Cargando…
Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle ne...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098590/ https://www.ncbi.nlm.nih.gov/pubmed/37050613 http://dx.doi.org/10.3390/s23073554 |
_version_ | 1785024846642544640 |
---|---|
author | Khan, Junaid Lim, Dae-Woon Kim, Young-Sik |
author_facet | Khan, Junaid Lim, Dae-Woon Kim, Young-Sik |
author_sort | Khan, Junaid |
collection | PubMed |
description | For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle network anomalies. The statistical characteristics of attacks provide valuable information about the inherent intrusion patterns and behaviors. We employed two real-world attack scenarios from publicly available datasets to record a real-time response against intrusions with increased precision for in-vehicle network environments. Our proposed IDS can exploit malicious patterns by calculating thresholds and using the statistical properties of attacks, making attack detection more efficient. The optimized threshold value is calculated using brute-force optimization for various window sizes to minimize the total error. The reference values of normality require a few legitimate data frames for effective intrusion detection. The experimental findings validate that our suggested method can efficiently detect fuzzy, merge, and denial-of-service (DoS) attacks with low false-positive rates. It is also demonstrated that the total error decreases with an increasing attack rate for varying window sizes. The results indicate that our proposed IDS minimizes the misclassification rate and is hence better suited for in-vehicle networks. |
format | Online Article Text |
id | pubmed-10098590 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100985902023-04-14 Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks Khan, Junaid Lim, Dae-Woon Kim, Young-Sik Sensors (Basel) Article For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle network anomalies. The statistical characteristics of attacks provide valuable information about the inherent intrusion patterns and behaviors. We employed two real-world attack scenarios from publicly available datasets to record a real-time response against intrusions with increased precision for in-vehicle network environments. Our proposed IDS can exploit malicious patterns by calculating thresholds and using the statistical properties of attacks, making attack detection more efficient. The optimized threshold value is calculated using brute-force optimization for various window sizes to minimize the total error. The reference values of normality require a few legitimate data frames for effective intrusion detection. The experimental findings validate that our suggested method can efficiently detect fuzzy, merge, and denial-of-service (DoS) attacks with low false-positive rates. It is also demonstrated that the total error decreases with an increasing attack rate for varying window sizes. The results indicate that our proposed IDS minimizes the misclassification rate and is hence better suited for in-vehicle networks. MDPI 2023-03-28 /pmc/articles/PMC10098590/ /pubmed/37050613 http://dx.doi.org/10.3390/s23073554 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Khan, Junaid Lim, Dae-Woon Kim, Young-Sik Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks |
title | Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks |
title_full | Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks |
title_fullStr | Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks |
title_full_unstemmed | Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks |
title_short | Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks |
title_sort | intrusion detection system can-bus in-vehicle networks based on the statistical characteristics of attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098590/ https://www.ncbi.nlm.nih.gov/pubmed/37050613 http://dx.doi.org/10.3390/s23073554 |
work_keys_str_mv | AT khanjunaid intrusiondetectionsystemcanbusinvehiclenetworksbasedonthestatisticalcharacteristicsofattacks AT limdaewoon intrusiondetectionsystemcanbusinvehiclenetworksbasedonthestatisticalcharacteristicsofattacks AT kimyoungsik intrusiondetectionsystemcanbusinvehiclenetworksbasedonthestatisticalcharacteristicsofattacks |