首页> 外文会议>IEEE Vehicular Technology Conference;Vehicular Technology Conference >Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection
【24h】

Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection

机译:利用可以内车入侵检测的可以数据的形状

获取原文

摘要

Modern vehicles rely on scores of electronic control units (ECUs) broadcasting messages over a few controller area networks (CANs). Bereft of security features, in-vehicle CANs are exposed to cyber manipulation and multiple researches have proved viable, life-threatening cyber attacks. Complicating the issue, CAN messages lack a common mapping of functions to commands, so packets are observable but not easily decipherable. We present a transformational approach to CAN IDS that exploits the geometric properties of CAN data to inform two novel detectors-one based on distance from a learned, lower dimensional manifold and the other on discontinuities of the manifold over time. Proof-of-concept tests are presented by implementing a potential attack approach on a driving vehicle. The initial results suggest that (1) the first detector requires additional refinement but does hold promise; (2) the second detector gives a clear, strong indicator of the attack; and (3) the algorithms keep pace with high-speed CAN messages. As our approach is data-driven it provides a vehicle-agnostic IDS that eliminates the need to reverse engineer CAN messages and can be ported to an after-market plugin.
机译:现代车辆依赖于几个控制器区域网络(罐)的电子控制单元(ECU)广播消息。局限性的安全功能,车载罐的罐头接触到网络操纵,并证明了多种研究已经证明了可行性,威胁危及生命的网络攻击。复杂问题,可以毫无消息缺少函数的常见映射到命令,因此数据包是可观察的,但不容易可解密。我们介绍了一种可用于利用CAN数据的几何特性的ID的变换方法,以基于从学习,低维歧管和另一个在歧管的不连续性上的距离来告知两个新的检测器-1。通过在驾驶车辆上实现潜在的攻击方法来提出概念证明测试。初始结果表明(1)第一个探测器需要额外的细化,但确实存在承诺; (2)第二种探测器给出了一个明确,强大的攻击指标; (3)算法跟上高速CAN消息的步伐。由于我们的方法是数据驱动,它提供了一种车辆不可知的ID,可以消除对逆向工程师可以信息的需求,并且可以移植到市场之后的插件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号