scholarly journals Study of In-Vehicle CAN Bus Network Security Based on Tamper Attack Detection Method

Author(s):  
Shi-Yi Jin ◽  
◽  
Shi-Nan Wang ◽  
Yu-Jing Wu ◽  
Yi-Nan Xu
2011 ◽  
Vol 58-60 ◽  
pp. 1948-1952
Author(s):  
Chuan Qiang Yu ◽  
Zhen Dong Qi ◽  
Zhen Ye Wang ◽  
Yu Wang

In the error detection mechanism of CAN bus, when the failed node or line is not in the data exchange path, you will not detect the fault, in order to solve this problem, a method is proposed which is realized by adding an external hardware detection circuit in the CAN-bus network, the fault will be detected through testing the resistance of the CAN bus network. In this paper, the network resistance model of CAN bus is established, and the principle of network resistance fault detection method is analyzed. We have carried out several experiments by the network with three nodes to test the validity of this method. As the results of our experiments, we concluded that the method can real-time and comprehensively detect the fault of network and do not take up the network bandwidth, so this method can effectively resolve the problems of current detection mechanism and have good application prospect in some high reliability requirements occasions.


2022 ◽  
Vol 6 (1) ◽  
pp. 1-24
Author(s):  
Liuwang Kang ◽  
Haiying Shen

For a modern vehicle, if the sensor in a vehicle anti-lock braking system (ABS) or controller area network (CAN) bus is attacked during a brake process, the vehicle will lose driving direction control and the driver’s life will be highly threatened. However, current methods for detecting attacks are not sufficiently accurate, and no method can provide attack mitigation. To ensure vehicle ABS security, we propose an attack detection method to accurately detect both sensor attack (SA) and CAN bus attack in a vehicle ABS, and an attack mitigation strategy to mitigate their negative effects on the vehicle ABS. In our attack detection method, we build a vehicle state space equation that considers the real-time road friction coefficient to predict vehicle states (i.e., wheel speed and longitudinal brake force) with their previous values. Based on sets of historical measured vehicle states, we develop a search algorithm to find out attack changes (vehicle state changes because of attack) by minimizing errors between the predicted vehicle states and the measured vehicle states. In our attack mitigation strategy, attack changes are subtracted from the measured vehicle states to generate correct vehicle states for a vehicle ABS. We conducted the first real SA experiments to show how a magnet affects sensor readings. Our simulation results demonstrate that our attack detection method can detect SA and CAN bus attack more accurately compared with existing methods, and also that our attack mitigation strategy almost eliminates the attack’s effects on a vehicle ABS.


2014 ◽  
Vol 31 ◽  
pp. 165-174 ◽  
Author(s):  
Alper Bilge ◽  
Zeynep Ozdemir ◽  
Huseyin Polat

2018 ◽  
Vol 2018 ◽  
pp. 1-19 ◽  
Author(s):  
Jieren Cheng ◽  
Chen Zhang ◽  
Xiangyan Tang ◽  
Victor S. Sheng ◽  
Zhe Dong ◽  
...  

Distributed denial of service (DDoS) attacks has caused huge economic losses to society. They have become one of the main threats to Internet security. Most of the current detection methods based on a single feature and fixed model parameters cannot effectively detect early DDoS attacks in cloud and big data environment. In this paper, an adaptive DDoS attack detection method (ADADM) based on multiple-kernel learning (MKL) is proposed. Based on the burstiness of DDoS attack flow, the distribution of addresses, and the interactivity of communication, we define five features to describe the network flow characteristic. Based on the ensemble learning framework, the weight of each dimension is adaptively adjusted by increasing the interclass mean with a gradient ascent and reducing the intraclass variance with a gradient descent, and the classifier is established to identify an early DDoS attack by training simple multiple-kernel learning (SMKL) models with two characteristics including interclass mean squared difference growth (M-SMKL) and intraclass variance descent (S-SMKL). The sliding window mechanism is used to coordinate the S-SMKL and M-SMKL to detect the early DDoS attack. The experimental results indicate that this method can detect DDoS attacks early and accurately.


Sign in / Sign up

Export Citation Format

Share Document