{"title":"Mitigation mechanism against in-vehicle network intrusion by reconfiguring ECU and disabling attack packet","authors":"Hyeokchan Kwon, Sokjoon Lee, Jungyong Choi, Byung-ho Chung","doi":"10.23919/INCIT.2018.8584882","DOIUrl":null,"url":null,"abstract":"As the connectivity of vehicles grows and becomes more intelligent, security threats are also increasing. In fact, hacking of vehicles such as Jeep Cherokee (2014), Mitsubishi Outlander (2016) and Tesla model S (2016 and 2017) has been reported. Currently, various intrusion detection solutions are emerging in order to defend the cyber-attacks of vehicles, but up to now, the response to detection has remained at the ex post countermeasure level. In this paper, we propose a mitigation mechanism to cope with an attack on a vehicular internal network. The proposed mechanism reconfigures ECUs and disables attack packets to mitigate damage to network intrusions.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"581 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information Technology (InCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/INCIT.2018.8584882","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
As the connectivity of vehicles grows and becomes more intelligent, security threats are also increasing. In fact, hacking of vehicles such as Jeep Cherokee (2014), Mitsubishi Outlander (2016) and Tesla model S (2016 and 2017) has been reported. Currently, various intrusion detection solutions are emerging in order to defend the cyber-attacks of vehicles, but up to now, the response to detection has remained at the ex post countermeasure level. In this paper, we propose a mitigation mechanism to cope with an attack on a vehicular internal network. The proposed mechanism reconfigures ECUs and disables attack packets to mitigate damage to network intrusions.