Protocol-Compliant DoS Attacks on CAN: Demonstration and Mitigation

被引:0
|
作者
Si, Wei [1 ]
Starobinski, David [1 ]
Laifenfeld, Moshe [1 ]
机构
[1] Boston Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Controller Area Network (CAN) is a shared medium, priority-based communication protocol, widely used in the automotive industry for interconnecting electrical components. Although allowing messages to take priority over others in accessing the shared medium is naturally desirable for vehicular applications, it also provides a vulnerability for Denial-of-Service (DoS) attacks. This paper studies the impact of such priority-based DoS attacks and proposes a mitigating scheme. We find that implementation details have a significant impact on the efficiency of priority-based DoS attacks. Nevertheless, with a proper configuration, a single attacker can block an entire CAN network and deem it unusable. To mitigate this problem, we propose integrating a wireless interface and design a hybrid wired/wireless protocol that schedules packet transmissions on the wired and wireless links. Our testbed results show that the hybrid wired/wireless protocol improves the throughput under a two-node DoS attack by a factor of four. Additional experimental results demonstrate that our hybrid wired/wireless protocol is robust to jamming attacks on the wireless link.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Stellar: A Programming Model for Developing Protocol-Compliant Agents
    Gunay, Akin
    Chopra, Amit K.
    [J]. ENGINEERING MULTI-AGENT SYSTEMS, EMAS 2018, 2019, 11375 : 117 - 136
  • [2] Detection and Mitigation of DoS Attacks in VANET Using Secured Minimum Delay Routing Protocol
    Duduku, V. Viswacheda
    Chekima, Ali
    Dargham, Jamal Ahmad
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 472 - 479
  • [3] Mitigation of DOS attacks through QoS regulation
    Garg, A
    Reddy, ALN
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2004, 28 (10) : 521 - 530
  • [4] Mitigation of DoS attacks through QoS regulation
    Garg, A
    Reddy, ALN
    [J]. 2002 TENTH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2002, : 45 - 53
  • [5] A survey of the mitigation methods against DoS attacks on MANETs
    Alsumayt, Albandari
    Haggerty, John
    [J]. 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 538 - 544
  • [6] Mitigation of DoS Attacks by Using Multiple Encryptions in MANETs
    Singh, Ajay Vikram
    Chattopadhyaya, Moushumi
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [7] DHCP DoS and starvation attacks on SDN controllers and their mitigation
    Ishtiaq, Hafiz Usama
    Bhutta, Areeb Ahmed
    Mian, Adnan Noor
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 15 - 25
  • [8] Detection and Mitigation of DoS Attacks in Software Defined Networks
    Gao, Shang
    Peng, Zhe
    Xiao, Bin
    Hu, Aiqun
    Song, Yubo
    Ren, Kui
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (03) : 1419 - 1433
  • [9] DHCP DoS and starvation attacks on SDN controllers and their mitigation
    Hafiz Usama Ishtiaq
    Areeb Ahmed Bhutta
    Adnan Noor Mian
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 15 - 25
  • [10] An active security protocol against DoS attacks
    Cotroneo, D
    Peluso, L
    Romano, SP
    Ventre, G
    [J]. ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 496 - 501