Event-triggered Interval-based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network

Author(s):  
Mee Lan Han ◽  
Byung Il Kwak ◽  
Huy Kang Kim
2019 ◽  
Vol 68 (5) ◽  
pp. 4275-4284 ◽  
Author(s):  
Konglin Zhu ◽  
Zhicheng Chen ◽  
Yuyang Peng ◽  
Lin Zhang

2021 ◽  
Author(s):  
Xuting Duan ◽  
Huiwen Yan ◽  
Jianshan Zhou

Abstract Because of the rapid development of automobile intelligence and networking, cyber attackers can invade the vehicle network via wired and wireless interfaces, such as physical interfaces, short-range wireless interfaces, and long-range wireless interfaces. Thus, interfering with regular driving will immediately jeopardises the drivers’ and passengers’ personal and property safety. To accomplish security protection for the vehicle CAN (Controller Area Network) bus, we propose an anomaly detection method by calculating the information entropy based on the number of interval messages during the sliding window. It detects periodic attacks on the vehicle CAN bus, such as replay attacks and flooding attacks. First, we calculate the number of interval messages according to the CAN bus baud rate, the number of bits of a single frame message, and the time required to calculate information entropy within the window. Second, we compute the window information entropy of regular packet interval packets and determine the normal threshold range by setting a threshold coefficient. Finally, we calculate the information entropy of the data to be measured, determine whether it is greater than or less than the threshold, and detect the anomaly. The experiment uses CANoe software to simulate the vehicle network. It uses the body frame CAN bus network of a brand automobile body bench as the regular network, simulates attack nodes to attack the regular network periodically, collects message data, and verifies the proposed detection method. The results show that the proposed detection method has lower false-negative and false-positive rates for attack scenarios such as replay attacks and flood attacks across different attack cycles.


Author(s):  
Tamara Radivilova ◽  
Lyudmyla Kirichenko ◽  
Oleksandr Lemeshko ◽  
Dmytro Ageyev ◽  
Oksana Mulesa ◽  
...  

Author(s):  
Heng Sun ◽  
Miaomiao Chen ◽  
Jian Weng ◽  
Zhiquan Liu ◽  
Guanggang Geng

2019 ◽  
Vol 122 ◽  
pp. 480-501 ◽  
Author(s):  
Yang Zhang ◽  
Paul Hutchinson ◽  
Nicholas A.J. Lieven ◽  
Jose Nunez-Yanez

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 9091-9098 ◽  
Author(s):  
Chundong Wang ◽  
Zhentang Zhao ◽  
Liangyi Gong ◽  
Likun Zhu ◽  
Zheli Liu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document