Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

CAN-ADF: The controller area network attack detection framework

Full metadata record
DC Field Value Language
dc.contributor.authorTariq, Shahroz-
dc.contributor.authorLee, Sangyup-
dc.contributor.authorKim, Huy Kang-
dc.contributor.authorWoo, Simon S.-
dc.date.accessioned2021-08-30T20:31:05Z-
dc.date.available2021-08-30T20:31:05Z-
dc.date.created2021-06-18-
dc.date.issued2020-07-
dc.identifier.issn0167-4048-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/54922-
dc.description.abstractIn recent years, there has been significant interest in developing autonomous vehicles such as self-driving cars. In-vehicle communications, due to simplicity and reliability, a Controller Area Network (CAN) bus is widely used as the de facto standard to provide serial communications between Electronic Control Units (ECUs). However, prior research reveals that several network-level attacks can be performed due to the lack of defense mechanisms in the CAN bus. In this work, we propose CAN Bus Message Attack Detection Framework (CAN-ADF) - a comprehensive anomaly generation, detection, and evaluation system for a CAN bus. In CAN-ADF, not only various anomalies and attack characteristics can be configured but also different detection methods, and visualization frameworks are provided to effectively detect those attacks and anomalies. For the detector, we employ both a rule-based approach crafted from dynamic network traffic characteristics and Recurrent Neural Networks (RNN). For evaluation, we use 7,875,791 in-vehicle CAN packets collected from real cars, KIA Soul and Hyundai Sonata. Our detection algorithm achieves accurate intrusion detection performance, with an average accuracy of 99.45% on CAN datasets, outperforming prior approach. Furthermore, we developed a visualization tool to validate the detection of anomalies by CAN-ADF and to find new patterns in the dataset. (C) 2020 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.subjectRECURRENT NEURAL-NETWORKS-
dc.subjectPRACTICAL EXAMPLES-
dc.subjectSECURITY THREATS-
dc.titleCAN-ADF: The controller area network attack detection framework-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.identifier.doi10.1016/j.cose.2020.101857-
dc.identifier.scopusid2-s2.0-85089239061-
dc.identifier.wosid000536764600005-
dc.identifier.bibliographicCitationCOMPUTERS & SECURITY, v.94-
dc.relation.isPartOfCOMPUTERS & SECURITY-
dc.citation.titleCOMPUTERS & SECURITY-
dc.citation.volume94-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusRECURRENT NEURAL-NETWORKS-
dc.subject.keywordPlusPRACTICAL EXAMPLES-
dc.subject.keywordPlusSECURITY THREATS-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorSecurity and privacy-
dc.subject.keywordAuthorRecurrent neural network-
dc.subject.keywordAuthorController area network-
dc.subject.keywordAuthorIn-Vehicle network-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE