Unsupervised Time Series Extraction from Controller Area Network Payloads

04/05/2019
by   Brent J. Stone, et al.
0

This paper introduces a method for unsupervised tokenization of Controller Area Network (CAN) data payloads using bit level transition analysis and a greedy grouping strategy. The primary goal of this proposal is to extract individual time series which have been concatenated together before transmission onto a vehicle's CAN bus. This process is necessary because the documentation for how to properly extract data from a network may not always be available; passenger vehicle CAN configurations are protected as trade secrets. At least one major manufacturer has also been found to deliberately misconfigure their documented extraction methods. Thus, this proposal serves as a critical enabler for robust third-party security auditing and intrusion detection systems which do not rely on manufacturers sharing confidential information.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/28/2019

Network intrusion detection systems for in-vehicle network - Technical report

Modern vehicles are complex safety critical cyber physical systems, that...
research
05/03/2022

CANShield: Signal-based Intrusion Detection for Controller Area Networks

Modern vehicles rely on a fleet of electronic control units (ECUs) conne...
research
06/06/2019

CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data

We propose a novel neural network architecture for detecting intrusions ...
research
10/17/2022

CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model

Due to the rising number of sophisticated customer functionalities, elec...
research
02/02/2023

Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System

The Adaptive Cruise Control (ACC) system automatically adjusts the vehic...
research
08/09/2023

can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection

When it comes to in-vehicle networks (IVNs), the controller area network...
research
01/07/2022

Detecting CAN Masquerade Attacks with Signal Clustering Similarity

Vehicular Controller Area Networks (CANs) are susceptible to cyber attac...

Please sign up or login with your details

Forgot password? Click here to reset