Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks

Modern automobiles have been proven vulnerable to hacking by security researchers. By exploiting vulnerabilities in the car's external interfaces, attackers can access a car's controller area network (CAN) bus and cause malicious effects. We seek to detect these attacks on the bus as a las...

Full description

Bibliographic Details
Main Author: Taylor, Adrian
Other Authors: Japkowicz, Nathalie
Language:en
Published: Université d'Ottawa / University of Ottawa 2017
Subjects:
Online Access:http://hdl.handle.net/10393/36120
http://dx.doi.org/10.20381/ruor-20400
id ndltd-uottawa.ca-oai-ruor.uottawa.ca-10393-36120
record_format oai_dc
spelling ndltd-uottawa.ca-oai-ruor.uottawa.ca-10393-361202018-01-05T19:03:01Z Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks Taylor, Adrian Japkowicz, Nathalie Leblanc, Sylvain anomaly detection cyber security intrusion detection recurrent neural network Modern automobiles have been proven vulnerable to hacking by security researchers. By exploiting vulnerabilities in the car's external interfaces, attackers can access a car's controller area network (CAN) bus and cause malicious effects. We seek to detect these attacks on the bus as a last line of defence against automotive cyber attacks. The CAN bus standard defines a low-level message structure, upon which manufacturers layer their own proprietary command protocols; attacks must similarly be tailored for their target. This variability makes intrusion detection methods difficult to apply to the automotive CAN bus. Nevertheless, the bus traffic is generated by machines; thus we hypothesize that it can be characterized with machine learning, and that attacks produce anomalous traffic. Our goals are to show that anomaly detection trained without understanding of the message contents can detect attacks, and to create a framework for understanding how the characteristics of a novel attack can be used to predict its detectability. We developed a model that describes attacks based on their effect on bus traffic, informed by a review of published material on car hacking in combination with analysis of CAN traffic from a 2012 Subaru Impreza. The model specifies three high-level categories of effects: attacks that insert foreign packets, attacks that affect packet timing, and attacks that only modify data within packets. Foreign packet attacks are trivially detectable. For timing-based anomalies, we developed features suitable for one-class classification methods. For packet stream data word anomalies, we adapted recurrent neural networks and multivariate Markov model methods to sequence anomaly detection and compared their performance. We conducted experiments to evaluate our detection methods with special attention to the trade-off between precision and recall, given that a practical system requires a very low false alarm rate. The methods were evaluated by synthesizing anomalies within each attack category, parameterized to adjust their covertness. We generalize from the results to enable prediction of detection rates for new attacks using these methods. 2017-05-23T18:25:46Z 2017-05-23T18:25:46Z 2017 Thesis http://hdl.handle.net/10393/36120 http://dx.doi.org/10.20381/ruor-20400 en Université d'Ottawa / University of Ottawa
collection NDLTD
language en
sources NDLTD
topic anomaly detection
cyber security
intrusion detection
recurrent neural network
spellingShingle anomaly detection
cyber security
intrusion detection
recurrent neural network
Taylor, Adrian
Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks
description Modern automobiles have been proven vulnerable to hacking by security researchers. By exploiting vulnerabilities in the car's external interfaces, attackers can access a car's controller area network (CAN) bus and cause malicious effects. We seek to detect these attacks on the bus as a last line of defence against automotive cyber attacks. The CAN bus standard defines a low-level message structure, upon which manufacturers layer their own proprietary command protocols; attacks must similarly be tailored for their target. This variability makes intrusion detection methods difficult to apply to the automotive CAN bus. Nevertheless, the bus traffic is generated by machines; thus we hypothesize that it can be characterized with machine learning, and that attacks produce anomalous traffic. Our goals are to show that anomaly detection trained without understanding of the message contents can detect attacks, and to create a framework for understanding how the characteristics of a novel attack can be used to predict its detectability. We developed a model that describes attacks based on their effect on bus traffic, informed by a review of published material on car hacking in combination with analysis of CAN traffic from a 2012 Subaru Impreza. The model specifies three high-level categories of effects: attacks that insert foreign packets, attacks that affect packet timing, and attacks that only modify data within packets. Foreign packet attacks are trivially detectable. For timing-based anomalies, we developed features suitable for one-class classification methods. For packet stream data word anomalies, we adapted recurrent neural networks and multivariate Markov model methods to sequence anomaly detection and compared their performance. We conducted experiments to evaluate our detection methods with special attention to the trade-off between precision and recall, given that a practical system requires a very low false alarm rate. The methods were evaluated by synthesizing anomalies within each attack category, parameterized to adjust their covertness. We generalize from the results to enable prediction of detection rates for new attacks using these methods.
author2 Japkowicz, Nathalie
author_facet Japkowicz, Nathalie
Taylor, Adrian
author Taylor, Adrian
author_sort Taylor, Adrian
title Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks
title_short Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks
title_full Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks
title_fullStr Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks
title_full_unstemmed Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks
title_sort anomaly-based detection of malicious activity in in-vehicle networks
publisher Université d'Ottawa / University of Ottawa
publishDate 2017
url http://hdl.handle.net/10393/36120
http://dx.doi.org/10.20381/ruor-20400
work_keys_str_mv AT tayloradrian anomalybaseddetectionofmaliciousactivityininvehiclenetworks
_version_ 1718598846508957696