2020
DOI: 10.1109/access.2020.2980523
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Low-Rate Replay-Based Injection Attacks on In-Vehicle Networks

Abstract: The lack of security in today's in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle's normal behavior. The attacker may exploit this vulnerability to launch targeted low-rate injection attacks which are difficult to detect because the network traffic during attacks looks like regular net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 26 publications
1
15
0
Order By: Relevance
“…Moreover, using a public key encryption scheme for symmetric key exchange in CoMAD also helps mitigating mirroring attacks. Additional functionalities on detecting the adversary may also be implemented, as in [49].…”
Section: ) Mirroringmentioning
confidence: 99%
“…Moreover, using a public key encryption scheme for symmetric key exchange in CoMAD also helps mitigating mirroring attacks. Additional functionalities on detecting the adversary may also be implemented, as in [49].…”
Section: ) Mirroringmentioning
confidence: 99%
“…Their proposed IDS have achieved good results at message frequency anomaly, but for the data-field content, only the injection of a large number of abnormal messages to the CAN bus can be detected. Satya and Raju [4] proposed an IDS for in-vehicle CAN bus using sequence mining algorithm, which can detect various forms of replay attacks. Taylor et al [5] proposed a frequency-based IDS for in-vehicle CAN bus.…”
Section: B Related Workmentioning
confidence: 99%
“…Jin, Chung, and Xu propose a signature-based intrusion detection system [9] that can detect replay and interruption attacks. Katragadda, Darby, et al [10] propose a system to detect low-rate replay attacks however it their solution works only for specific types of replay attacks. Wu, Kurachi, et al [11] use statistical measurements related to the message id to attempt to thwart replay and reverse-engineering attacks on the CAN.…”
Section: Background and Related Workmentioning
confidence: 99%