skip to main content
10.1145/3064814.3064816acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
short-paper
Public Access

Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection

Published:04 April 2017Publication History

ABSTRACT

Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the controller area network (CAN) bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper provides the first such algorithm with experiments using three attacks in five (total) scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).

References

  1. Ian Broster and Alan Burns. 2003. An analysable bus-guardian for event-triggered communication. In Real-Time Systems Symposium, 2003. RTSS 2003. 24th IEEE. IEEE, 410--419. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, and others. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces.. In USENIX Security Symposium. San Francisco. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Tobias Hoppe, Stefan Kiltz, and Jana Dittmann. 2008. Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. Springer Berlin Heidelberg, Berlin, Heidelberg, 235--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and others. 2010. Experimental security analysis of a modern automobile. In Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 447--462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Tsutomu Matsumoto, Masato Hata, Masato Tanabe, Katsunari Yoshioka, and Kazuomi Oishi. 2012. A method of preventing unauthorized data transmission in controller area network. In Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th. IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  6. Michael Müter and Naim Asaj. 2011. Entropy-based anomaly detection for in-vehicle networks. In Intelligent Vehicles Symposium (IV), 2011 IEEE. IEEE, 1110--1115.Google ScholarGoogle ScholarCross RefCross Ref
  7. Michael Müter, André Groll, and Felix C Freiling. 2010. A structured approach to anomaly detection for in-vehicle networks. In Information Assurance and Security (IAS), 2010 Sixth International Conference on. IEEE, 92--98.Google ScholarGoogle ScholarCross RefCross Ref
  8. Hendrik Schweppe and Yves Roudier. 2012. Security and privacy for in-vehicle networks. In Vehicular Communications, Sensing, and Computing (VCSC), 2012 IEEE 1st International Workshop on. IEEE, 12--17.Google ScholarGoogle Scholar
  9. Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaãniche, and Youssef Laarouchi. 2013. Survey on security threats and protection mechanisms in embedded automotive networks. In Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on. IEEE, 1--12.Google ScholarGoogle ScholarCross RefCross Ref
  10. Marko Wolf, André Weimerskirch, and Thomas Wollinger. 2007. State of the art: Embedding security in vehicles. EURASIP Journal on Embedded Systems 2007, 1 (2007), 074706.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CISRC '17: Proceedings of the 12th Annual Conference on Cyber and Information Security Research
      April 2017
      106 pages
      ISBN:9781450348553
      DOI:10.1145/3064814

      Copyright © 2017 ACM

      Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 April 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      CISRC '17 Paper Acceptance Rate8of22submissions,36%Overall Acceptance Rate69of136submissions,51%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader