CN111355706A - Vehicle-mounted intrusion detection method and system based on CAN bus - Google Patents

Vehicle-mounted intrusion detection method and system based on CAN bus Download PDF

Info

Publication number
CN111355706A
CN111355706A CN202010084249.0A CN202010084249A CN111355706A CN 111355706 A CN111355706 A CN 111355706A CN 202010084249 A CN202010084249 A CN 202010084249A CN 111355706 A CN111355706 A CN 111355706A
Authority
CN
China
Prior art keywords
bus
signals
attack
vehicle
class
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010084249.0A
Other languages
Chinese (zh)
Inventor
刘虹
黄非易
蒲戈光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Industrial Control Safety Innovation Technology Co ltd
East China Normal University
Original Assignee
Shanghai Industrial Control Safety Innovation Technology Co ltd
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Industrial Control Safety Innovation Technology Co ltd, East China Normal University filed Critical Shanghai Industrial Control Safety Innovation Technology Co ltd
Priority to CN202010084249.0A priority Critical patent/CN111355706A/en
Publication of CN111355706A publication Critical patent/CN111355706A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40208Bus networks characterized by the use of a particular bus standard
    • H04L2012/40215Controller Area Network CAN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40267Bus for use in transportation systems
    • H04L2012/40273Bus for use in transportation systems the transportation system being a vehicle

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a CAN network-based automobile intrusion detection system, which comprises the following steps: step 1: electric CAN signal measurement and pretreatment; step 2: extracting the characteristics of the preprocessed signals, extracting the electrical characteristics of the preprocessed signals, and considering all possibilities; and step 3: aiming at masquerading attack detection, a multi-class classifier is established to detect masquerading attack, wherein the number of classes is equal to the number of ECUs in a vehicle-mounted CAN network; and 4, step 4: aiming at the detection of the bus closing attack, a simple threshold-based method is executed to detect unknown signals; and 5: because the voltage signal is sensitive to the environmental factors, incremental learning is adopted, so that the VoltageIDs have adaptability to the environmental factors. The invention CAN detect the vehicle-mounted CAN network intrusion based on the unique characteristics of the CAN electric signal. Since this invention only requires installation of a monitoring unit on the CAN bus network without any modification of the current ECU, it CAN be directly applied to the current vehicle.

