith, Shanker
    2023 IEEE 34TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, ASAP, 2023, : 139 - 146
  • [25] Statistical Time-based Intrusion Detection in Embedded Systems
    Carreon, Nadir A.
    Gilbreath, Allison
    Lysecky, Roman
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 562 - 567
  • [26] Application of Controller Area Network (CAN) bus anomaly detection based on time series prediction
    Qin, Hongmao
    Yan, Mengru
    Ji, Haojie
    VEHICULAR COMMUNICATIONS, 2021, 27
  • [27] A Statefull Firewall and Intrusion Detection System Enforced with Secure Logging for Controller Area Network
    Lenard, Teri
    Bolboaca, Roland
    PROCEEDINGS OF THE 2021 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2021, 2021, : 39 - 45
  • [28] Survey of Automotive Controller Area Network Intrusion Detection Systems
    Young, Clinton
    Zambreno, Joseph
    Olufowobi, Habeeb
    Bloom, Gedare
    IEEE DESIGN & TEST, 2019, 36 (06) : 48 - 55
  • [29] A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks
    Zhang, Xing
    Cui, Xiaotong
    Cheng, Kefei
    Zhang, Liang
    2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 366 - 369
  • [30] COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks
    Halder, Subir
    Conti, Mauro
    Das, Sajal K.
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2020), 2020,