一种新的下一代车载网络入侵检测系统

Zhouyan Deng, Yijie Xun, Jiajia Liu, Shouqing Li, Yilin Zhao
{"title":"一种新的下一代车载网络入侵检测系统","authors":"Zhouyan Deng, Yijie Xun, Jiajia Liu, Shouqing Li, Yilin Zhao","doi":"10.1109/GLOBECOM48099.2022.10000766","DOIUrl":null,"url":null,"abstract":"As emerging technologies such as mobile communication, vehicle to everything, and artificial intelligence are widely used in intelligent connected vehicles, drivers can gain a convenient and colorful driving experience. While these tech-nologies enrich the driving experience, they also bring a series of vulnerable interfaces to the vehicle. These interfaces can be used by hackers to attack other nodes of in-vehicle network that lack authentication and encryption. For this, researchers design scheme to encrypt and authenticate messages to protect in-vehicle networks, but this scheme would occupy the bandwidth resources of in-vehicle network. Therefore, researchers propose parameter monitoring-based intrusion detection system (IDS), information theory-based IDS, and fingerprint-based IDS, which do not occupy bandwidth. However, most IDSs either cannot locate the source of the attack, cannot detect aperiodic frames, or need to know the non-public mapping between electronic control units (ECUs) and identifiers (IDs) of in-vehicle network. To solve these weaknesses, we propose a novel IDS that establishes voltage fingerprints for each ID. This system can detect period and aperiodic malicious frames and locate the source of attack without knowing the mapping between ECUs and IDs. The experimental results on actual vehicles demonstrate that our scheme is robust against real scenarios.","PeriodicalId":313199,"journal":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Novel Intrusion Detection System for Next Generation In-Vehicle Networks\",\"authors\":\"Zhouyan Deng, Yijie Xun, Jiajia Liu, Shouqing Li, Yilin Zhao\",\"doi\":\"10.1109/GLOBECOM48099.2022.10000766\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As emerging technologies such as mobile communication, vehicle to everything, and artificial intelligence are widely used in intelligent connected vehicles, drivers can gain a convenient and colorful driving experience. While these tech-nologies enrich the driving experience, they also bring a series of vulnerable interfaces to the vehicle. These interfaces can be used by hackers to attack other nodes of in-vehicle network that lack authentication and encryption. For this, researchers design scheme to encrypt and authenticate messages to protect in-vehicle networks, but this scheme would occupy the bandwidth resources of in-vehicle network. Therefore, researchers propose parameter monitoring-based intrusion detection system (IDS), information theory-based IDS, and fingerprint-based IDS, which do not occupy bandwidth. However, most IDSs either cannot locate the source of the attack, cannot detect aperiodic frames, or need to know the non-public mapping between electronic control units (ECUs) and identifiers (IDs) of in-vehicle network. To solve these weaknesses, we propose a novel IDS that establishes voltage fingerprints for each ID. This system can detect period and aperiodic malicious frames and locate the source of attack without knowing the mapping between ECUs and IDs. The experimental results on actual vehicles demonstrate that our scheme is robust against real scenarios.\",\"PeriodicalId\":313199,\"journal\":{\"name\":\"GLOBECOM 2022 - 2022 IEEE Global Communications Conference\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"GLOBECOM 2022 - 2022 IEEE Global Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GLOBECOM48099.2022.10000766\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOBECOM48099.2022.10000766","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

随着移动通信、车到一切、人工智能等新兴技术在智能网联汽车上的广泛应用,驾驶员可以获得便捷、丰富多彩的驾驶体验。虽然这些技术丰富了驾驶体验,但它们也给车辆带来了一系列脆弱的接口。这些接口可以被黑客用来攻击其他缺乏身份验证和加密的车载网络节点。为此,研究人员设计了对消息进行加密和认证的方案来保护车载网络,但该方案会占用车载网络的带宽资源。因此,研究人员提出了不占用带宽的基于参数监控的入侵检测系统、基于信息理论的入侵检测系统和基于指纹的入侵检测系统。然而,大多数IDs要么无法定位攻击源,要么无法检测非周期帧,要么需要知道电子控制单元(ecu)与车载网络标识符(id)之间的非公开映射。为了解决这些弱点,我们提出了一种新的IDS,为每个ID建立电压指纹。该系统可以在不知道ecu和id的映射关系的情况下,检测周期和非周期恶意帧,定位攻击源。在实际车辆上的实验结果表明,该方案具有较好的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Novel Intrusion Detection System for Next Generation In-Vehicle Networks
As emerging technologies such as mobile communication, vehicle to everything, and artificial intelligence are widely used in intelligent connected vehicles, drivers can gain a convenient and colorful driving experience. While these tech-nologies enrich the driving experience, they also bring a series of vulnerable interfaces to the vehicle. These interfaces can be used by hackers to attack other nodes of in-vehicle network that lack authentication and encryption. For this, researchers design scheme to encrypt and authenticate messages to protect in-vehicle networks, but this scheme would occupy the bandwidth resources of in-vehicle network. Therefore, researchers propose parameter monitoring-based intrusion detection system (IDS), information theory-based IDS, and fingerprint-based IDS, which do not occupy bandwidth. However, most IDSs either cannot locate the source of the attack, cannot detect aperiodic frames, or need to know the non-public mapping between electronic control units (ECUs) and identifiers (IDs) of in-vehicle network. To solve these weaknesses, we propose a novel IDS that establishes voltage fingerprints for each ID. This system can detect period and aperiodic malicious frames and locate the source of attack without knowing the mapping between ECUs and IDs. The experimental results on actual vehicles demonstrate that our scheme is robust against real scenarios.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信