{"title":"Intrusion Attacks on Automotive CAN and Their Detection","authors":"Halley M. Paulson","doi":"10.61366/2576-2176.1103","DOIUrl":null,"url":null,"abstract":"The main highway of communication in a vehicle is the Controller Area Network, commonly known by the acronym CAN. Any vulnerability in this network could allow bad actors to block communication between vehicle subsystems, risking the safety of the vehicle’s occupants. With the ever growing list of vulnerabilities being exposed in the CAN, it is critical to address its safety. This paper looks at one of the known vulnerabilities in the data link layer of the CAN and an Intrusion Detection System that could detect attacks on this network. We detail a few processes of the CAN, arbitration and error states, and how they are leveraged during different attacks. We also explain the core component of the Intrusion Detection System, the Detection Engine, and discuss testing results.","PeriodicalId":113813,"journal":{"name":"Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.61366/2576-2176.1103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The main highway of communication in a vehicle is the Controller Area Network, commonly known by the acronym CAN. Any vulnerability in this network could allow bad actors to block communication between vehicle subsystems, risking the safety of the vehicle’s occupants. With the ever growing list of vulnerabilities being exposed in the CAN, it is critical to address its safety. This paper looks at one of the known vulnerabilities in the data link layer of the CAN and an Intrusion Detection System that could detect attacks on this network. We detail a few processes of the CAN, arbitration and error states, and how they are leveraged during different attacks. We also explain the core component of the Intrusion Detection System, the Detection Engine, and discuss testing results.