skip to main content
10.1109/IVS.2017.7995934guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Anomaly detection of CAN bus messages through analysis of ID sequences

Published: 11 June 2017 Publication History

Abstract

This paper proposes a novel intrusion detection algorithm that aims to identify malicious CAN messages injected by attackers in the CAN bus of modern vehicles. The proposed algorithm identifies anomalies in the sequence of messages that flow in the CAN bus and is characterized by small memory and computational footprints, that make it applicable to current ECUs. Its detection performance are demonstrated through experiments carried out on real CAN traffic gathered from an unmodified licensed vehicle.

References

[1]
M. Marchetti, D. Stabili, A. Guido, and M. Colajanni, “Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms,” in 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (R TSI), Sept 2016, pp. 1–6.
[2]
C. Miller and C. Valasek. (2015) Remote exploitation of an unaltered passenger vehicle. Appeared in Blackhat US conference. [Online]. Available: https://www.blackhat.com/us-15/briefings.html#remote-exploitation-of-an-unaltered-passenger-vehicle.
[3]
Keen Security Lab of Tencent. (2016) Car hacking research: Remote attack tesla motors. [Online]. Available: http://keenlab.tencent.com/en/2016/09/19/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars/.
[4]
A. Taylor, N. Japkowicz, and S. Leblanc, “Frequency-based anomaly detection for the automotive can bus,” in 2015 World Congress on Industrial Control Systems Security (WCICSS), Dec 2015, pp. 45–49.
[5]
M. J. Kang and J. W. Kang, “A novel intrusion detection method using deep neural network for in-vehicle network security,” in 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), May 2016, pp. 1–5.
[6]
C. Miller and C. Valasek. (2015) Remote exploitation of an unaltered passenger vehicle. White paper of Blackhat US conference. [Online]. Available: http://illmatics.com/Remote%20Car%20Hacking.pdf.
[7]
B. Gmbh. (1995) Can specification version 2.0. [Online]. Available: http://esd.cs.ucr.edu/webres/can20.pdf.
[8]
M. Wolf and T. Gendrullis, Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 302–318. [Online]. Available: https://doi.org/10.1007/978-3-642-31912-9_20.
[9]
B. Carnevale, F. Falaschi, L. Crocetti, H. Hunjan, S. Bisase, and L. Fanucci, “An implementation of the 802.1 ae mac security standard for in-car networks,” in 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Dec 2015, pp. 24–28.
[10]
M. Andreolini, M. Colajanni, and M. Marchetti, “A collaborative framework for intrusion detection in mobile networks,” Information Sciences, vol. 321, pp. 179–192, 2015.
[11]
M. Marchetti, M. Colajanni, and F. Manganiello, “Framework and models for multistep attack detection,” International Journal of Security and Its Applications, vol. 5, no. 4, pp. 73–90, 2011.
[12]
M. Colajanni, D. Gozzi, and M. Marchetti, “Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems,” in Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems. ACM, 2007, pp. 165–174.
[13]
V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM computing surveys (CSUR), vol. 41, no. 3, p. 15, 2009.
[14]
S. Bayer and A. Ptok, “Dont fuss about fuzzing: Fuzzing controllers in vehicular networks.”.
[15]
H. Lee, K. Choi, K. Chung, J. Kim, and K. Yim, “Fuzzing can packets into automobiles,” in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, March 2015, pp. 817–821.

Cited By

View all

Index Terms

  1. Anomaly detection of CAN bus messages through analysis of ID sequences
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      2017 IEEE Intelligent Vehicles Symposium (IV)
      Jun 2017
      1919 pages

      Publisher

      IEEE Press

      Publication History

      Published: 11 June 2017

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media