Description

Vehicle-mounted intrusion detection method and system based on CAN bus
Technical Field
The invention relates to the technical field of network security, in particular to a vehicle-mounted intrusion detection method and system based on a CAN bus.
Background
At present, the popularization of internet technology is increased, the number of the total planes of vehicles is increased correspondingly due to the fact that the functions of computers for enhancing the safety and the convenience of drivers are flooded, and the identity authentication of the message prisons is not supported by a controller local area network protocol. Among the centralized solutions that have been proposed, most require modification of the CAN protocol and have their own vulnerabilities.
It was found that VoltageIDs (car intrusion detection system) does not require modification of the current system and is the first method to distinguish masquerading attacks from bus shutdown attacks.
Disclosure of Invention
Based on the discovery, the invention adopts the following technical scheme to realize the automobile intrusion detection:
step 1: electric CAN signal measurement and pretreatment;
step 2: extracting the characteristics of the preprocessed signals, extracting the electrical characteristics of the preprocessed signals, and considering all possibilities;
and step 3: aiming at masquerading attack detection, a multi-class classifier is established to detect masquerading attack, wherein the number of classes is equal to the number of ECUs in a vehicle-mounted CAN network;
step 3.1: in the training step, a multi-class classifier is created by using the labeled function set;
step 3.2: VoltageIDs collects the function sets and tags them with CAN IDs;
step 3.3: ECU ID refers to an identifier assigned to the ECU used to make arbitration decisions;
and 4, step 4: aiming at the detection of the bus closing attack, a simple threshold-based method is executed to detect unknown signals;
step 4.1: detecting a bus close attack using a method of novelty detection to identify new or unknown data that is not used to train a classifier;
step 4.2: VoltageIDs implements a simple threshold-based approach to detect unknown signals;
step 4.3: it is useful to use a support vector machine with Radial Basis Function (RBF) kernels for novelty detection, applying it to a class of classification techniques;
step 4.4: VoltageIDs creates a classifier for class-one classification by classifying all signals from legitimate ECUs into one class;
step 4.5: CAN signals with classification scores below established thresholds are considered unknown;
and 5: because the voltage signal is sensitive to the environmental factors, incremental learning is adopted, so that the VoltageIDs have adaptability to the environmental factors.
So far, the password generation scheme for the user group attribute is executed.
Based on the method, the invention also provides a vehicle-mounted intrusion detection system based on the CAN bus, and the system comprises:
the preprocessing module is used for measuring and preprocessing an electric CAN signal;
the characteristic extraction module is used for extracting the characteristics of the preprocessed signals, extracting the electrical characteristics of the preprocessed signals and considering all possibilities;
the classifier module is used for detecting the masquerading attack by establishing a multi-class classifier aiming at the masquerading attack detection, wherein the number of classes is equal to the number of ECUs in the vehicle-mounted CAN network;
the detection module is used for detecting the bus closing attack and executing a threshold-based method to detect unknown signals;
and the learning module is used for sensing the environmental factors based on the voltage signals and making the VoltageIDs have adaptability to the environmental factors by adopting incremental learning.
The automobile intrusion detection system realized by the invention can be directly applied to the current vehicle-mounted network without modifying any protocol.
Drawings
Fig. 1 is a schematic diagram of a vehicle-mounted intrusion network detection method based on a CAN bus according to the present invention.
Fig. 2 is a theoretical algorithm implementation code for masquerading attack detection.
Fig. 3 is a theoretical algorithm implementation code for bus closure attack detection.
Fig. 4 is a schematic diagram of the vehicle-mounted intrusion network detection system based on the CAN bus.
Detailed Description
The invention is further described in detail with reference to the following specific examples and the accompanying drawings. The procedures, conditions, experimental methods and the like for carrying out the present invention are general knowledge and common general knowledge in the art except for the contents specifically mentioned below, and the present invention is not particularly limited.
Examples
The primary goal of an adversary is to transmit malicious CAN messages to deliberately cause a vehicle malfunction. The adversary remotely destroys the ECU through a plurality of attack surfaces and methods. An adversary is only prone to intentional failures if it has access to the onboard CAN network. The invention classifies and detects different attack modes according to the situation, and the detection method of the vehicle-mounted intrusion network based on the CAN bus comprises the following specific steps:
step 1: electric CAN signal measurement and pretreatment;
step 2: extracting the characteristics of the preprocessed signals, extracting the electrical characteristics of the preprocessed signals, and considering all possibilities;
and step 3: aiming at masquerading attack detection, a multi-class classifier is established to detect masquerading attack, wherein the number of classes is equal to the number of ECUs in a vehicle-mounted CAN network;
step 3.1: in the training step, a multi-class classifier is created by using the labeled function set;
step 3.2: VoltageIDs collects the function sets and tags them with CAN IDs;
step 3.3: ECU ID refers to an identifier assigned to the ECU used to make arbitration decisions;
and 4, step 4: aiming at the detection of the bus closing attack, a simple threshold-based method is executed to detect unknown signals;
step 4.1: detecting a bus close attack using a method of novelty detection to identify new or unknown data that is not used to train a classifier;
step 4.2: VoltageIDs implements a simple threshold-based approach to detect unknown signals;
step 4.3: it is useful to use a support vector machine with Radial Basis Function (RBF) kernels for novelty detection, applying it to a class of classification techniques;
step 4.4: VoltageIDs creates a classifier for class-one classification by classifying all signals from legitimate ECUs into one class;
step 4.5: CAN signals with classification scores below established thresholds are considered unknown;
and 5: because the voltage signal is sensitive to the environmental factors, incremental learning is adopted, so that the VoltageIDs have adaptability to the environmental factors.
So far, the vehicle-mounted intrusion detection about the disguise attack and the bus closing attack is completed.
The invention also provides a vehicle-mounted intrusion detection system based on the CAN bus, which comprises:
the preprocessing module is used for measuring and preprocessing an electric CAN signal;
the characteristic extraction module is used for extracting the characteristics of the preprocessed signals, extracting the electrical characteristics of the preprocessed signals and considering all possibilities;
the classifier module is used for detecting the masquerading attack by establishing a multi-class classifier aiming at the masquerading attack detection, wherein the number of classes is equal to the number of ECUs in the vehicle-mounted CAN network;
the detection module is used for detecting the bus closing attack and executing a threshold-based method to detect unknown signals;
and the learning module is used for sensing the environmental factors based on the voltage signals and making the VoltageIDs have adaptability to the environmental factors by adopting incremental learning.
According to the CAN bus-based vehicle-mounted intrusion network detection method, the multi-class classifier is generated based on the fact that new bugs are generated by modifying the CAN protocol and VoltageIDs have high efficiency and high accuracy, so that the CAN signal discrimination efficiency is improved. And identifying the CAN signals by utilizing the established multi-class classifier, predicting the most possible class for the unmarked data by the multi-class classifier, and if the prediction result is different from the CAN ID of the CAN, judging the CAN to be an adversary to attack.
The protection of the present invention is not limited to the above embodiments. Variations and advantages that may occur to those skilled in the art may be incorporated into the invention without departing from the spirit and scope of the inventive concept, and the scope of the appended claims is intended to be protected.

