skip to main content
10.1145/3309171.3309179acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article
Open Access

Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes

Published:13 March 2019Publication History

ABSTRACT

The modern automobile relies on numerous electronic control units communicating over the de facto standard of the controller area network (CAN) bus. This communication network was not developed with cybersecurity in mind. Many methods based on constant time intervals between messages have been proposed to address this lack of security issue with the CAN bus. However, these existing methods may struggle to handle variable time intervals between messages during transitions of vehicle driving modes. This paper proposes a simple and cost-effective method to ensure the security of the CAN bus that is based on constant message frequencies across vehicle driving modes. This proposed method does not require any modifications on the existing CAN bus and it is designed with the intent for efficient execution in platforms with very limited computational resources. Test results with the proposed method against two different vehicles and a frequency domain analysis are also presented in the paper.

References

  1. Paul Carsten, Todd R Andel, Mark Yampolskiy, and Jeffrey T McDonald. 2015. In-vehicle networks: Attacks, vulnerabilities, and proposed solutions. In Proc. of the 10th Annual Cyber and Information Security Research Conference . Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Robert Charette. 2009. This car runs on code. IEEE Spectrum , Vol. 46, 3 (2009).Google ScholarGoogle Scholar
  3. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces.. In Proc. of USENIX Security Symposium . Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Tobias Hoppe, Stefan Kiltz, and Jana Dittmann. 2008. Security Threats to Automotive CAN Networks -- Practical Examples and Selected Short-Term Countermeasures. In Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP '08). Springer-Verlag, Berlin, Heidelberg, 235--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Min-Joo Kang and Jewon Kang. 2016. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security. In PloS one .Google ScholarGoogle Scholar
  6. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, and Hovav Shacham. 2010. Experimental security analysis of a modern automobile. In Proc. of IEEE Symposium on Security and Privacy (SP) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Moti Markovitz and Avishai Wool. 2017. Field classification, modeling and anomaly detection in unknown CAN bus networks. Vehicular Communications , Vol. 9 (2017), 43--52.Google ScholarGoogle ScholarCross RefCross Ref
  8. Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. BlackHat USA.Google ScholarGoogle Scholar
  9. Michael R. Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, and Stacy J. Prowell. 2017. Modeling Inter-signal Arrival Times for Accurate Detection of CAN Bus Signal Injection Attacks: A Data-driven Approach to In-vehicle Intrusion Detection. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (CISRC '17). ACM, New York, NY, USA, Article 11, bibinfonumpages4 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Habeeb Olufowobi, Gedare Bloom, Clinton Young, and Joseph Zambreno. 2018. Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network. In Real-Time Systems Symposium (RTSS). IEEE.Google ScholarGoogle Scholar
  11. Eunbi Seo, Hyun Min Song, and Huy Kang Kim. 2018. GIDS: GAN based Intrusion Detection System for In-Vehicle Network. 16th Annual Conference on Privacy, Security and Trust (PST) (2018), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  12. Hyun Min Song, Ha Rang Kim, and Huy Kang Kim. 2016. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In Proc. of International Conference on Information Networking (ICOIN) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Bowen Zheng, W. Li, P. Deng, L. Gérardy, Q. Zhu, and N. Shankar. 2015. Design and verification for transportation system security. In Proc. of Design Automation Conference (DAC) . Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      AutoSec '19: Proceedings of the ACM Workshop on Automotive Cybersecurity
      March 2019
      55 pages
      ISBN:9781450361804
      DOI:10.1145/3309171
      • Program Chairs:
      • Ziming Zhao,
      • Qi Alfred Chen,
      • Gail-Joon Ahn

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 March 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Upcoming Conference

      CODASPY '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader