On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus

dc.contributor.author ben Othmane, Lotfi
dc.contributor.author Dhulipala, Lalitha
dc.contributor.author Multari, Nicholas
dc.contributor.author Govindarasu, Manimaran
dc.contributor.author Ben Othmane, Lotfi
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2020-04-30T23:21:36.000
dc.date.accessioned 2020-06-30T02:03:08Z
dc.date.available 2020-06-30T02:03:08Z
dc.date.copyright Wed Jan 01 00:00:00 UTC 2020
dc.date.issued 2020-04-23
dc.description.abstract <p>There have been several public demonstrations of attacks on connected vehicles showing the ability of an attacker to take control of a targeted vehicle by injecting messages into their CAN bus. In this paper, using injected speed reading and RPM reading messages in in-motion vehicle, we examine the ability of the Pearson correlation and the unsupervised learning methods k-means clustering and HMM to differentiate 'no-attack' and 'under-attack' states of the given vehicle. We found that the Pearson correlation distinguishes the two states, the k-means clustering method has an acceptable accuracy but high false positive rate and HMM detects attacks with acceptable detection rate but has a high false positive in detecting attacks from speed readings when there is no attack. The accuracy of these unsupervised learning methods are comparable to the ones of the supervised learning methods used by CAN bus IDS suppliers. In addition, the paper shows that studying CAN anomaly detection techniques using off-vehicle test facilities may not properly evaluate the performance of the detection techniques. The results suggest using other features besides the data content of the CAN messages and integrate knowledge about how the ECU collaborate in building effective techniques for the detection of injection of fabricated message attacks.</p>
dc.description.comments <p>This is a manuscript of an article published as ben Othmane, Lotfi, Lalitha Dhulipala, Nicholas Multari, and Manimaran Govindarasu. "On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus."<em> IEEE Transactions on Dependable and Secure Computing </em>(2020). DOI: <a href="https://doi.org/10.1109/TDSC.2020.2990192" target="_blank">10.1109/TDSC.2020.2990192</a>. Posted with permission.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/ece_pubs/247/
dc.identifier.articleid 1251
dc.identifier.contextkey 17577689
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath ece_pubs/247
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/21077
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/ece_pubs/247/2020_benOthameLotfi_PerformanceDetecting.pdf|||Fri Jan 14 22:54:34 UTC 2022
dc.source.uri 10.1109/TDSC.2020.2990192
dc.subject.disciplines Systems and Communications
dc.title On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus
dc.type article
dc.type.genre article
dspace.entity.type Publication
relation.isAuthorOfPublication f9016a06-26bf-4947-a6f9-f529ccbb8f2a
relation.isAuthorOfPublication 0e086bfc-15b0-453d-8ea4-6a78df07b01b
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2020_benOthameLotfi_PerformanceDetecting.pdf
Size:
3.65 MB
Format:
Adobe Portable Document Format
Description:
Collections