基于can总线的网络攻击检测两步算法:网联汽车的初步案例研究

IF 1.8 Q2 ENGINEERING, MULTIDISCIPLINARY
Marco Lombardi, F. Pascale, D. Santaniello
{"title":"基于can总线的网络攻击检测两步算法:网联汽车的初步案例研究","authors":"Marco Lombardi, F. Pascale, D. Santaniello","doi":"10.1115/1.4052823","DOIUrl":null,"url":null,"abstract":"\n Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to Everything' (V2X), which indicates a system of communication between a vehicle to any entity that may influence the vehicle and vice versa. However, it introduces problems regarding the vehicle's IT security. It is possible, for example, by tampering with one of the Electronic Control Units (ECUs) to take partial or total control of the vehicle. In this paper, we introduce a preliminary study case to guarantee cybersecurity inside connected vehicles. In particular, an Intrusion Detection System over the CAN-Bus to allow the possible malicious massages. In particular, through the use of a two-step detection algorithm that exploits both the variation of the status parameters of the various ECUs over time and the Bayesian networks can identify a possible attack. The first experimental results seem encouraging.","PeriodicalId":44694,"journal":{"name":"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering","volume":"4 1","pages":""},"PeriodicalIF":1.8000,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Two-Step Algorithm to Detect Cyber-Attack Over the Can-Bus: A Preliminary Case Study in Connected Vehicles\",\"authors\":\"Marco Lombardi, F. Pascale, D. Santaniello\",\"doi\":\"10.1115/1.4052823\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to Everything' (V2X), which indicates a system of communication between a vehicle to any entity that may influence the vehicle and vice versa. However, it introduces problems regarding the vehicle's IT security. It is possible, for example, by tampering with one of the Electronic Control Units (ECUs) to take partial or total control of the vehicle. In this paper, we introduce a preliminary study case to guarantee cybersecurity inside connected vehicles. In particular, an Intrusion Detection System over the CAN-Bus to allow the possible malicious massages. In particular, through the use of a two-step detection algorithm that exploits both the variation of the status parameters of the various ECUs over time and the Bayesian networks can identify a possible attack. The first experimental results seem encouraging.\",\"PeriodicalId\":44694,\"journal\":{\"name\":\"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering\",\"volume\":\"4 1\",\"pages\":\"\"},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2021-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1115/1.4052823\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1115/1.4052823","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 8

摘要

现代车辆通过智能传感器和智能物体连接到网络,并在彼此之间连接。这种情况允许制造商发送无线更新、接收诊断信息和提供各种多媒体服务。目前,更普遍的说法是“车辆到一切”(V2X),它指的是车辆与任何可能影响车辆的实体之间的通信系统,反之亦然。然而,它引入了有关车辆it安全的问题。例如,通过篡改其中一个电子控制单元(ecu)来部分或完全控制车辆是可能的。本文介绍了一个初步的研究案例,以保证网联汽车内部的网络安全。特别是,通过can总线的入侵检测系统允许可能的恶意消息。特别是,通过使用两步检测算法,利用各种ecu状态参数随时间的变化和贝叶斯网络可以识别可能的攻击。最初的实验结果似乎令人鼓舞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Two-Step Algorithm to Detect Cyber-Attack Over the Can-Bus: A Preliminary Case Study in Connected Vehicles
Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to Everything' (V2X), which indicates a system of communication between a vehicle to any entity that may influence the vehicle and vice versa. However, it introduces problems regarding the vehicle's IT security. It is possible, for example, by tampering with one of the Electronic Control Units (ECUs) to take partial or total control of the vehicle. In this paper, we introduce a preliminary study case to guarantee cybersecurity inside connected vehicles. In particular, an Intrusion Detection System over the CAN-Bus to allow the possible malicious massages. In particular, through the use of a two-step detection algorithm that exploits both the variation of the status parameters of the various ECUs over time and the Bayesian networks can identify a possible attack. The first experimental results seem encouraging.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.20
自引率
13.60%
发文量
34
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信