Attackers demonstrated the use of remote access to the in-vehicle network of connected vehicles to launch cyber-attacks and remotely take control of these vehicles. Machine-learning-based Intrusion Detection Systems (IDSs) techniques have been proposed for the detection of such attacks. The evaluation of some of these IDS demonstrated their efficacy in terms of accuracy in detecting message injections but was performed offline, which limits the confidence in their use for real-time protection scenarios. This paper evaluates four architecture designs for real-time IDS for connected vehicles using Controller Area Network (CAN) datasets collected from a moving vehicle under malicious speed reading message injections. The evaluation shows that a real-time IDS for a connected vehicle designed as two processes, a process for CAN Bus monitoring and another one for anomaly detection engine is reliable (no loss of messages) and could be used for real-time resilience mechanisms as a response to cyber-attacks.
翻译:攻击者展示了使用远程进入连接车辆的车辆网络来发动网络攻击和遥控控制这些车辆的情况; 提议了以机械学习为基础的入侵探测系统(IDS)技术来探测这类攻击; 对其中一些IDS的评估显示了其在探测电文注入的准确性方面的有效性,但进行了离线操作,从而限制了人们对在实时保护情景中使用这些系统的信心; 本文评估了使用主计长地区网络(CAN)数据集从恶意快速读取电文注入的移动车辆中收集的连接车辆的实时IDS四个结构设计; 评估表明,对作为两个过程设计的连接车辆的实时IDS、CAN公共汽车监测过程和异常探测引擎的另一个过程是可靠的(没有信息损失),可用于实时恢复机制,以应对网络攻击。