2016 IEEE International Carnahan Conference on Security Technology (ICCST) 2016
DOI: 10.1109/ccst.2016.7815711
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion prevention system of automotive network CAN bus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 1 publication
0
14
0
Order By: Relevance
“…[Abbott- McCune and Shay 2016] propose a solution capable of evolving to a working IPS [Abbott-McCune and Shay 2016]. It consists of checking whether the arbitration ID of a CAN frame matches the ones pre-programmed in the ECU and also if the ECU is transmitting data at the same time, thus detecting if a malicious node is trying to replay a message.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[Abbott- McCune and Shay 2016] propose a solution capable of evolving to a working IPS [Abbott-McCune and Shay 2016]. It consists of checking whether the arbitration ID of a CAN frame matches the ones pre-programmed in the ECU and also if the ECU is transmitting data at the same time, thus detecting if a malicious node is trying to replay a message.…”
Section: Related Workmentioning
confidence: 99%
“…An IDS can detect attacks, but it is not capable of preventing it. [Abbott-McCune and Shay 2016] and [Giannopoulos et al 2017] suggest inserting a bit stuffing error during malicious frame transmission in order to prevent it from being successfully transmitted throughout the network. The IDS must respond fast enough in order to generate the bit stuffing error while the malicious frame is still being transmitted, The purpose of this paper is to present an IDS capable of detecting anomalies in an automotive CAN network before the end of the transmission of a CAN frame.…”
Section: Introductionmentioning
confidence: 99%
“…To secure vehicular environments, two different approaches have been considered: security countermeasures based on encryption and authentication for data over vehicular networks, and intrusion detection systems that can detect suspicious activities on the networks [ 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 ]. In this work, we focus on the intrusion detection system based on the estimation of the Rényi entropy with multiple orders [ 28 ].…”
Section: Introductionmentioning
confidence: 99%
“…For example, the Controller Area Network (CAN) bus is another communication protocol widely used in the automotive sector. However, it can be compromised, and some intrusion prevention systems have been proposed . In this sense, there are security frameworks using the AES.…”
Section: Introductionmentioning
confidence: 99%