2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP) 2017
DOI: 10.1109/pdp.2017.67
|View full text |Cite
|
Sign up to set email alerts
|

Behavior Analysis for Safety and Security in Automotive Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…In addition, the authors did not show the detection latency and the training time of the proposed model. Rieke et al [31] proposed an intrusion detection model based on Petri nets. In the first stage of the proposed model, the discovery stage, a model representing the normal behavior of the vehicle is derived offline where the Alpha algorithm is used to derive a Petri net from traces recorded from the CAN bus.…”
Section: ) Flow-based Idssmentioning
confidence: 99%
See 3 more Smart Citations
“…In addition, the authors did not show the detection latency and the training time of the proposed model. Rieke et al [31] proposed an intrusion detection model based on Petri nets. In the first stage of the proposed model, the discovery stage, a model representing the normal behavior of the vehicle is derived offline where the Alpha algorithm is used to derive a Petri net from traces recorded from the CAN bus.…”
Section: ) Flow-based Idssmentioning
confidence: 99%
“…As can be seen in Tables 5-7, most of the reviewed works in this paper (e.g., [19], [23], [31], [33], [38], [42], [56]) used cyber features to characterize and detect intrusions. Out of 42 works reviewed in this paper, only two works, [32] and [28], have used physical features to detect attacks.…”
Section: B Features and Feature Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to enhance the security of vehicular network, there are two methods. One is to prevent the attack [11], [5], [7] and second is to detect and mitigate potential risks [16], [9], [19]. Some security protocols were designed considering the limited data payload of the CAN data frame.…”
Section: Introductionmentioning
confidence: 99%