Simulation and Detection of Bus-Off Attacks in CAN

This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is validated against existing experiments, demonstrating its accuracy in replicating attack scenarios proposed by Cho et al. [11] and Bloom [2]...

Full description

Saved in:
Bibliographic Details
Published in:2024 IEEE Intelligent Vehicles Symposium (IV) pp. 3078 - 3084
Main Authors: Laufenberg, Jo, Graser, Heiner, Kropf, Thomas, Bringmann, Oliver
Format: Conference Proceeding
Language:English
Published: IEEE 02-06-2024
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is validated against existing experiments, demonstrating its accuracy in replicating attack scenarios proposed by Cho et al. [11] and Bloom [2]. An intrusion detection system (IDS) is evaluated using the Hacking and Countermeasures Research Lab (HCRL) data set, and limitations in detecting WeepingCAN attacks are identified. To address these limitations, an extension to the IDS is proposed that incorporates an error frequency criterion to improve detection accuracy. The extended IDS is evaluated in different environments, demonstrating its effectiveness in reliably distinguishing between normal communications and WeepingCAN attacks. Overall, this work contributes to the understanding and detection of sophisticated attacks on CAN and and offers support to develop and evaluate further detection mechanisms.
AbstractList This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is validated against existing experiments, demonstrating its accuracy in replicating attack scenarios proposed by Cho et al. [11] and Bloom [2]. An intrusion detection system (IDS) is evaluated using the Hacking and Countermeasures Research Lab (HCRL) data set, and limitations in detecting WeepingCAN attacks are identified. To address these limitations, an extension to the IDS is proposed that incorporates an error frequency criterion to improve detection accuracy. The extended IDS is evaluated in different environments, demonstrating its effectiveness in reliably distinguishing between normal communications and WeepingCAN attacks. Overall, this work contributes to the understanding and detection of sophisticated attacks on CAN and and offers support to develop and evaluate further detection mechanisms.
Author Bringmann, Oliver
Kropf, Thomas
Graser, Heiner
Laufenberg, Jo
Author_xml – sequence: 1
  givenname: Jo
  surname: Laufenberg
  fullname: Laufenberg, Jo
  email: heiner.graser@student.uni-tuebingen.de
  organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group
– sequence: 2
  givenname: Heiner
  surname: Graser
  fullname: Graser, Heiner
  email: jo.laufenberg@uni-tuebingen.de
  organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group
– sequence: 3
  givenname: Thomas
  surname: Kropf
  fullname: Kropf, Thomas
  email: thomas.kropf@uni-tuebingen.de
  organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group
– sequence: 4
  givenname: Oliver
  surname: Bringmann
  fullname: Bringmann, Oliver
  email: oliver.bringmann@uni-tuebingen.de
  organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group
BookMark eNqFjrsKwjAUQK-i4Kt_oJAfaM29Tdp09IkuOiiuEmoK0TYVUwf_XhCdnQ6Hs5wBdFztDMAEeYTIs-n2JCXKJCJOIkIulUpE2oIgSzMVSx4LpRDb0KdEUJgSih4MvL9yLiUR9oEOtnqWurG1Y9pd2NI0Jv9YXbD504f7omCzptH5zTPr2GK2G0G30KU3wZdDGK9Xx8UmtMaY8_1hK_14nX8v8Z_8BsZTNxQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IV55156.2024.10588647
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9798350348811
EISSN 2642-7214
EndPage 3084
ExternalDocumentID 10588647
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-ieee_primary_105886473
IEDL.DBID RIE
IngestDate Wed Jul 24 06:48:15 EDT 2024
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-ieee_primary_105886473
ParticipantIDs ieee_primary_10588647
PublicationCentury 2000
PublicationDate 2024-June-2
PublicationDateYYYYMMDD 2024-06-02
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-June-2
  day: 02
PublicationDecade 2020
PublicationTitle 2024 IEEE Intelligent Vehicles Symposium (IV)
PublicationTitleAbbrev IV
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0055221
Score 4.619295
Snippet This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is...
SourceID ieee
SourceType Publisher
StartPage 3078
SubjectTerms Accuracy
Computer crime
Intelligent vehicles
Intrusion detection
Reliability
Title Simulation and Detection of Bus-Off Attacks in CAN
URI https://ieeexplore.ieee.org/document/10588647
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED6RTrDwCuJRkAdWl9RxYmfsU2UpSEWIrbKdi9QBB9Hk_xO7TQsSDGyWJfusk853sr_vO4D7CGOupdAUGReUqyyiKlUF5RlGElNlUnRs5NlCzN_keOJkcuiOC4OIHnyGPTf0f_l5aWr3VNZEeCJlykUAgcjkhqzVXrtJU0j0txSdfpQ9PL42tUDiQAiM99qFP1qo-AwyPf6n7RMI91w88rzLMqdwgPYMjr7JCJ4DW6zet124iLI5GWPlAVaWlAUZ1mv6VBRkUFWOTk9WlowG8xC608nLaEbdEZYfG8mJZWs9voCOLS1eAnHwT8MLo7k2XGepNFwkiuUxE1Ixpq4g_HWL6z_mb-DQ-crDoFgXOtVnjbcQrPP6zjv6C_t1gUU
link.rule.ids 310,311,782,786,791,792,798,27936,54770
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RMgALryAeBTywuqSOEztj6UOpKAGpFWKLnOQidWiCaPL_id2mgAQDm2XJPuuk853s7_sO4M5Gh8dSxBQZF5Qr36bKUxnlPtoSPZV4qNnIwUyEb3I40jI5dMuFQUQDPsOuHpq__LRIKv1UVke4K6XHRQt2XS6EvaZrNRevW5cSvQ1Jp2f795PXuhpwNQyB8W6z9EcTFZNDxof_tH4E1hcbj7xs88wx7GB-AgffhARPgc0Wy00fLqLylAyxNBCrnBQZeahW9DnLSL8sNaGeLHIy6IcWdMaj-SCg-gjR-1p0ImqsO2fQzoscz4FoAGjCsyTmccJj35MJF65iqcOEVIypC7B-3eLyj_lb2AvmT9NoOgkfr2Bf-82AolgH2uVHhdfQWqXVjXH6J_Y6hJA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+IEEE+Intelligent+Vehicles+Symposium+%28IV%29&rft.atitle=Simulation+and+Detection+of+Bus-Off+Attacks+in+CAN&rft.au=Laufenberg%2C+Jo&rft.au=Graser%2C+Heiner&rft.au=Kropf%2C+Thomas&rft.au=Bringmann%2C+Oliver&rft.date=2024-06-02&rft.pub=IEEE&rft.eissn=2642-7214&rft.spage=3078&rft.epage=3084&rft_id=info:doi/10.1109%2FIV55156.2024.10588647&rft.externalDocID=10588647