Change Point Models for Real-time V2I Cyber Attack Detection in a Connected Vehicle Environment

11/30/2018
by   Gurcan Comert, et al.
0

Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure and traffic management centers. However, it is a challenge to detect security threats in real-time and develop appropriate/effective countermeasures for a CV system because of the dynamic behavior of such attacks, high computational power requirement and a historical data requirement for training detection models. To address these challenges, statistical models, especially change point models, have potentials for real-time anomaly detections. Thus, the objective of this study is to investigate the efficacy of two change point models, Expectation Maximization (EM) and Cumulative Sum (CUSUM), for real-time V2I cyber attack detection in a CV Environment. To prove the efficacy of these models, we evaluated these two models for three different type of cyber attack, denial of service (DOS), impersonation, and false information, using basic safety messages (BSMs) generated from CVs through simulation. Results from numerical analysis revealed that EM and CUSUM could detect these cyber attacks, DOS, impersonation, and false information, with an accuracy of 99%, 100%, and 98%, and 100%, 100% and 98%, respectively.

READ FULL TEXT
research
03/05/2020

Change Point Models for Real-time Cyber Attack Detection in Connected Vehicle Environment

Connected vehicle (CV) systems are cognizant of potential cyber attacks ...
research
08/02/2021

Efficacy of Statistical and Artificial Intelligence-based False Information Cyberattack Detection Models for Connected Vehicles

Connected vehicles (CVs), because of the external connectivity with othe...
research
04/23/2021

Anomaly Detection from Cyber Threats via Infrastructure to Automated Vehicle

Using Infrastructure-to-Vehicle (I2V) information can be of great benefi...
research
04/07/2023

SCART: Simulation of Cyber Attacks for Real-Time

Real-Time systems are often implemented as reactive systems that respond...
research
07/25/2018

Architectures for Detecting Real-time Multiple Multi-stage Network Attacks Using Hidden Markov Model

With the growing Cyber threats, the need to develop high assurance Cyber...
research
11/29/2017

Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention

A connected vehicle (CV) environment is composed of a diverse data colle...
research
09/27/2019

Modeling and Detection of Future Cyber-Enabled DSM Data Attacks using Supervised Learning

Demand-Side Management (DSM) is a vital tool that can be used to ensure ...

Please sign up or login with your details

Forgot password? Click here to reset