CAN bus flood attack detection based on communication characteristics

CAN has become the most extensive fieldbus for contemporary automotive applications due to its outstanding reliability and flexibility.However,the standard CAN protocol does not provide sufficient security measures and is vulnerable to eavesdropping,replay,flooding,and denial of service attacks.In o...

Full description

Saved in:
Bibliographic Details
Main Authors: Yimu JI, Zhipeng JIAO, Shangdong LIU, Fei WU, Jing SUN, Na WANG, Zhiyu CHEN, Qiang BI, Penghao TIAN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020005
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:CAN has become the most extensive fieldbus for contemporary automotive applications due to its outstanding reliability and flexibility.However,the standard CAN protocol does not provide sufficient security measures and is vulnerable to eavesdropping,replay,flooding,and denial of service attacks.In order to effectively detect whether the CAN bus is attacked,and to filter malicious messages when subjected to flooding attacks.The characteristics of vehicle CAN bus message communication were analyzed,and an intrusion detection method was proposed,which could effectively perform intrusion detection and malicious message filtering.Through experimental verification,the method can detect whether the CAN bus is attacked by 100%,and the accuracy of malicious packet filtering can reach over 99%.
ISSN:2096-109X