193.174.19.232Abstract: G. Baldini (2022)

Computer Communications, 191, 486–499p. (2022) DOI:10.1016/j.comcom.2022.05.021

Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis

G. Baldini

Cybersecurity aspects in modern automotive vehicles are becoming increasingly important due to the recent demonstration of successful cybersecurity attacks. Intrusion Detection System (IDS) is one of the approaches proposed in the research literature to detect such attacks. This paper proposes a novel IDS approach based on the application of Recurrence Quantification Analysis (RQA), in combination with a sliding window, to the information of the CAN-bus message arrival time, which has the benefit of not requiring the processing of the arbitration field or the payload data of the CAN-bus message. The rationale for the application of RQA to this problem is to consider the in-vehicle network as a dynamic system where the CAN-bus message time is used as an observable. This approach is evaluated with various machine learning algorithms on two public data sets recently published by the research community with a focus on spoofing attacks since they are the most difficult to detect. The proposed approach is compared with the application of entropy measures for attack detection, which are commonly adopted in the literature and with the results from the literature on the same data sets. The results show that the RQA based approach provides a better detection accuracy than entropy measures in a consistent way across different sliding window sizes in both data sets and it is competitive against other approaches in the literature. This paper provides also an extensive evaluation of the impact on detection accuracy of the sliding window size and the hyper-parameters present in the definition of RQA and the machine learning algorithms.

back


Creative Commons License © 2024 SOME RIGHTS RESERVED
The content of this web site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.0 Germany License.

Please note: The abstracts of the bibliography database may underly other copyrights.

Ihr Browser versucht gerade eine Seite aus dem sogenannten Internet auszudrucken. Das Internet ist ein weltweites Netzwerk von Computern, das den Menschen ganz neue Möglichkeiten der Kommunikation bietet.

Da Politiker im Regelfall von neuen Dingen nichts verstehen, halten wir es für notwendig, sie davor zu schützen. Dies ist im beidseitigen Interesse, da unnötige Angstzustände bei Ihnen verhindert werden, ebenso wie es uns vor profilierungs- und machtsüchtigen Politikern schützt.

Sollten Sie der Meinung sein, dass Sie diese Internetseite dennoch sehen sollten, so können Sie jederzeit durch normalen Gebrauch eines Internetbrowsers darauf zugreifen. Dazu sind aber minimale Computerkenntnisse erforderlich. Sollten Sie diese nicht haben, vergessen Sie einfach dieses Internet und lassen uns in Ruhe.

Die Umgehung dieser Ausdrucksperre ist nach §95a UrhG verboten.

Mehr Informationen unter www.politiker-stopp.de.