Claims (8)

1. A vehicle-mounted intrusion detection method based on a CAN bus is characterized by comprising the following steps:
step 1: electric CAN signal measurement and pretreatment;
step 2: extracting the characteristics of the preprocessed signals, extracting the electrical characteristics of the preprocessed signals, and considering all possibilities;
and step 3: aiming at masquerading attack detection, a multi-class classifier is established to detect masquerading attack, wherein the number of classes is equal to the number of ECUs in a vehicle-mounted CAN network;
and 4, step 4: detecting unknown signals by a threshold-based method aiming at the detection of the bus closing attack;
and 5: based on the sensitivity of the voltage signal to environmental factors, incremental learning is adopted, so that the VoltageIDs have adaptability to the environmental factors.
2. The CAN-bus-based vehicle-mounted intrusion detection method according to claim 1, wherein the conversion rule in step 3 is as follows:
step 3.1: in the training step, a multi-class classifier is created by using the labeled function set;
step 3.2: VoltageIDs collect function sets and tag with CAN ID;
step 3.3: the ECU ID is an identifier assigned to the ECU used to make arbitration decisions.
3. The CAN bus based vehicle intrusion detection method of claim 2, wherein 60 features and CAN ID are extracted from CAN messages and used to create a tag set; the set of labels is used as training data to create a multi-class classifier.
4. The CAN bus based vehicle intrusion network detection method of claim 3, wherein in the testing step, 60 functions are extracted for a given new CAN message, and the multi-class classifier predicts a most likely class for unlabeled data.
5. The CAN-bus-based vehicle-mounted intrusion detection method according to claim 1, wherein the step 4 comprises the following steps:
step 4.1: detecting a bus close attack using a method of novelty detection to identify new or unknown data that is not used to train a classifier;
step 4.2: VoltageIDs performs a threshold-based approach to detect unknown signals;
step 4.3: it is effective to use a support vector machine with a radial basis function kernel for novelty detection, applying it to a class of classification techniques;
step 4.4: VoltageIDs creates a classifier for class-one classification by classifying all signals from legitimate ECUs into one class;
step 4.5: CAN signals with classification scores below established thresholds are considered unknown.
6. The CAN-bus based vehicle intrusion network detection method according to claim 5, wherein in step 4.4, the classifiers of one class do not require labels, and all function sets have the same label.
7. The CAN-bus based vehicle intrusion detection method of claim 1, wherein the characteristics of CAN signals for a masquerading attack and a bus closing attack are detected.
8. A CAN-bus-based vehicular intrusion detection system employing the detection method according to any one of claims 1 to 7, the system comprising:
the preprocessing module is used for measuring and preprocessing an electric CAN signal;
the characteristic extraction module is used for extracting the characteristics of the preprocessed signals, extracting the electrical characteristics of the preprocessed signals and considering all possibilities;
the classifier module is used for detecting the masquerading attack by establishing a multi-class classifier aiming at the masquerading attack detection, wherein the number of classes is equal to the number of ECUs in the vehicle-mounted CAN network;
the detection module is used for detecting the bus closing attack and executing a threshold-based method to detect unknown signals;
and the learning module is used for sensing the environmental factors based on the voltage signals and making the VoltageIDs have adaptability to the environmental factors by adopting incremental learning.
CN202010084249.0A 2020-02-10 2020-02-10 Vehicle-mounted intrusion detection method and system based on CAN bus Pending CN111355706A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010084249.0A CN111355706A (en) 2020-02-10 2020-02-10 Vehicle-mounted intrusion detection method and system based on CAN bus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010084249.0A CN111355706A (en) 2020-02-10 2020-02-10 Vehicle-mounted intrusion detection method and system based on CAN bus

Publications (1)

Publication Number Publication Date
CN111355706A true CN111355706A (en) 2020-06-30

