J. Laufenberg, Susanne Throner, T. Kropf, O. Bringmann
{"title":"针对入侵防御系统训练与评估的CAN攻击仿真与自适应","authors":"J. Laufenberg, Susanne Throner, T. Kropf, O. Bringmann","doi":"10.1109/IV55152.2023.10186799","DOIUrl":null,"url":null,"abstract":"The vulnerability of vehicles due to the lack of security features of the Controller Area Network (CAN) is now well known. CAN is one of the de facto standards for internal vehicle communication, so securing CAN against attacks is an ongoing challenge. For this purpose, Intrusion Detection Systems (IDS) are a widely known approach for attack detection. IDS have to be trained and evaluated, therefore data is needed. The few publicly available data sets cover only a small variance of possible attacks. Since conducting real attacks can be a costly business, the presented method generates simulated attack data that can be used to train and evaluate IDS. To show the vulnerabilities of an IDS, the approach adapted the attacks so that they are not detected by the IDS. The approach is executed on an IDS that detected 99.99% of the original attacks in the publicly available data sets. After adaptation by the proposed method, we found several attacks that were not detected.","PeriodicalId":195148,"journal":{"name":"2023 IEEE Intelligent Vehicles Symposium (IV)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack Simulation and Adaptation in CAN for Training and Evaluation of IDS\",\"authors\":\"J. Laufenberg, Susanne Throner, T. Kropf, O. Bringmann\",\"doi\":\"10.1109/IV55152.2023.10186799\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The vulnerability of vehicles due to the lack of security features of the Controller Area Network (CAN) is now well known. CAN is one of the de facto standards for internal vehicle communication, so securing CAN against attacks is an ongoing challenge. For this purpose, Intrusion Detection Systems (IDS) are a widely known approach for attack detection. IDS have to be trained and evaluated, therefore data is needed. The few publicly available data sets cover only a small variance of possible attacks. Since conducting real attacks can be a costly business, the presented method generates simulated attack data that can be used to train and evaluate IDS. To show the vulnerabilities of an IDS, the approach adapted the attacks so that they are not detected by the IDS. The approach is executed on an IDS that detected 99.99% of the original attacks in the publicly available data sets. After adaptation by the proposed method, we found several attacks that were not detected.\",\"PeriodicalId\":195148,\"journal\":{\"name\":\"2023 IEEE Intelligent Vehicles Symposium (IV)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE Intelligent Vehicles Symposium (IV)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IV55152.2023.10186799\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Intelligent Vehicles Symposium (IV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IV55152.2023.10186799","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Attack Simulation and Adaptation in CAN for Training and Evaluation of IDS
The vulnerability of vehicles due to the lack of security features of the Controller Area Network (CAN) is now well known. CAN is one of the de facto standards for internal vehicle communication, so securing CAN against attacks is an ongoing challenge. For this purpose, Intrusion Detection Systems (IDS) are a widely known approach for attack detection. IDS have to be trained and evaluated, therefore data is needed. The few publicly available data sets cover only a small variance of possible attacks. Since conducting real attacks can be a costly business, the presented method generates simulated attack data that can be used to train and evaluate IDS. To show the vulnerabilities of an IDS, the approach adapted the attacks so that they are not detected by the IDS. The approach is executed on an IDS that detected 99.99% of the original attacks in the publicly available data sets. After adaptation by the proposed method, we found several attacks that were not detected.