TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN)

被引:10
|
作者
Lee, Seyoung [1 ]
Jo, Hyo Jin [2 ]
Cho, Aram [3 ]
Lee, Dong Hoon [1 ]
Choi, Wonsuk [4 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, Seoul 02841, South Korea
[2] Soongsil Univ, Sch Software, Seoul 06978, South Korea
[3] Hyundai Motors, Hwaseong Si 18280, South Korea
[4] Hansung Univ, Div IT Convergence Engn, Seoul 02876, South Korea
关键词
Payloads; Automotive engineering; Processor scheduling; Intrusion detection; Standards; Software; Hardware; Automotive security; controller area network (CAN); electronic control unit (ECU); intrusion detection system (IDS); AUTHENTICATION;
D O I
10.1109/ACCESS.2022.3174356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern vehicles are becoming complex cyber-physical systems equipped with numerous electronic control units (ECUs). Over the controller area network (CAN), these ECUs communicate with each other to share information related to vehicle status as well as commands to efficiently control the vehicle. However, the increasing complexity of modern vehicles has inadvertently expanded potential attack surfaces, making them vulnerable to cyber attacks. In light of this, researchers are currently working to demonstrate remote vehicle maneuvering by compromising ECUs, and as a countermeasure to such malicious manipulation, to study automotive intrusion detection systems (IDSs) as potential remedies. In general, CAN messages are transmitted periodically, and as such, many researchers have relied on frequency-based IDSs in their solutions proposals. However, an attacker can bypass this defense by suspending the communication of the target ECU from the network and injecting malicious messages with the same frequency as the suspended messages. As a result, an attacker is able to masquerade as the original transmission frequency. In this paper, we propose a Transmission-resuming Time-based IDS (TTIDS), which is designed to detect such attacks. TTIDS detects when an ECU periodically transmitting messages is suspended, and then it estimates when the suspended ECU resumes periodic transmission. With this projection, TTIDS detects malicious messages transmitted while the ECU is suspended. We conduct the evaluation of TTIDS on two real vehicles and present the results, which show the TTIDS is able to effectively detect an enhanced attack that bypasses existing frequency-based IDSs with a false positive rate of 0.213% and a false negative rate of 0.027%.
引用
下载
收藏
页码:52139 / 52153
页数:15
相关论文
共 50 条
  • [41] Long Short-Term Memory-based Intrusion Detection System for In-Vehicle Controller Area Network Bus
    Hossain, Md Delwar
    Inoue, Hiroyuki
    Ochiai, Hideya
    Fall, Doudou
    Kadobayashi, Youki
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 10 - 17
  • [42] An Intrusion Detection System for In-vehicle CAN Network Based on Sample Entropy
    Cui Y.
    Zhang Y.
    Wei H.
    Qiche Gongcheng/Automotive Engineering, 2023, 45 (07): : 1184 - 1191
  • [43] X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network
    Jeong, Seonghoon
    Lee, Sangho
    Lee, Hwejae
    Kim, Huy Kang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (03) : 3230 - 3246
  • [44] Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network
    Sharmin, Shaila
    Mansor, Hafizah
    Kadir, Andi Fitriah Abdul
    Aziz, Normaziah A.
    UBIQUITOUS SECURITY, 2022, 1557 : 131 - 144
  • [45] TCE-IDS: Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks
    Yu, Zhangwei
    Liu, Yan
    Xie, Guoqi
    Li, Renfa
    Liu, Siming
    Yang, Laurence T.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1185 - 1195
  • [46] An analysis of network-based control system using CAN (controller area network) protocol
    Jeon, JM
    Kim, DW
    Kim, HS
    Cho, YJ
    Lee, BH
    2001 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOLS I-IV, PROCEEDINGS, 2001, : 3577 - 3581
  • [47] An Intelligent Instrument Based on Controller Area Network (CAN)
    Ying, Zhang
    Gang, Yin
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, : 352 - 355
  • [48] A GRU-Based Lightweight System for CAN Intrusion Detection in Real Time
    Ma, Haoyu
    Cao, Jianqiu
    Mi, Bo
    Huang, Darong
    Liu, Yang
    Li, Shaoqian
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [49] Response-Time Modeling of Controller Area Network (CAN)
    Kumar, Manoj
    Verma, Ajit Kumar
    Srividya, A.
    DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 163 - +
  • [50] Network processor based network intrusion detection system
    Cho, H
    Kim, D
    Kim, J
    Doh, Y
    Jang, J
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 973 - 982