Publication | Closed Access
Frequency-based anomaly detection for the automotive CAN bus
264
Citations
7
References
2015
Year
Unknown Venue
Anomaly DetectionEngineeringInformation SecurityInformation ForensicsHistorical Packet TimingHardware SecurityReliability EngineeringSystems EngineeringAutomotive Can BusNetwork Traffic MeasurementIntrusion Detection SystemOutlier DetectionComputer EngineeringAnomaly DetectorAutomotive SecurityComputer ScienceModern AutomobileSignal ProcessingData SecurityCryptographyIntrusion DetectionIndustrial InformaticsNetwork Monitoring
The modern automobile is controlled by networked computers. The security of these networks was historically of little concern, but researchers have in recent years demonstrated their many vulnerabilities to attack. As part of a defence against these attacks, we evaluate an anomaly detector for the automotive controller area network (CAN) bus. The majority of attacks are based on inserting extra packets onto the network. But most normal packets arrive at a strict frequency. This motivates an anomaly detector that compares current and historical packet timing. We present an algorithm that measures inter-packet timing over a sliding window. The average times are compared to historical averages to yield an anomaly signal. We evaluate this approach over a range of insertion frequencies and demonstrate the limits of its effectiveness. We also show how a similar measure of the data contents of packets is not effective for identifying anomalies. Finally we show how a one-class support vector machine can use the same information to detect anomalies with high confidence.
| Year | Citations | |
|---|---|---|
Page 1
Page 1