Cargando…

Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks

For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle ne...

Descripción completa

Detalles Bibliográficos
Autores principales: Khan, Junaid, Lim, Dae-Woon, Kim, Young-Sik
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098590/
https://www.ncbi.nlm.nih.gov/pubmed/37050613
http://dx.doi.org/10.3390/s23073554
_version_ 1785024846642544640
author Khan, Junaid
Lim, Dae-Woon
Kim, Young-Sik
author_facet Khan, Junaid
Lim, Dae-Woon
Kim, Young-Sik
author_sort Khan, Junaid
collection PubMed
description For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle network anomalies. The statistical characteristics of attacks provide valuable information about the inherent intrusion patterns and behaviors. We employed two real-world attack scenarios from publicly available datasets to record a real-time response against intrusions with increased precision for in-vehicle network environments. Our proposed IDS can exploit malicious patterns by calculating thresholds and using the statistical properties of attacks, making attack detection more efficient. The optimized threshold value is calculated using brute-force optimization for various window sizes to minimize the total error. The reference values of normality require a few legitimate data frames for effective intrusion detection. The experimental findings validate that our suggested method can efficiently detect fuzzy, merge, and denial-of-service (DoS) attacks with low false-positive rates. It is also demonstrated that the total error decreases with an increasing attack rate for varying window sizes. The results indicate that our proposed IDS minimizes the misclassification rate and is hence better suited for in-vehicle networks.
format Online
Article
Text
id pubmed-10098590
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100985902023-04-14 Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks Khan, Junaid Lim, Dae-Woon Kim, Young-Sik Sensors (Basel) Article For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle network anomalies. The statistical characteristics of attacks provide valuable information about the inherent intrusion patterns and behaviors. We employed two real-world attack scenarios from publicly available datasets to record a real-time response against intrusions with increased precision for in-vehicle network environments. Our proposed IDS can exploit malicious patterns by calculating thresholds and using the statistical properties of attacks, making attack detection more efficient. The optimized threshold value is calculated using brute-force optimization for various window sizes to minimize the total error. The reference values of normality require a few legitimate data frames for effective intrusion detection. The experimental findings validate that our suggested method can efficiently detect fuzzy, merge, and denial-of-service (DoS) attacks with low false-positive rates. It is also demonstrated that the total error decreases with an increasing attack rate for varying window sizes. The results indicate that our proposed IDS minimizes the misclassification rate and is hence better suited for in-vehicle networks. MDPI 2023-03-28 /pmc/articles/PMC10098590/ /pubmed/37050613 http://dx.doi.org/10.3390/s23073554 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Khan, Junaid
Lim, Dae-Woon
Kim, Young-Sik
Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
title Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
title_full Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
title_fullStr Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
title_full_unstemmed Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
title_short Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
title_sort intrusion detection system can-bus in-vehicle networks based on the statistical characteristics of attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098590/
https://www.ncbi.nlm.nih.gov/pubmed/37050613
http://dx.doi.org/10.3390/s23073554
work_keys_str_mv AT khanjunaid intrusiondetectionsystemcanbusinvehiclenetworksbasedonthestatisticalcharacteristicsofattacks
AT limdaewoon intrusiondetectionsystemcanbusinvehiclenetworksbasedonthestatisticalcharacteristicsofattacks
AT kimyoungsik intrusiondetectionsystemcanbusinvehiclenetworksbasedonthestatisticalcharacteristicsofattacks