Family

ID=71197017

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010084249.0A Pending CN111355706A (en) 2020-02-10 2020-02-10 Vehicle-mounted intrusion detection method and system based on CAN bus

Country Status (1)

Country Link
CN (1) CN111355706A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084185A (en) * 2020-09-17 2020-12-15 杭州电子科技大学 Damaged electronic control unit positioning method of vehicle-mounted edge equipment based on associated learning
CN113447972A (en) * 2021-06-07 2021-09-28 华东师范大学 Automatic driving GPS deception detection method and system based on vehicle-mounted IMU
CN116056087A (en) * 2023-03-31 2023-05-02 国家计算机网络与信息安全管理中心 Network attack detection method, device and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110377465A (en) * 2019-06-26 2019-10-25 江苏大学 A kind of method for detecting abnormality of vehicle-mounted CAN bus
CN110636048A (en) * 2019-08-27 2019-12-31 华东师范大学 Vehicle-mounted intrusion detection method and system based on ECU signal characteristic identifier

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110377465A (en) * 2019-06-26 2019-10-25 江苏大学 A kind of method for detecting abnormality of vehicle-mounted CAN bus
CN110636048A (en) * 2019-08-27 2019-12-31 华东师范大学 Vehicle-mounted intrusion detection method and system based on ECU signal characteristic identifier

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WONSUK CHOI, KYUNGHO JOO, HYO JIN JO, MOON CHAN PARK, DONG HOON: "VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System", 《TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084185A (en) * 2020-09-17 2020-12-15 杭州电子科技大学 Damaged electronic control unit positioning method of vehicle-mounted edge equipment based on associated learning
CN112084185B (en) * 2020-09-17 2022-05-31 杭州电子科技大学 Damaged electronic control unit positioning method of vehicle-mounted edge equipment based on associated learning
CN113447972A (en) * 2021-06-07 2021-09-28 华东师范大学 Automatic driving GPS deception detection method and system based on vehicle-mounted IMU
CN113447972B (en) * 2021-06-07 2022-09-20 华东师范大学 Automatic driving GPS deception detection method and system based on vehicle-mounted IMU
CN116056087A (en) * 2023-03-31 2023-05-02 国家计算机网络与信息安全管理中心 Network attack detection method, device and equipment

Similar Documents

Publication Publication Date Title
CN111355706A (en) Vehicle-mounted intrusion detection method and system based on CAN bus
Wu et al. A survey of intrusion detection for in-vehicle networks
Choi et al. VoltageIDS: Low-level communication characteristics for automotive intrusion detection system
Al-Jarrah et al. Intrusion detection systems for intra-vehicle networks: A review
Zhang et al. Intrusion detection system using deep learning for in-vehicle security
Tomlinson et al. Towards viable intrusion detection methods for the automotive controller area network
EP3752943B1 (en) System and method for side-channel based detection of cyber-attack
Derhab et al. Histogram-based intrusion detection and filtering framework for secure and safe in-vehicle networks
Dupont et al. A survey of network intrusion detection systems for controller area network
Desta et al. ID sequence analysis for intrusion detection in the CAN bus using long short term memory networks
Tanksale Intrusion detection for controller area network using support vector machines
Sharma et al. Protecting ECUs and vehicles internal networks
Ning et al. An experimental study towards attacker identification in automotive networks
Deng et al. IdentifierIDS: A practical voltage-based intrusion detection system for real in-vehicle networks
Tanaka et al. In-vehicle network intrusion detection and explanation using density ratio estimation
Okokpujie et al. Anomaly-based intrusion detection for a vehicle can bus: A case for hyundai avante cn7
Rumez et al. Anomaly detection for automotive diagnostic applications based on N-grams
Dupont et al. Network intrusion detection systems for in-vehicle network-Technical report
Dwivedi Anomaly detection in intra-vehicle networks
Deng et al. A lightweight sender identification scheme based on vehicle physical layer characteristics
Archana et al. Auto deep learning-based automated surveillance technique to recognize the activities in the cyber-physical system
KR20200076217A (en) A mitigation method against message flooding attacks for secure controller area network by predicting attack message retransfer time
Kondratiev et al. An algorithm for intrusion detection into the control system of an unmanned vehicle
RU2737229C1 (en) Protection method of vehicle control systems against intrusions
CN114124446A (en) Intrusion detection system based on Snort engine and adopting logistic regression algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200630

WD01 Invention patent application deemed withdrawn after publication