首页> 外文期刊>Eurasip Journal on Wireless Communications and Networking >Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review
【24h】

Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review

机译:汽车控制器区域网络的入侵检测系统(CAN)总线系统:综述

获取原文
获取原文并翻译 | 示例
           

摘要

The modern vehicles nowadays are managed by networked controllers. Most of the networks were designed with little concern about security which has recently motivated researchers to demonstrate various kinds of attacks against the system. In this paper, we discussed the vulnerabilities of the Controller Area Network (CAN) within in-vehicle communication protocol along with some potential attacks that could be exploited against it. Besides, we present some of the security solutions proposed in the current state of research in order to overcome the attacks. However, the main goal of this paper is to highlight a holistic approach known as intrusion detection system (IDS) which has been a significant tool in securing networks and information systems over the past decades. To the best of our knowledge, there is no recorded literature on a comprehensive overview of IDS implementation specifically in the CAN bus network system. Thus, we proposed an in-depth investigation of IDS found in the literature based on the following aspects: detection approaches, deployment strategies, attacking techniques, and finally technical challenges. In addition, we also categorized the anomaly-based IDS according to these methods, e.g., frequency-based, machine learning-based, statistical-based, and hybrid-based as part of our contributions. Correspondingly, this study will help to accelerate other researchers to pursue IDS research in the CAN bus system.
机译:现在,现代车辆由联网控制器管理。大多数网络都是针对安全性的担忧而言,最近有动力的研究人员展示了对系统的各种攻击。在本文中,我们讨论了车载通信协议内的控制器区域网络(CAN)的漏洞以及可以对其进行利用的一些潜在攻击。此外,我们展示了一些在当前研究状态下提出的安全解决方案,以克服攻击。然而,本文的主要目的是突出像入侵检测系统(IDS)的整体方法,这是在过去几十年中保护网络和信息系统的重要工具。据我们所知,在CAN总线网络系统中特别概述IDS实现的全面概述没有记录的文献。因此,我们提出了基于以下几个方面的文献中发现的IDS的深入调查:检测方法,部署策略,攻击技术以及最终的技术挑战。此外,我们还根据这些方法分类了基于异常的ID,例如,基于频率的基于机器,基于机器的基于,基于统计的和混合的基于贡献。相应地,本研究将有助于加速其他研究人员在CAN总线系统中追求IDS研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号