Anomaly Detection for Automotive Diagnostic Applications based on N-grams

被引:6
|
作者
Rumez, Marcel [1 ]
Lin, Jinghua [2 ]
FuchB, Thomas [2 ]
Kriesten, Reiner [1 ]
Sax, Eric [3 ]
机构
[1] Karlsruhe Univ Appl Sci, Inst Energy Efficient Mobil IEEM, Karlsruhe, Germany
[2] Karlsruhe Univ Appl Sci, Fac Comp Sci & Business Informat Syst, Karlsruhe, Germany
[3] Karlsruhe Inst Technol KIT, Inst Informat Proc Technol ITIV, Karlsruhe, Germany
关键词
Automotive Security; Vehicle Diagnostics; Anomaly Detection;
D O I
10.1109/COMPSAC48688.2020.00-56
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The increasing level of connectivity within vehicles and their environment such as backend or infrastructure increases the risk of potential vulnerabilities regarding information security. In order to minimize these risks, vehicle manufacturers are forced to implement appropriate countermeasures, which are increasingly embedded in approval regulations. As a reactive countermeasure, various approaches to Intrusion Detection Systems (IDSs) exist within the research area to detect attack attempts as early as possible. In this paper, we shift into a new research direction and present an approach for the detection of anomalies in automotive diagnostic applications by using a statistical language model. We analyze incoming diagnostic frames using two different n-gram models (sequence-based and byte-based) to determine whether sequences and the bytes embedded are contextually valid. Since there is currently no publicly available data set of diagnostic data, the detection rate is limited to learned diagnostic uses cases from our own data recordings. Since it is very challenging to generate such a large amount of data, a further enhancement of the approach based on unsupervised learning by using a dynamic anomaly threshold would be promising.
引用
收藏
页码:1423 / 1429
页数:7
相关论文
共 50 条
  • [1] Layered higher order n-grams for hardening payload based anomaly intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 321 - 326
  • [2] Statistical Profiling of n-grams for Payload Based Anomaly Detection for HTTP Web Traffic
    Pal, Rajarshi
    Chowdary, Naveen
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [3] On Automatic Plagiarism Detection Based on n-Grams Comparison
    Barron-Cedeno, Alberto
    Rosso, Paolo
    [J]. ADVANCES IN INFORMATION RETRIEVAL, PROCEEDINGS, 2009, 5478 : 696 - 700
  • [4] Malware Detection and Classification Based on n-grams Attribute Similarity
    Zhang Fuyong
    Zhao Tiezhou
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 793 - 796
  • [5] Applications of N-grams in textual information systems
    Robertson, AM
    Willett, P
    [J]. JOURNAL OF DOCUMENTATION, 1998, 54 (01) : 48 - 69
  • [6] Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection
    Harang, Richard
    Mell, Peter
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 36 - 47
  • [7] Detection of Opinion Spam with Character n-grams
    Hernandez Fusilier, Donato
    Montes-y-Gomez, Manuel
    Rosso, Paolo
    Guzman Cabrera, Rafael
    [J]. COMPUTATIONAL LINGUISTICS AND INTELLIGENT TEXT PROCESSING (CICLING 2015), PT II, 2015, 9042 : 285 - 294
  • [8] Plagiarism Detection Using Stopword n-grams
    Stamatatos, Efstathios
    [J]. JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2011, 62 (12): : 2512 - 2527
  • [9] Contextual Spellchecking Based on N-grams
    Srdic, Ivan
    Gledec, Gordan
    [J]. CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS: PROCEEDINGS ARCHIVE 2017, 2017, : 29 - 33
  • [10] Spam detection using character N-grams
    Kanaris, Ioannis
    Kanaris, Konstantinos
    Stamatatos, Efstathios
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 3955 : 95 - 104