2020
DOI: 10.1007/978-3-030-45371-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Securing CAN is a significant step toward ensuring that the critical systems which communicate on the bus are protected from cyber and physical attacks. Approaches toward CAN security include deploying an intrusion detection system (IDS) [7], [8] on the network to detect indications of attacks over the CAN bus, or using cryptographic techniques [9]- [11] and authentications mechanisms [12]- [14]. Although an IDS can be adopted without perturbing bus performance [15], the latter approaches cannot be easily applied to in-vehicle networks due to computational constraints and real-time requirements [16].…”
Section: Introductionmentioning
confidence: 99%
“…Securing CAN is a significant step toward ensuring that the critical systems which communicate on the bus are protected from cyber and physical attacks. Approaches toward CAN security include deploying an intrusion detection system (IDS) [7], [8] on the network to detect indications of attacks over the CAN bus, or using cryptographic techniques [9]- [11] and authentications mechanisms [12]- [14]. Although an IDS can be adopted without perturbing bus performance [15], the latter approaches cannot be easily applied to in-vehicle networks due to computational constraints and real-time requirements [16].…”
Section: Introductionmentioning
confidence: 99%