2022
DOI: 10.1109/tits.2021.3088998
|View full text |Cite
|
Sign up to set email alerts
|

Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 36 publications
0
23
0
Order By: Relevance
“…The suggested technique is compared with recent methodologies [ 40 , 43 , 44 , 45 , 46 ], as shown in Table 12 and Table 13 against DoS and fuzzy attacks obtained from the car hacking dataset. Although most of the methods achieve high accuracy, our proposed IDS shows improved performance compared to other methodologies.…”
Section: Resultsmentioning
confidence: 99%
“…The suggested technique is compared with recent methodologies [ 40 , 43 , 44 , 45 , 46 ], as shown in Table 12 and Table 13 against DoS and fuzzy attacks obtained from the car hacking dataset. Although most of the methods achieve high accuracy, our proposed IDS shows improved performance compared to other methodologies.…”
Section: Resultsmentioning
confidence: 99%
“…This type of IDS highly depends on predefined rules. H-IDFS has been introduced based on the histogram structure for intrusion detection and filtering [28]. In the training phase, CAN data are divided into windows, with each window containing eight consecutive data bytes (Payload) from sequential packets.…”
Section: A Related Work In In-vehicle Network Intrusion Detectionmentioning
confidence: 99%
“…Derhab et al [2] proposed a Histogram-based Intrusion Detection and Filtering (H-IDFS) framework. The proposed framework, first, groups CAN frames into windows and calculates their histograms which are, then, fed into a multi-class classifier to identify windows containing malicious CAN frames.…”
Section: Related Workmentioning
confidence: 99%
“…For a safe, efficient, and comfortable operation of modern vehicles, data is transmitted through intra-vehicle and over inter-vehicle networks depending on system-level requirements [1]. This provides new cyber attack surfaces for potential intrusions into the vehicle systems, which can put road users' lives at risk if exploited by malicious agents [2,3].…”
Section: Introductionmentioning
confidence: 99%