Abstract
Modern vehicles are complex safety critical cyber physical systems, that are connected to the outside world, with all security implications it brings. Different network intrusion detection systems (NIDSs) proposed for the CAN bus, the predominant type of in-vehicle network, to improve security are hard to compare due to disparate evaluation methods adopted. In this paper we provide the means to compare CAN NIDSs on equal footing and evaluate the ones detailed in the literature. Based on this we observe some limitation of existing approaches and why in the CAN setting it is intrinsically difficult to distinguish benign from malicious payload. We argue that 'meaning-aware' detection (a concept we define) which is challenging (but perhaps not impossible) to create for this setting.
Original language | English |
---|---|
Title of host publication | 2019 8th IEEE International Conference on Connected Vehicles and Expo, ICCVE 2019 - Proceedings |
Publisher | Institute of Electrical and Electronics Engineers |
ISBN (Electronic) | 9781728101422 |
DOIs | |
Publication status | Published - Nov 2019 |
Event | 8th IEEE International Conference on Connected Vehicles and Expo, ICCVE 2019 - Graz, Austria Duration: 4 Nov 2019 → 8 Nov 2019 |
Conference
Conference | 8th IEEE International Conference on Connected Vehicles and Expo, ICCVE 2019 |
---|---|
Country/Territory | Austria |
City | Graz |
Period | 4/11/19 → 8/11/19 |
Keywords
- CAN bus
- Car hacking
- In-vehicle networks
- Intrusion detection