Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks
Modern automobiles have been proven vulnerable to hacking by security researchers. By exploiting vulnerabilities in the car's external interfaces, attackers can access a car's controller area network (CAN) bus and cause malicious effects. We seek to detect these attacks on the bus as a las...
Main Author: | |
---|---|
Other Authors: | |
Language: | en |
Published: |
Université d'Ottawa / University of Ottawa
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10393/36120 http://dx.doi.org/10.20381/ruor-20400 |
id |
ndltd-uottawa.ca-oai-ruor.uottawa.ca-10393-36120 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-uottawa.ca-oai-ruor.uottawa.ca-10393-361202018-01-05T19:03:01Z Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks Taylor, Adrian Japkowicz, Nathalie Leblanc, Sylvain anomaly detection cyber security intrusion detection recurrent neural network Modern automobiles have been proven vulnerable to hacking by security researchers. By exploiting vulnerabilities in the car's external interfaces, attackers can access a car's controller area network (CAN) bus and cause malicious effects. We seek to detect these attacks on the bus as a last line of defence against automotive cyber attacks. The CAN bus standard defines a low-level message structure, upon which manufacturers layer their own proprietary command protocols; attacks must similarly be tailored for their target. This variability makes intrusion detection methods difficult to apply to the automotive CAN bus. Nevertheless, the bus traffic is generated by machines; thus we hypothesize that it can be characterized with machine learning, and that attacks produce anomalous traffic. Our goals are to show that anomaly detection trained without understanding of the message contents can detect attacks, and to create a framework for understanding how the characteristics of a novel attack can be used to predict its detectability. We developed a model that describes attacks based on their effect on bus traffic, informed by a review of published material on car hacking in combination with analysis of CAN traffic from a 2012 Subaru Impreza. The model specifies three high-level categories of effects: attacks that insert foreign packets, attacks that affect packet timing, and attacks that only modify data within packets. Foreign packet attacks are trivially detectable. For timing-based anomalies, we developed features suitable for one-class classification methods. For packet stream data word anomalies, we adapted recurrent neural networks and multivariate Markov model methods to sequence anomaly detection and compared their performance. We conducted experiments to evaluate our detection methods with special attention to the trade-off between precision and recall, given that a practical system requires a very low false alarm rate. The methods were evaluated by synthesizing anomalies within each attack category, parameterized to adjust their covertness. We generalize from the results to enable prediction of detection rates for new attacks using these methods. 2017-05-23T18:25:46Z 2017-05-23T18:25:46Z 2017 Thesis http://hdl.handle.net/10393/36120 http://dx.doi.org/10.20381/ruor-20400 en Université d'Ottawa / University of Ottawa |
collection |
NDLTD |
language |
en |
sources |
NDLTD |
topic |
anomaly detection cyber security intrusion detection recurrent neural network |
spellingShingle |
anomaly detection cyber security intrusion detection recurrent neural network Taylor, Adrian Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks |
description |
Modern automobiles have been proven vulnerable to hacking by security researchers. By exploiting vulnerabilities in the car's external interfaces, attackers can access a car's controller area network (CAN) bus and cause malicious effects. We seek to detect these attacks on the bus as a last line of defence against automotive cyber attacks. The CAN bus standard defines a low-level message structure, upon which manufacturers layer their own proprietary command protocols; attacks must similarly be tailored for their target. This variability makes intrusion detection methods difficult to apply to the automotive CAN bus. Nevertheless, the bus traffic is generated by machines; thus we hypothesize that it can be characterized with machine learning, and that attacks produce anomalous traffic. Our goals are to show that anomaly detection trained without understanding of the message contents can detect attacks, and to create a framework for understanding how the characteristics of a novel attack can be used to predict its detectability.
We developed a model that describes attacks based on their effect on bus traffic, informed by a review of published material on car hacking in combination with analysis of CAN traffic from a 2012 Subaru Impreza. The model specifies three high-level categories of effects: attacks that insert foreign packets, attacks that affect packet timing, and attacks that only modify data within packets. Foreign packet attacks are trivially detectable. For timing-based anomalies, we developed features suitable for one-class classification methods. For packet stream data word anomalies, we adapted recurrent neural networks and multivariate Markov model methods to sequence anomaly detection and compared their performance.
We conducted experiments to evaluate our detection methods with special attention to the trade-off between precision and recall, given that a practical system requires a very low false alarm rate. The methods were evaluated by synthesizing anomalies within each attack category, parameterized to adjust their covertness. We generalize from the results to enable prediction of detection rates for new attacks using these methods. |
author2 |
Japkowicz, Nathalie |
author_facet |
Japkowicz, Nathalie Taylor, Adrian |
author |
Taylor, Adrian |
author_sort |
Taylor, Adrian |
title |
Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks |
title_short |
Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks |
title_full |
Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks |
title_fullStr |
Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks |
title_full_unstemmed |
Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks |
title_sort |
anomaly-based detection of malicious activity in in-vehicle networks |
publisher |
Université d'Ottawa / University of Ottawa |
publishDate |
2017 |
url |
http://hdl.handle.net/10393/36120 http://dx.doi.org/10.20381/ruor-20400 |
work_keys_str_mv |
AT tayloradrian anomalybaseddetectionofmaliciousactivityininvehiclenetworks |
_version_ |
1718598846508957696 |