Simulation and Detection of Bus-Off Attacks in CAN
This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is validated against existing experiments, demonstrating its accuracy in replicating attack scenarios proposed by Cho et al. [11] and Bloom [2]...
Saved in:
Published in: | 2024 IEEE Intelligent Vehicles Symposium (IV) pp. 3078 - 3084 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
02-06-2024
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is validated against existing experiments, demonstrating its accuracy in replicating attack scenarios proposed by Cho et al. [11] and Bloom [2]. An intrusion detection system (IDS) is evaluated using the Hacking and Countermeasures Research Lab (HCRL) data set, and limitations in detecting WeepingCAN attacks are identified. To address these limitations, an extension to the IDS is proposed that incorporates an error frequency criterion to improve detection accuracy. The extended IDS is evaluated in different environments, demonstrating its effectiveness in reliably distinguishing between normal communications and WeepingCAN attacks. Overall, this work contributes to the understanding and detection of sophisticated attacks on CAN and and offers support to develop and evaluate further detection mechanisms. |
---|---|
AbstractList | This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is validated against existing experiments, demonstrating its accuracy in replicating attack scenarios proposed by Cho et al. [11] and Bloom [2]. An intrusion detection system (IDS) is evaluated using the Hacking and Countermeasures Research Lab (HCRL) data set, and limitations in detecting WeepingCAN attacks are identified. To address these limitations, an extension to the IDS is proposed that incorporates an error frequency criterion to improve detection accuracy. The extended IDS is evaluated in different environments, demonstrating its effectiveness in reliably distinguishing between normal communications and WeepingCAN attacks. Overall, this work contributes to the understanding and detection of sophisticated attacks on CAN and and offers support to develop and evaluate further detection mechanisms. |
Author | Bringmann, Oliver Kropf, Thomas Graser, Heiner Laufenberg, Jo |
Author_xml | – sequence: 1 givenname: Jo surname: Laufenberg fullname: Laufenberg, Jo email: heiner.graser@student.uni-tuebingen.de organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group – sequence: 2 givenname: Heiner surname: Graser fullname: Graser, Heiner email: jo.laufenberg@uni-tuebingen.de organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group – sequence: 3 givenname: Thomas surname: Kropf fullname: Kropf, Thomas email: thomas.kropf@uni-tuebingen.de organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group – sequence: 4 givenname: Oliver surname: Bringmann fullname: Bringmann, Oliver email: oliver.bringmann@uni-tuebingen.de organization: University of Tuebingen,Faculty of Science,Department of Computer Science, Embedded Systems Group |
BookMark | eNqFjrsKwjAUQK-i4Kt_oJAfaM29Tdp09IkuOiiuEmoK0TYVUwf_XhCdnQ6Hs5wBdFztDMAEeYTIs-n2JCXKJCJOIkIulUpE2oIgSzMVSx4LpRDb0KdEUJgSih4MvL9yLiUR9oEOtnqWurG1Y9pd2NI0Jv9YXbD504f7omCzptH5zTPr2GK2G0G30KU3wZdDGK9Xx8UmtMaY8_1hK_14nX8v8Z_8BsZTNxQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/IV55156.2024.10588647 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 9798350348811 |
EISSN | 2642-7214 |
EndPage | 3084 |
ExternalDocumentID | 10588647 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI OCL RIE RIL RNS |
ID | FETCH-ieee_primary_105886473 |
IEDL.DBID | RIE |
IngestDate | Wed Jul 24 06:48:15 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-ieee_primary_105886473 |
ParticipantIDs | ieee_primary_10588647 |
PublicationCentury | 2000 |
PublicationDate | 2024-June-2 |
PublicationDateYYYYMMDD | 2024-06-02 |
PublicationDate_xml | – month: 06 year: 2024 text: 2024-June-2 day: 02 |
PublicationDecade | 2020 |
PublicationTitle | 2024 IEEE Intelligent Vehicles Symposium (IV) |
PublicationTitleAbbrev | IV |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0055221 |
Score | 4.619295 |
Snippet | This work presents a simulation framework for CAN communication including attacks, with a particular focus on bus-off and WeepingCAN attacks. The simulation is... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 3078 |
SubjectTerms | Accuracy Computer crime Intelligent vehicles Intrusion detection Reliability |
Title | Simulation and Detection of Bus-Off Attacks in CAN |
URI | https://ieeexplore.ieee.org/document/10588647 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED6RTrDwCuJRkAdWl9RxYmfsU2UpSEWIrbKdi9QBB9Hk_xO7TQsSDGyWJfusk853sr_vO4D7CGOupdAUGReUqyyiKlUF5RlGElNlUnRs5NlCzN_keOJkcuiOC4OIHnyGPTf0f_l5aWr3VNZEeCJlykUAgcjkhqzVXrtJU0j0txSdfpQ9PL42tUDiQAiM99qFP1qo-AwyPf6n7RMI91w88rzLMqdwgPYMjr7JCJ4DW6zet124iLI5GWPlAVaWlAUZ1mv6VBRkUFWOTk9WlowG8xC608nLaEbdEZYfG8mJZWs9voCOLS1eAnHwT8MLo7k2XGepNFwkiuUxE1Ixpq4g_HWL6z_mb-DQ-crDoFgXOtVnjbcQrPP6zjv6C_t1gUU |
link.rule.ids | 310,311,782,786,791,792,798,27936,54770 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RMgALryAeBTywuqSOEztj6UOpKAGpFWKLnOQidWiCaPL_id2mgAQDm2XJPuuk853s7_sO4M5Gh8dSxBQZF5Qr36bKUxnlPtoSPZV4qNnIwUyEb3I40jI5dMuFQUQDPsOuHpq__LRIKv1UVke4K6XHRQt2XS6EvaZrNRevW5cSvQ1Jp2f795PXuhpwNQyB8W6z9EcTFZNDxof_tH4E1hcbj7xs88wx7GB-AgffhARPgc0Wy00fLqLylAyxNBCrnBQZeahW9DnLSL8sNaGeLHIy6IcWdMaj-SCg-gjR-1p0ImqsO2fQzoscz4FoAGjCsyTmccJj35MJF65iqcOEVIypC7B-3eLyj_lb2AvmT9NoOgkfr2Bf-82AolgH2uVHhdfQWqXVjXH6J_Y6hJA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+IEEE+Intelligent+Vehicles+Symposium+%28IV%29&rft.atitle=Simulation+and+Detection+of+Bus-Off+Attacks+in+CAN&rft.au=Laufenberg%2C+Jo&rft.au=Graser%2C+Heiner&rft.au=Kropf%2C+Thomas&rft.au=Bringmann%2C+Oliver&rft.date=2024-06-02&rft.pub=IEEE&rft.eissn=2642-7214&rft.spage=3078&rft.epage=3084&rft_id=info:doi/10.1109%2FIV55156.2024.10588647&rft.externalDocID=10588647 |