期刊文献+

汽车CAN网络的入侵检测模型及装置研究 被引量:2

Research on intrusion detection model and device of automobile controller area network(CAN)
在线阅读 下载PDF
导出
摘要 随着智能网联汽车技术的发展,其信息安全问题也日益凸显,面向智能网联汽车CAN网络入侵检测的需求,针对周期性攻击,提出了一种基于ID熵的检测模型,判断CAN网络通信的异常状态并对攻击ID进行定位;针对非周期性攻击,提出了一种基于支持向量机-数据关联性的入侵检测方案,并设计了车载CAN网络入侵检测装置。实验结果表明,对周期性攻击如重放攻击、DoS攻击和丢弃攻击的检测准确率为100%,对非周期性攻击如篡改攻击的检测准确率为97.14%。该装置可有效地检测CAN网络入侵行为,为智能网联环境下的整车信息安全提供有力保障。 With the development of intelligent connected vehicle technology,information security is becoming more and more important.For the requirements of intelligent networked vehicle intrusion detection,two detection models are proposed.For the periodic attacks,a detection scheme based on ID entropy is proposed,which can analysis and judge the abnormal state of CAN communication,in addition,the abnormal message can be located.For the aperiodic attacks,a detection scheme based on support vector machine-data relevance is proposed,and a vehicle-mounted CAN intrusion detection device is designed and developed.The experimental results show that the detection accuracy rate of periodic attacks is 100%,such as replay,DoS and discard attack,and the detection accuracy rate of aperiodic attacks is 97.14%,such as tampering attack.CAN intrusion can be effectively detected by the device,and the vehicle information security under the intelligent connected environment can be guaranteed.
作者 刘蓬勃 彭海德 赵剑 贾博文 范科峰 LIU Pengbo;PENG Haide;ZHAO Jian;JIA Bowen;FAN Kefeng(School of Automotive Engineering,Dalian University of Technology,Dalian 16024,China;China Electronics Standardization Institute,Beijing 100007,China)
出处 《实验技术与管理》 CAS 北大核心 2022年第3期126-131,170,共7页 Experimental Technology and Management
基金 国家重点研发计划(2018YFA0703200) 2019年工业和信息化领域公共服务能力提升专项(2019-00910-5-1)。
关键词 汽车控制器局域网络 入侵检测 ID熵 支持向量机 数据关联性 automotive controller area network(CAN) intrusion detection ID entropy support vector machine data relevance
作者简介 刘蓬勃(1981—),男,辽宁大连,博士,工程师,主要研究方向为智能网联汽车和传感器,pengboliu@dlut.edu.cn;通信作者:赵剑(1980—),男,河北石家庄,博士,教授,主要研究方向为汽车传感器和智能网联汽车,jzhao@dlut.edu.cn。
  • 相关文献

参考文献3

二级参考文献21

  • 1Miller C, Valasek C. Adventures in automotive net- works and control units[C]//DEFCON 21 Hacking Conference, Las Vegas,2013.
  • 2Miller C, Valasek C. A survey of remote automotive attack surfaces[C] // Black Hat, Las Vegas, USA, 2014.
  • 3Miller C, Valasek C. Remote Exploitation of an Un- altered Passenger Vehicle[C] // Black Hat, Las Ve- gas,USA, 2015.
  • 4Leinmtiller T, Buttyan L, Hubaux J P, et al. Seve- corn-secure vehicle communication[C]//IST Mobile and Wireless Communication Summit, Myconos Greece,2006.
  • 5European Commission within the Seventh Frame- work Programme. E-safety vehicle intrusion protec- ted applications (EVITA) project [OB/OL]. ht- tp ://www. evitaproject, org.
  • 6Groza B, Murvay S. Broadcast Authentication in a Low Speed Controller Area Network[M]. E-Busi- ness and Telecommunications: Springer, 2012: 330- 344.
  • 7Groza B, Murvay S. Efficient protocols for secure broadcast in controller area networks[J]. IEEE Transactions on Industrial Informatics, 2013, 9(4): 2034-2042.
  • 8Groza B, Murvay S, van Herrewege A, et al. Libra- can: a Lightweight Broadcast Authentication Proto- col for Controller Area Networks[M]. Cryptology and Network Seeurity: Springer, 2012: 185-200.
  • 9Murray P S, Groza B. Source identification using signal characteristics in controller area networks[J]. Signal Processing Letters,2014, 21(4): 395-399.
  • 10Lin Chung-wei, Sangiovanni-Vincentelli A. Cyber- security for the controller area network (CAN) communication protocol[C]//International Confer- ence on Cyber Security, Washingtong DC, 2012: 1-7.

共引文献52

同被引文献17

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部