TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN)

被引:10
|
作者
Lee, Seyoung [1 ]
Jo, Hyo Jin [2 ]
Cho, Aram [3 ]
Lee, Dong Hoon [1 ]
Choi, Wonsuk [4 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, Seoul 02841, South Korea
[2] Soongsil Univ, Sch Software, Seoul 06978, South Korea
[3] Hyundai Motors, Hwaseong Si 18280, South Korea
[4] Hansung Univ, Div IT Convergence Engn, Seoul 02876, South Korea
关键词
Payloads; Automotive engineering; Processor scheduling; Intrusion detection; Standards; Software; Hardware; Automotive security; controller area network (CAN); electronic control unit (ECU); intrusion detection system (IDS); AUTHENTICATION;
D O I
10.1109/ACCESS.2022.3174356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern vehicles are becoming complex cyber-physical systems equipped with numerous electronic control units (ECUs). Over the controller area network (CAN), these ECUs communicate with each other to share information related to vehicle status as well as commands to efficiently control the vehicle. However, the increasing complexity of modern vehicles has inadvertently expanded potential attack surfaces, making them vulnerable to cyber attacks. In light of this, researchers are currently working to demonstrate remote vehicle maneuvering by compromising ECUs, and as a countermeasure to such malicious manipulation, to study automotive intrusion detection systems (IDSs) as potential remedies. In general, CAN messages are transmitted periodically, and as such, many researchers have relied on frequency-based IDSs in their solutions proposals. However, an attacker can bypass this defense by suspending the communication of the target ECU from the network and injecting malicious messages with the same frequency as the suspended messages. As a result, an attacker is able to masquerade as the original transmission frequency. In this paper, we propose a Transmission-resuming Time-based IDS (TTIDS), which is designed to detect such attacks. TTIDS detects when an ECU periodically transmitting messages is suspended, and then it estimates when the suspended ECU resumes periodic transmission. With this projection, TTIDS detects malicious messages transmitted while the ECU is suspended. We conduct the evaluation of TTIDS on two real vehicles and present the results, which show the TTIDS is able to effectively detect an enhanced attack that bypasses existing frequency-based IDSs with a false positive rate of 0.213% and a false negative rate of 0.027%.
引用
收藏
页码:52139 / 52153
页数:15
相关论文
共 50 条
  • [31] Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network
    Song, Hyun Min
    Kim, Ha Rang
    Kim, Huy Kang
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 63 - 68
  • [32] Time-based DDoS Detection and Mitigation for SDN Controller
    Dharma, I. Gde N.
    Muthohar, M. Fiqri
    Prayuda, Alvin J. D.
    Priagung, K.
    Choi, Deokjai
    2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 550 - 553
  • [33] The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN)
    Lokman, Siti-Farhana
    Othman, Abu Talib
    Abu Bakar, Muhamad Husaini
    Musa, Shahrulniza
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 195 - 205
  • [34] CANTransfer - Transfer Learning based Intrusion Detection on a Controller Area Network using Convolutional LSTM Network
    Tariq, Shahroz
    Lee, Sangyup
    Woo, Simon S.
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1048 - 1055
  • [35] Message Source Identification in Controller Area Network by Utilizing Diagnostic Communications and an Intrusion Detection System
    Matsubayashi, Masaru
    Koyama, Takuma
    Tanaka, Masashi
    Okano, Yasushi
    Miyajima, Asami
    2022 IEEE 96TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-FALL), 2022,
  • [36] Intrusion Detection For Controller Area Network Using Support Vector Machines
    Tanksale, Vinayak
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, : 121 - 126
  • [37] Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network
    Olufowobi, Habeeb
    Bloom, Gedare
    Young, Clinton
    Zambreno, Joseph
    2018 39TH IEEE REAL-TIME SYSTEMS SYMPOSIUM (RTSS 2018), 2018, : 161 - 164
  • [38] Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study
    Bari, Bifta Sama
    Yelamarthi, Kumar
    Ghafoor, Sheikh
    SENSORS, 2023, 23 (07)
  • [39] Controller Area Network Intrusion Prevention System Leveraging Fault Recovery
    Olufowobi, Habeeb
    Hounsinou, Sena
    Bloom, Gedare
    CPS-SPC'19: PROCEEDINGS OF THE ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2019, : 63 - 73
  • [40] CAN(Controller Area Network) Bus Communication System Based on Matlab/Simulink
    Li, Fang
    Wang, Lifang
    Liao, Chenglin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4186 - 4189