Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms

作者: Mirco Marchetti , Dario Stabili , Alessandro Guido , Michele Colajanni

DOI: 10.1109/RTSI.2016.7740627

关键词:

摘要: This paper evaluates the effectiveness of information-theoretic anomaly detection algorithms applied to networks included in modern vehicles. In particular, we focus on providing an experimental evaluation detectors based entropy. Attacks in-vehicle were simulated by injecting different classes forged CAN messages traces captured from a licensed vehicle. Experimental results show that if entropy-based is all it only possible detect attacks comprise high volume messages. On other hand, characterized injection few can be detected applying several independent instances entropy detector, one for each class

参考文章(20)
Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede, LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks cryptology and network security. pp. 185- 200 ,(2012) , 10.1007/978-3-642-35404-5_15
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar, None, Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study usenix security symposium. pp. 21- 21 ,(2010)
Hovav Shacham, Karl Koscher, Alexei Czeskis, Franziska Roesner, Brian Kantor, Damon McCoy, Tadayoshi Kohno, Stefan Savage, Danny Anderson, Stephen Checkoway, Comprehensive experimental analyses of automotive attack surfaces usenix security symposium. pp. 6- 6 ,(2011)
Tobias Hoppe, Stefan Kiltz, Jana Dittmann, Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats international conference on computer safety, reliability, and security. pp. 145- 158 ,(2009) , 10.1007/978-3-642-04468-7_13
Marko Wolf, Timo Gendrullis, Design, Implementation, and Evaluation of a Vehicular Hardware Security Module Information Security and Cryptology - ICISC 2011. pp. 302- 318 ,(2012) , 10.1007/978-3-642-31912-9_20
Aurélien Francillon, Boris Danev, Srdjan Capkun, None, Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars network and distributed system security symposium. ,(2011) , 10.3929/ETHZ-A-006708714
Adam Greene, Michael Sutton, Pedram Amini, Fuzzing: Brute Force Vulnerability Discovery ,(2007)
Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaaniche, Youssef Laarouchi, Survey on security threats and protection mechanisms in embedded automotive networks dependable systems and networks. pp. 1- 12 ,(2013) , 10.1109/DSNW.2013.6615528
Michael Muter, Andre Groll, Felix C. Freiling, A structured approach to anomaly detection for in-vehicle networks information assurance and security. pp. 92- 98 ,(2010) , 10.1109/ISIAS.2010.5604050