2022
DOI: 10.1109/tits.2020.3025685
|View full text |Cite
|
Sign up to set email alerts
|

Graph-Based Intrusion Detection System for Controller Area Networks

Abstract: The controller area network (CAN) is the most widely used intra-vehicular communication network in the automotive industry. Because of its simplicity in design, it lacks most of the requirements needed for a security-proven communication protocol. However, a safe and secured environment is imperative for autonomous as well as connected vehicles. Therefore CAN security is considered one of the important topics in the automotive research community. In this paper, we propose a fourstage intrusion detection system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
36
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 64 publications
(46 citation statements)
references
References 26 publications
0
36
0
Order By: Relevance
“…The common data sources that are used to assess the accuracy of the ML-based IDS solutions include; data from the owner devices [24], synthetic/artificial data [25], simulated data [26], and data from a stationary/parked vehicle [27], [28], [29]. This limits the confidence in the results and threatens its validity [30].…”
Section: Related Workmentioning
confidence: 99%
“…The common data sources that are used to assess the accuracy of the ML-based IDS solutions include; data from the owner devices [24], synthetic/artificial data [25], simulated data [26], and data from a stationary/parked vehicle [27], [28], [29]. This limits the confidence in the results and threatens its validity [30].…”
Section: Related Workmentioning
confidence: 99%
“…However, these two works incur significant error rates. The work in [35] proposes a graphbased IDS that models the sequence of exchanged CAN messages. However, it cannot detect attacks by examining isolated frames and also has significant error rates for fuzzing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The common data sources that are used to assess the accuracy of the ML-based IDS solutions include; data from the owner devices [38], synthetic/artificial data [39], simulated data [40], and data from a stationary/parked vehicle [36], [41], [42]. This limits the confidence in the results and threatens its validity [43].…”
Section: Related Workmentioning
confidence: 99%