Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3465755
|View full text |Cite
|
Sign up to set email alerts
|

In-vehicle detection of targeted CAN bus attacks

Abstract: Most vehicles use the controller area network bus for communication between their components. Attackers who have already penetrated the in-vehicle network often utilize this bus in order to take control of safety-relevant components of the vehicle. Such targeted attack scenarios are often hard to detect by network intrusion detection systems because the specific payload is usually not contained within their training data sets. In this work, we describe an intrusion detection system that uses decision trees tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Moulahi et al [24] presented a comparative detection performance on Random Forest(RT), Decision Tree(DT), Support Vector Machine(SVM), and Multilayer perception(MLP) based methods. Fenzl et al [25] proposed an IDS based on decision trees modeled through genetic programming.…”
Section: Machine-learning-based Intrusion Detection Systems For In-ve...mentioning
confidence: 99%
See 2 more Smart Citations
“…Moulahi et al [24] presented a comparative detection performance on Random Forest(RT), Decision Tree(DT), Support Vector Machine(SVM), and Multilayer perception(MLP) based methods. Fenzl et al [25] proposed an IDS based on decision trees modeled through genetic programming.…”
Section: Machine-learning-based Intrusion Detection Systems For In-ve...mentioning
confidence: 99%
“…However, most of them are only designed for a specific network environment as they are trained on a benchmark dataset that was generated under a designed circumstance and lack generalization ability for tasks from various attack scenarios. [21], [22], [24], [25], [26], [29]. Additionally, the huge computational resources and time cost needed by them to train a model [22] No High High High Moulahi et al [24] No Low High High Fenzl et al [25] No Low High High Ma et al [26] No High High High Ale et al [27] No Low High High Xiao et al [28] No High High High Shi et al [29] No Low High Low Desta et al [30] No Low High Low Ashraf et al [31] No Low High Low Yang et al [ on a high-volume dataset cannot be ignored.…”
Section: Literature Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Some studies make claim that the ROAD dataset is the most comprehensive and realistic open CAN dataset available for evaluating and comparing CAN IDSs for attacks [51,81]. Other research has referenced the quality of the dataset, used it to establish definitions within the CAN IDS research community, or cited the work as an establishment of research standards [21,[83][84][85][86][87][88][89][90].…”
Section: Plos Onementioning
confidence: 99%
“…These algorithms include two types of fuzzy-roughKNNs the discernibility classifier and a fuzzy unordered rule induction algorithm. Fenzl et al [41] used DTs modeled through genetic programming to detect intrusions in the CAN bus. Features and feature boundaries selection were based on the CAN DBC files.…”
Section: Supervised Learning Kang and Kangmentioning
confidence: 99%