{"title":"基于can总线的网络攻击检测两步算法:网联汽车的初步案例研究","authors":"Marco Lombardi, F. Pascale, D. Santaniello","doi":"10.1115/1.4052823","DOIUrl":null,"url":null,"abstract":"\n Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to Everything' (V2X), which indicates a system of communication between a vehicle to any entity that may influence the vehicle and vice versa. However, it introduces problems regarding the vehicle's IT security. It is possible, for example, by tampering with one of the Electronic Control Units (ECUs) to take partial or total control of the vehicle. In this paper, we introduce a preliminary study case to guarantee cybersecurity inside connected vehicles. In particular, an Intrusion Detection System over the CAN-Bus to allow the possible malicious massages. In particular, through the use of a two-step detection algorithm that exploits both the variation of the status parameters of the various ECUs over time and the Bayesian networks can identify a possible attack. The first experimental results seem encouraging.","PeriodicalId":44694,"journal":{"name":"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering","volume":"4 1","pages":""},"PeriodicalIF":1.8000,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Two-Step Algorithm to Detect Cyber-Attack Over the Can-Bus: A Preliminary Case Study in Connected Vehicles\",\"authors\":\"Marco Lombardi, F. Pascale, D. Santaniello\",\"doi\":\"10.1115/1.4052823\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to Everything' (V2X), which indicates a system of communication between a vehicle to any entity that may influence the vehicle and vice versa. However, it introduces problems regarding the vehicle's IT security. It is possible, for example, by tampering with one of the Electronic Control Units (ECUs) to take partial or total control of the vehicle. In this paper, we introduce a preliminary study case to guarantee cybersecurity inside connected vehicles. In particular, an Intrusion Detection System over the CAN-Bus to allow the possible malicious massages. In particular, through the use of a two-step detection algorithm that exploits both the variation of the status parameters of the various ECUs over time and the Bayesian networks can identify a possible attack. The first experimental results seem encouraging.\",\"PeriodicalId\":44694,\"journal\":{\"name\":\"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering\",\"volume\":\"4 1\",\"pages\":\"\"},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2021-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1115/1.4052823\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems Part B-Mechanical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1115/1.4052823","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
Two-Step Algorithm to Detect Cyber-Attack Over the Can-Bus: A Preliminary Case Study in Connected Vehicles
Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to Everything' (V2X), which indicates a system of communication between a vehicle to any entity that may influence the vehicle and vice versa. However, it introduces problems regarding the vehicle's IT security. It is possible, for example, by tampering with one of the Electronic Control Units (ECUs) to take partial or total control of the vehicle. In this paper, we introduce a preliminary study case to guarantee cybersecurity inside connected vehicles. In particular, an Intrusion Detection System over the CAN-Bus to allow the possible malicious massages. In particular, through the use of a two-step detection algorithm that exploits both the variation of the status parameters of the various ECUs over time and the Bayesian networks can identify a possible attack. The first experimental results seem encouraging.