Skip to main content

Anomaly Detection of Vehicle CAN Network Based on Message Content

  • Conference paper
  • First Online:

Abstract

With the rapid advance of intelligent vehicles, auxiliary driving and automatic driving have been paid more attention to. While vehicle security has become increasingly prominent, which is seriously related to the property and personal safety. The attacker can send abnormal information to the controller through internal CAN bus. Because of the particularity of the vehicle CAN network information communication protocol, the encryption authentication technology cannot effectively solve the safety problem of the vehicle network. In the paper, a novel anomaly detection method based on CAN packet content is proposed. The scheme is effective in preventing in-vehicle ECU attacks caused by malicious modifications. Statistical thinking is adopted to analyze the characteristics of normal message content. Then a confidence interval based on normal features is defined for detecting abnormal network messages. Its detection performance has been demonstrated through experiments carried out on real CAN traffic gathered from an unmodified licensed vehicle.

Our work is supported by the General Project of Tianjin Municipal Science and Technology Commission under Grant (No. 15JCYBJC15600), the Major Project of Tianjin Municipal Science and Technology Commission under Grant (No. 15ZXDSGX00030), and NSFC: The United Foundation of General Technology and Fundamental Research (No. U1536122).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185–200. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35404-5_15

    Chapter  Google Scholar 

  2. Narayanan, S.N., Mittal, S., Joshi, A.: Using data analytics to detect anomalous states in vehicles. arXiv preprint arXiv:1512.08048 (2015)

  3. Kammerer, R., Frömel, B., Wasicek, A.: Enhancing security in CAN systems using a star coupling router. In: 2012 7th IEEE International Symposium on Industrial Embedded Systems (SIES). IEEE (2012)

    Google Scholar 

  4. Studnia, I., et al.: Security of embedded automotive networks: state of the art and a research proposal. In: SAFECOMP 2013-Workshop CARS (2nd Workshop on Critical Automotive applications: Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)

    Google Scholar 

  5. Tang, D.: Probability Theory and Mathematical Statistics. Tianjin University Press, Tianjin (2009)

    Google Scholar 

  6. Miller, C., Valasek, C.: Adventures in automotive networks and control units. Def Con 21, 260–264 (2013)

    Google Scholar 

  7. Taylor, A.: Anomaly-based detection of malicious activity in in-vehicle networks. Université d’Ottawa/University of Ottawa (2017)

    Google Scholar 

  8. Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016)

    Article  Google Scholar 

  9. Kang, M.-J., Kang, J.-W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE (2016)

    Google Scholar 

  10. Wang, C., et al.: A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6, 9091–9098 (2018)

    Article  Google Scholar 

  11. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pengyuan Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mo, X., Chen, P., Wang, J., Wang, C. (2019). Anomaly Detection of Vehicle CAN Network Based on Message Content. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics