Categories: Uncategorized

CAR-HACKING Analysis – Essay Help Services

Description

Car-Hacking Dataset (hksecurity.net) in the link the dataset  I need more studies about the topic  my objective to detect the message if it is normal or not normal if it is not normal what kind it is using machine learning (SVM) I need background and related work in the literature review

Don't use plagiarized sources. Get Your Custom Essay on
CAR-HACKING Analysis – Essay Help Services
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT! Just from $10/Page
Order Essay

99Cyberattacks and Countermeasures for In-Vehicle NetworksEMAD ALIWA,Cardiff University, UKOMER RANA,Cardiff University, UKCHARITH PERERA,Cardiff University, UKPETER BURNAP,Cardiff University, UKAs connectivity between and within vehicles increases, so does concern about safety and security. Variousautomotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local InterconnectNetwork (LIN) and FlexRay. CAN Bus is the most used in-vehicle network protocol to support exchange ofvehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms bydesign and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made theCAN Bus not only vulnerable from within the vehicle but also from outside. With the rise of connected cars,more entry points and interfaces have been introduced on board vehicles, thereby also leading to a widerpotential attack surface. Existing security mechanisms focus on the use of encryption, authentication andvehicle Intrusion Detection Systems (IDS), which operate under various constrains such as low bandwidth,small frame size (e.g. in the CAN protocol), limited availability of computational resources and real-timesensitivity. We survey and classify current cryptographic and IDS approaches and compare these approachesbased on criteria such as real time constrains, types of hardware used, changes in CAN Bus behaviour, typesof attack mitigation and software/ hardware used to validate these approaches. We conclude with mitigationstrategies limitations and research challenges for the future.CCS Concepts:•Security and privacy;Additional Key Words and Phrases:CAN Bus, Cybersecurity, Intrusion Detection SystemsACM Reference Format:Emad Aliwa, Omer Rana, Charith Perera, and Peter Burnap. 9999. Cyberattacks and Countermeasures forIn-Vehicle Networks.ACM Comput. Surv.9, 9, Article 99 (September 9999), 36 pages. https://doi.org/10.1145/1122445.11224561 INTRODUCTIONIn recent years, vehicles have become more connected (to other vehicles – referred to as Vehicle-2-Vehicle (V2V) and external infrastructure – referred to as Vehicle-2-Infrastructure (V2I)) andthe cyberattack surface for these vehicles continues to increase. Cyberattacks have also becomea real concern for vehicle manufacturers, especially where services need to be supported usingnetworks outside a vehicle. These services can include Global Positioning Systems (GPS), On-BoardDiagnostic (OBD-2) based cellular dongles and entertainment services. As a result, vehicles arenow more vulnerable to attacks not only from inside but also from outside the vehicle. For instance,recent report has indicated that two famous connected cars are vulnerable to cyberattacks [141]. AsAuthors’ addresses: Emad Aliwa, aliwaem@cardiff.ac.uk, Cardiff University, UK, 5 The Parade, Cardiff, UK, CF24 3AA;Omer Rana, ranaof@cardiff.ac.uk, Cardiff University, UK; Charith Perera, pererac@cardiff.ac.uk, Cardiff University, UK;Peter Burnap, burnapp@cardiff.ac.uk, Cardiff University, UK.Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without feeprovided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice andthe full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requiresprior specific permission and/or a fee. Request permissions from permissions@acm.org.©2018 Association for Computing Machinery.0360-0300/9999/9-ART99 $15.00https://doi.org/10.1145/1122445.1122456ACM Comput. Surv., Vol. 9, No. 9, Article 99. Publication date: September 9999.

99:2Aliwa, et al.potential cyberattacks on vehicles have widened, more vulnerabilities and entry points have beendiscovered – generally grouped under: direct interfaces-initiated attacks, infotainment-initiatedattacks, telematics-initiated attacks and sensor-initiated attacks. This raises the need for bettersecurity mechanisms. Due to lack of suitable security support in the Controller Area Network(CAN) protocol itself, mechanisms to secure communications between components within a vehicleis also limited. Attacks such as CAN Bus Denial of Service (DoS) and bus injection attacks arecommon [27]. CAN Bus security limitations have been investigated by various researchers overboth laboratory-based environments and in real vehicles. The attacks demonstrate how attackersare able to successfully take control of various parts of a vehicle, such as brakes, lights, steeringand gears [23]. Such attacks and malicious data on the CAN Bus was generated from both on-boardthe vehicle and at remote locations.Serial protocols are used for in-vehicle networks to exchange parameters between ElectronicControl Units (ECUs) and sensors. These protocols lack security mechanisms by design and are thusvulnerable to various attacks. Researchers have also shown how to attack vehicles from within avehicle using direct interfaces and infotainment systems via the On-Board Diagnostics port (OBD-2),USB and CD player and from outside the vehicle using medium and long distance communicationsuch as Wi-Fi, Bluetooth, mobile (phone) networks, and sensors signals such as keyless fob attacksand tyre pressure monitoring system sensors. These attacks have widened the potential attackentry points within a connected vehicle – suggesting the importance of protecting the CAN Bus.To ensure focus, this survey does not cover a number of other related topics such as: drivingbehaviour, unauthorised drivers, software defined/updated ECUs and Blockchain for vehicularsecurity. Table 1 provides a comparison between this survey paper and other papers coveringvehicular security.CoverageOther PapersThis PaperFocus on In Vehicle Network security (IVN)[43, 46, 62, 90, 129, 161]✓Analysis of existing cryptographic methods for securing IVNs[62, 90]✓Analysis of existing IDS methods for securing IVNs[43, 62, 90]✓Introducing countermeasure & architecture for vehicles security[90, 129, 161]Limitation with current CAN Bus countermeasures✓Datasets, software and hardware used✓Table 1. Related Survey Papers on Vehicular Networks SecurityThis survey provides the following contributions: (i) description of in-vehicle serial bus protocols(particularly the CAN Bus); (ii) evaluation of current cryptographic and IDS approaches usedfor protecting vehicular data; (iii) comparison and assessment of current mitigation strategiesto protect vehicles against cyberattacks; (iv) challenges and potential future research directionsfor in-vehicular cybersecurity. The rest of this paper is structured as follows: Section 2 providesan introduction to serial data exchange protocols within a vehicle, outlining key concepts andterminology, and providing the context for the rest of this paper. In Section 3 the CAN Bus protocoland architecture along with hardware and software used inside vehicles utilising the CAN Busis described. In Section 4 we describe the connected car infrastructure, including various ECUsand sensors that can be used inside a vehicle. In Section 5 attacks initiated using data interfaces,telematics, infotainment and sensor entry points and how such attacks can be generated aredescribed. In Section 6, we review security mechanisms to secure the CAN Bus, which includeencryption, message authentication and vehicular Intrusion Detection Systems (IDS). We evaluateexisting approaches based on criteria such as real time data requirements, the types of networkACM Comput. Surv., Vol. 9, No. 9, Article 99. Publication date: September 9999.

GIDS: GANBASEDINTRUSIONDETECTIONSYSTEM FORIN-VEHICLENETWORKA PREPRINTEunbi SeoGraduate School of Information SecurityKorea UniversitySeoul, Republic of Koreaeunbi@korea.ac.krHyun Min SongGraduate School of Information SecurityKorea UniversitySeoul, Republic of Koreasignos@korea.ac.krHuy Kang KimGraduate School of Information SecurityKorea UniversitySeoul, Republic of Koreacenda@korea.ac.krJuly 18, 2019ABSTRACTA Controller Area Network (CAN) bus in the vehicles is an efficient standard bus enabling commu-nication between all Electronic Control Units (ECU). However, CAN bus is not enough to protectitself because of lack of security features. To detect suspicious network connections effectively, theintrusion detection system (IDS) is strongly required. Unlike the traditional IDS for Internet, thereare small number of known attack signatures for vehicle networks. Also, IDS for vehicle requireshigh accuracy because any false-positive error can seriously affect the safety of the driver. To solvethis problem, we propose a novel IDS model for in-vehicle networks,GIDS(GAN based IntrusionDetection System) using deep-learning model, Generative Adversarial Nets.GIDScan learn to detectunknown attacks using only normal data. As experiment result,GIDSshows high detection accuracyfor four unknown attacks.KeywordsGenerative Adversarial Nets·Intrusion detection System·Controller Area Network·In-Vehicle Security1 IntroductionThe advances in the automotive technology have brought great convenience to driver’s life. However, as V2X technologyenables interactions with vehicles and everything from outside (e.g., vehicles, infrastructure), security threats on ECUof vehicles become higher. Therefore, we need to develop a security system to mitigate the various risks of the vehicle.In particular, intrusion detection system (IDS) for in-vehicle network is required to protect all of the ECUs and relatedequipment in the vehicle from emerging threats.Controller Area Network (CAN) is a standard of the bus system for in-vehicle network and provides efficient com-munication between ECUs. CAN bus is a reliable and economical serial bus for the in-vehicle network. However,because it uses a broadcast communication without authentication, attackers can access CAN bus easily, and it causessevere risk. For example, an adversary could inject a malicious packet in CAN bus via a vulnerability at one of thenumerous external interfaces Also, many modern cars which have a communication module for infotainment servicecan be exposed to the attacks via Over-The-Air (OTA) update module. These attacks could result in not only seriousmalfunctions of the vehicle but also threats to the safety of drivers.arXiv:1907.07377v1 [cs.CR] 17 Jul 2019

APREPRINT- JULY18, 2019IDS is the best way to detect and respond known and unknown attacks of today because it can continuously monitor thein-vehicle system and detect suspicious network events generated by ECUs in real time. Recently, there has been someresearch for IDS to detect attacks targeted on the vehicles. For example, Songet al.proposed a detection model basedon time interval analysis of CAN data [1], and Leeet al.presented a method to detect intrusion by monitoring the timeinterval of the request and response of CAN data [2].Although these models are lightweight and efficient, they have some limitations. When in-vehicle environments arechanged, it can require a lot of updates. Also, targets to be detected may be limited since specific attacks are reflectedwhen constructing detection system. If IDS be leaked to the attacker, the attacker can manipulate and avoid detection.To solve these problems, we proposeGIDS(Generative Adversarial Nets based Intrusion Detection System) which hasthe following characteristics: expandability, effectiveness, and security.1.Expandability:GIDSmaintains consistent detection methodology even if in-vehicle environments are changed.It requires only one training process.2.Effectiveness: BecauseGIDScan be trained using only normal data, itGIDScan detect intrusions withoutbeing limited to specific types of attacks. Thus,GIDSis likely to detect unknown attacks not used in theimplementation process of the IDS.3.Security:GIDSis one of the deep-learning model which has the characteristic of black-box. Thus,it is difficultfor an attacker to manipulate internal structure of detection system.1.1 Organization of This PaperWe introduced in-vehicle networks and IDS for in-vehicle network in §1. The rest of the paper is organized as follows.§2 presents the recent researches. We introduce our IDS,GIDSin §3. In §4, we describe the result of the experimentand discuss the experiment result. Finally we conclude the paper in §5.2 Related worksThe early research for anomaly detection of the in-vehicle system was introduced by Hoppeet al.[3]. He presented threeselected characteristics as patterns available for anomaly detection that include the recognition of an increased frequencyof cyclic CAN messages, the observation of low-level communication characteristics, and the identification of obviousmisuse of message IDs. Müteret al.proposed an anomaly detection based entropy [4]. Marchettiet al.analyzedand identified anomalies in the sequence of CAN [5]. The proposed model features low memory and computationalfootprints. SALMANet al.proposed a software-based light-weight IDS and two anomaly-based algorithms based onmessage cycle time analysis and plausibility analysis of messages [6]. It contributed to more advanced research in thefield of IDS for in-vehicle networks.Many security research in various fields has adopted deep-learning methods for IDS. For example, Zhanget al.presenteda deep-learning method to detect Web attacks by using the specially designed CNN [7]. The method is based onanalyzing the HTTP request packets, to which only some preprocessing is needed whereas the tedious feature extractionis done by the CNN itself. Recently, Generative Adversarial Nets (GAN) was adopted to not only image generationbut also other research like anomaly detection. Schleglet al.proposed AnoGAN, a deep convolutional generativeadversarial network to learn a manifold of normal anatomical variability. The model demonstrated that the approachcorrectly identifies anomalous images, such as images containing retinal fluid [8].Although various studies using GAN have been published, most of them are focused only on discrimination of imagedata. GAN could be useful for security such as IDS. However, few works have explored the use of GAN for security ofother fields. We developed a GAN based IDS for in-vehicle security and showed high performance on CAN data that isone of the in-vehicle network datasets. We proved expandability, effectiveness, and security of the proposed model forin-vehicle networks.3GIDS: GAN based IDS3.1 Converting CAN Data to ImageCAN bus supports the ECU to ECU communication. In CAN bus, there are frequent transmissions composed ofperiodically used CAN messages. ECUs in the vehicle generate about 2,000 CAN data per second to CAN bus. A largeamount of real-time CAN data generated by ECUs are must be able to be processed. If all the bits of CAN data are useddirectly for image conversion, the converted image can be very complex. In the case,GIDSmay require a long time not2

suzie mercy

Recent Posts

communication MA | Solution Aider

part one For this assignment you are to to watch: Shattered Glass Write a two…

3 years ago

Standard Project – WebServers | Solution Aider

Standard Project - WebServers. Instruction attached. Need all requirements, you do not have to make…

3 years ago

Discussion post 2 | Solution Aider

Read classmates post and respond with 100 words:The International Categorization of Diseases, Tenth Revision, Clinical…

3 years ago

case sttudy | Solution Aider

Most Americans have at least 1 issue that is most important to them. Economic issues…

3 years ago

Methodologies Report | Solution Aider

For this assignment, you are the court intake processor at a federal court where you…

3 years ago

outline about gender equality | Solution Aider

Use a standard outline format to lay out how you are going to write your…

3 years ago