Controller Area Network (CAN) is an essential networking protocol that connects multiple electronic control units (ECUs) in a vehicle. However, CAN-based in-vehicle networks (IVNs) face security risks owing to the CAN mechanisms. An adversary can sabotage a vehicle by leveraging the security risks if they can access the CAN bus. Thus, recent actions and cybersecurity regulations (e.g., UNR 155) require carmakers to implement intrusion detection systems (IDSs) in their vehicles. An IDS should detect cyberattacks and provide a forensic capability to analyze attacks. Although many IDSs have been proposed, considerations regarding their feasibility and explainability remain lacking. This study proposes X-CANIDS, which is a novel IDS for CAN-based IVNs. X-CANIDS dissects the payloads in CAN messages into human-understandable signals using a CAN database. The signals improve the intrusion detection performance compared with the use of bit representations of raw payloads. These signals also enable an understanding of which signal or ECU is under attack. X-CANIDS can detect zero-day attacks because it does not require any labeled dataset in the training phase. We confirmed the feasibility of the proposed method through a benchmark test on an automotive-grade embedded device with a GPU. The results of this work will be valuable to carmakers and researchers considering the installation of in-vehicle IDSs for their vehicles.
翻译:控制器局域网(CAN)是一种连接汽车中多个电子控制单元(ECU)的重要网络协议。然而,CAN基础设施面临着由于CAN机制而带来的安全风险。如果对CAN总线进行访问,攻击者可以利用这些安全风险来破坏汽车。因此,最近的行动和网络安全法规(例如UNR155)要求汽车制造商在其汽车中实施入侵检测系统(IDS)。IDS应该能够检测到网络攻击并提供分析攻击的取证能力。虽然已经提出了许多 IDS,但是其可行性和可解释性方面仍然存在缺陷。本研究提出了一种针对CAN基础设施的智能汽车网络的信号感知可解释入侵检测系统(X-CANIDS)。X-CANIDS使用CAN数据库将CAN消息中的负载分解成人们可理解的信号。这些信号与使用原始负载的位表示相比提高了入侵检测性能。这些信号还能够使人们了解哪些信号或ECU正在受到攻击。X-CANIDS能够检测零日攻击,因为在训练阶段不需要任何标记过的数据集。通过在具有GPU的汽车级嵌入式设备上进行基准测试,我们验证了所提出方法的可行性。本研究的结果将对考虑为其汽车安装车内IDS的汽车制造商和研究人员具有重要意义。