Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN)

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Seyoung-
dc.contributor.authorJo, Hyo Jin-
dc.contributor.authorCho, Aram-
dc.contributor.authorLee, Dong Hoon-
dc.contributor.authorChoi, Wonsuk-
dc.date.accessioned2022-08-15T05:40:28Z-
dc.date.available2022-08-15T05:40:28Z-
dc.date.created2022-08-12-
dc.date.issued2022-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/143235-
dc.description.abstractModern vehicles are becoming complex cyber-physical systems equipped with numerous electronic control units (ECUs). Over the controller area network (CAN), these ECUs communicate with each other to share information related to vehicle status as well as commands to efficiently control the vehicle. However, the increasing complexity of modern vehicles has inadvertently expanded potential attack surfaces, making them vulnerable to cyber attacks. In light of this, researchers are currently working to demonstrate remote vehicle maneuvering by compromising ECUs, and as a countermeasure to such malicious manipulation, to study automotive intrusion detection systems (IDSs) as potential remedies. In general, CAN messages are transmitted periodically, and as such, many researchers have relied on frequency-based IDSs in their solutions proposals. However, an attacker can bypass this defense by suspending the communication of the target ECU from the network and injecting malicious messages with the same frequency as the suspended messages. As a result, an attacker is able to masquerade as the original transmission frequency. In this paper, we propose a Transmission-resuming Time-based IDS (TTIDS), which is designed to detect such attacks. TTIDS detects when an ECU periodically transmitting messages is suspended, and then it estimates when the suspended ECU resumes periodic transmission. With this projection, TTIDS detects malicious messages transmitted while the ECU is suspended. We conduct the evaluation of TTIDS on two real vehicles and present the results, which show the TTIDS is able to effectively detect an enhanced attack that bypasses existing frequency-based IDSs with a false positive rate of 0.213% and a false negative rate of 0.027%.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectAUTHENTICATION-
dc.titleTTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN)-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1109/ACCESS.2022.3174356-
dc.identifier.scopusid2-s2.0-85131286385-
dc.identifier.wosid000798484400001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.10, pp.52139 - 52153-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume10-
dc.citation.startPage52139-
dc.citation.endPage52153-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusAUTHENTICATION-
dc.subject.keywordAuthorPayloads-
dc.subject.keywordAuthorAutomotive engineering-
dc.subject.keywordAuthorProcessor scheduling-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorStandards-
dc.subject.keywordAuthorSoftware-
dc.subject.keywordAuthorHardware-
dc.subject.keywordAuthorAutomotive security-
dc.subject.keywordAuthorcontroller area network (CAN)-
dc.subject.keywordAuthorelectronic control unit (ECU)-
dc.subject.keywordAuthorintrusion detection system (IDS)-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE