首页> 外文期刊>IEEE transactions on information forensics and security >Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks
【24h】

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks

机译:披风的形状:控制器区域网络中基于时钟偏斜的入侵检测系统的形式分析

获取原文
获取原文并翻译 | 示例
           

摘要

This paper presents a new masquerade attack called the cloaking attack and provides formal analyses for clock skew-based intrusion detection systems (IDSs) that detect masquerade attacks in the controller area network (CAN) in automobiles. In the cloaking attack, the adversary manipulates the message inter-transmission times of spoofed messages by adding delays so as to emulate a desired clock skew and avoid detection. In order to predict and characterize the impact of the cloaking attack in terms of the attack success probability on a given CAN bus and IDS, we develop formal models for two clock skew-based IDSs, i.e., the state-of-the-art (SOTA) IDS and its adaptation to the widely used network time protocol (NTP), using parameters of the attacker, the detector, and the hardware platform. To the best of our knowledge, this is the first paper that provides formal analyses of clock skew-based IDSs in automotive CAN. We implement the cloaking attack on two hardware testbeds, a prototype and a real vehicle (the University of Washington EcoCAR), and demonstrate its effectiveness against both the SOTA and NTP-based IDSs. By comparing each predicted attack success probability curve against its experimental curve, we find that the average prediction error is within 3.0% for the SOTA IDS and 5.7% for the NTP-based IDS.
机译:本文提出了一种新的伪装攻击,称为“隐身攻击”,并对基于时钟偏斜的入侵检测系统(IDS)进行了形式分析,这些入侵检测系统可检测汽车的控制器局域网(CAN)中的伪装攻击。在伪装攻击中,对手通过添加延迟来操纵欺骗消息的消息互传时间,以模拟所需的时钟偏斜并避免检测。为了根据攻击成功概率对给定的CAN总线和IDS预测和表征隐蔽攻击的影响,我们针对两个基于时钟偏斜的IDS开发了正式模型,即最新技术( SOTA)IDS及其通过使用攻击者,检测器和硬件平台的参数使其适应广泛使用的网络时间协议(NTP)。据我们所知,这是第一篇对汽车CAN中基于时钟偏斜的IDS进行正式分析的论文。我们在两个硬件测试平台,一个原型和一个真实的车辆(华盛顿大学EcoCAR)上实施了隐身攻击,并展示了它对基于SOTA和基于NTP的IDS的有效性。通过将每个预测的攻击成功概率曲线与其实验曲线进行比较,我们发现SOTA IDS的平均预测误差在3.0%以内,基于NTP的IDS的平均预测误差在5.7%以内。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号