2023
DOI: 10.1016/j.cose.2023.103166
|View full text |Cite
|
Sign up to set email alerts
|

CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 35 publications
0
0
0
Order By: Relevance
“…Frequency/Timing-Based: Regards the timing or sequencing of arbitration IDs [17,[19][20][21][22][23] Payload-Based: Considers the data frame (message contents) as a string of bits, without explicitly recovering the signals these bits represent [16,[24][25][26][27][28][29][30] Signal-Based: Requires first decoding raw data field bits into constituent signals, and uses time series' of signal values as inputs [5,17,[31][32][33][34][35][36][37] Physical Side-Channel: Uses physical layer attributes (e.g., voltage) [15,[38][39][40] Other: Includes works that do not fall into the above categories (e.g., using rules to guarantee specific characteristics of the CAN messages are followed [41,42]).…”
Section: The Growth and State Of Can Ids Researchmentioning
confidence: 99%
“…Frequency/Timing-Based: Regards the timing or sequencing of arbitration IDs [17,[19][20][21][22][23] Payload-Based: Considers the data frame (message contents) as a string of bits, without explicitly recovering the signals these bits represent [16,[24][25][26][27][28][29][30] Signal-Based: Requires first decoding raw data field bits into constituent signals, and uses time series' of signal values as inputs [5,17,[31][32][33][34][35][36][37] Physical Side-Channel: Uses physical layer attributes (e.g., voltage) [15,[38][39][40] Other: Includes works that do not fall into the above categories (e.g., using rules to guarantee specific characteristics of the CAN messages are followed [41,42]).…”
Section: The Growth and State Of Can Ids Researchmentioning
confidence: 99%
“…More often, to automatize the recognition of patterns and thresholds, solutions are based on machine learning algorithms: LSTM autoencoders [26], deep neural networks [19], RNN [27] have all been proposed as anomaly detectors for CAN. Finally, researchers have proposed various multi-stage IDSs that propose ensembles of flow-and payloadbased systems [33].…”
Section: Background and Related Workmentioning
confidence: 99%