Anomaly intrusion detection method for vehicular networks based on survival analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Han, Mee Lan | - |
dc.contributor.author | Kwak, Byung Il | - |
dc.contributor.author | Kim, Huy Kang | - |
dc.date.accessioned | 2021-09-02T06:12:17Z | - |
dc.date.available | 2021-09-02T06:12:17Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2018-10 | - |
dc.identifier.issn | 2214-2096 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/73041 | - |
dc.description.abstract | In recent years, alongside with the convergence of In-vehicle network (IVN) and wireless communication technology, vehicle communication technology has been steadily progressing. Furthermore, communication with various external networks-such as cloud, vehicle-to-vehicle (V2V), and vehicle-to-infrastructure (V2I) communication networks-further reinforces the connectivity between the inside and outside of a vehicle. On the contrary, this means that the functions of existing vehicles using computer-assisted mechanical mechanisms can be manipulated and controlled by a malicious packet attack. Therefore, diversified and advanced architectures of vehicle systems can significantly increase the accessibility of the system to hackers and the possibility of an attack. This paper proposes an intrusion detection method for vehicular networks based on the survival analysis model. Our main aims were to identify malicious CAN messages and accurately detect the normality and abnormality of a vehicle network without semantic knowledge of the CAN ID function. To this end, normal and abnormal driving data were extracted from three different types of vehicles and we evaluated the performance of our proposed method by measuring the accuracy and the time complexity of anomaly detection by considering three attack scenarios and the periodic characteristics of CAN IDs. Based on the results, we concluded that a CAN ID with a long cycle affects the detection accuracy and the number of CAN IDs affects the detection speed. The difference in the detection accuracy between applying all CAN IDs and CAN IDs with a short cycle is not considerable with some differences observed in the detection accuracy depending on the chunk size and the specific attack type. High detection accuracy and low computational cost will be the essential factors for realtime processing of IVN security. Taken together, the results of the present study contribute to the current understanding of how to correctly manage vehicle communications for vehicle security and driver safety. (C) 2018 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.subject | SECURITY | - |
dc.title | Anomaly intrusion detection method for vehicular networks based on survival analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Huy Kang | - |
dc.identifier.doi | 10.1016/j.vehcom.2018.09.004 | - |
dc.identifier.scopusid | 2-s2.0-85054427614 | - |
dc.identifier.wosid | 000451244600005 | - |
dc.identifier.bibliographicCitation | VEHICULAR COMMUNICATIONS, v.14, pp.52 - 63 | - |
dc.relation.isPartOf | VEHICULAR COMMUNICATIONS | - |
dc.citation.title | VEHICULAR COMMUNICATIONS | - |
dc.citation.volume | 14 | - |
dc.citation.startPage | 52 | - |
dc.citation.endPage | 63 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalResearchArea | Transportation | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Transportation Science & Technology | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | In-vehicle network | - |
dc.subject.keywordAuthor | Anomaly detection | - |
dc.subject.keywordAuthor | Intrusion detection | - |
dc.subject.keywordAuthor | Survival analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.