Connected cars are vulnerable to cyber attacks. Security challenges arise from vehicular management uplinks, from signaling with roadside units or nearby cars, as well as from common Internet services. Major threats arrive from bogus traffic that enters the in-car backbone, which will comprise of Ethernet technologies in the near future. Various security techniques from different areas and layers are under discussion to protect future vehicles. In this paper, we show how Per-Stream Filtering and Policing of IEEE Time-Sensitive Networking (TSN) can be used as a core technology for identifying misbehaving traffic flows in cars, and thereby serve as network anomaly detectors. TSN is the leading candidate for implementing quality of service in vehicular Ethernet backbones. We classify the impact of network attacks on traffic flows and benchmark the detection performance in each individual class. Based on a backbone topology derived from a real car and its traffic definition, we evaluate the detection system in realistic scenarios with real attack traces. Our results show that the detection accuracy depends on the precision of the in-vehicle communication specification, the traffic type, the corruption layer, and the attack impact on the link layer. Most notably, the anomaly indicators of our approach remain free of false positive alarms, which is an important foundation for implementing automated countermeasures in future vehicles.
翻译:安全挑战来自路边车辆或附近车辆的信号,以及共同的互联网服务。主要威胁来自进入车主骨干(由以太网技术组成)的虚假交通,近期内将由以太网技术组成。正在讨论不同领域和层次的各种安全技术,以保护未来的车辆。在本文中,我们展示了如何将伊经时间敏感网络(TSN)的 Per-Stream过滤和警务作为核心技术,用以识别汽车交通流量不正确,从而充当网络异常现象探测器。SSN是实施车辆以太网骨干服务质量的主要候选者。我们分类了网络袭击对交通流动的影响,并衡量每个级别检测性能的基准。我们根据从真车及其交通定义得出的骨干表学,用真实攻击痕迹对探测系统进行评估。我们的结果显示,检测的准确性取决于车辆通信规格的准确性、交通类型、未来车辆的自动反常识路路段。我们最显著的自动反常识路段的反常识路面指标是执行。