Abstract
As technology advances, the mechanical components of vehicles are being replaced by microcontrollers known as Electronic Control Units (ECUs). These ECUs connect to form an In-Vehicle Network, and they communicate control messages to each other in order to control the vehicle. There are several message protocols that can be used for IVN communication, but the most used protocol is the Controller Area Network (CAN) message. While CAN messages offer flexibility and cost-effectiveness to the network, their lack of security can make the network vulnerable to attacks, which can have serious consequences for both vehicles and drivers. In order to prevent such vulnerabilities, researchers have studied security systems such as Intrusion Detection Systems (IDS). However, the lack of availability and integrity of datasets can lead to misdetection, making it difficult to evaluate methods effectively. Therefore, we collected IVN messages based on several scenarios via collection tool. In this paper, we analyze CAN messages of each scenario and put into ML and DL models as testing dataset, and observe the results of each scenario. These findings shows miscalculation of the data collection scenario could lead to misdetection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Proc. IEEE Symp. Secur. Privacy, May, pp. 447–462 (2010)
Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proc. USENIX Secur. Symp., San Francisco, CA, USA, vol. 4, p. 2021 (2011)
Valasek, C., Miller, C.: Adventures in automotive networks and control units. Def. Con. 21(260–264), 15–31 (2013)
Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2014)
Miller, C., Valasek, C.: ‘Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA, vol. 2015, no. S91, Aug (2015)
Nie, S., Liu, L., Du, Y.: Free-fall: Hacking Tesla from wireless to CAN bus. In: Briefing, Black Hat USA, vol. 25, pp. 1–16, Jul (2017)
Nie, S., Liu, L., Du, Y., Zhang, W.: Over-the-air: how we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars. In Proc. Black Hat USA, vol. 1. Las Vegas, NV, USA, Aug, pp. 1–19 (2018)
Wu, W., et al.: A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 21(3) (2020)
Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In Proc. 25th USENIX Conf. Secur. Symp., Austin, TX, USA, Aug, pp. 911–927 (2016)
Barolli, L. (ed.): BWCCA 2021. LNNS, vol. 346. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-90072-4
Wu, W., et al.: Sliding window optimized information entropy analysis method for intrusion detection on in-vehicle networks. IEEE Access 6, 45233–45245 (2018)
Hoang, T.-N., Islam, M.R., Yim, K., Kim, D.: CANPerFL: improve in-vehicle intrusion detection performance by sharing knowledge. Appl. Sci. 13(11), 6369 (2023). https://doi.org/10.3390/app13116369
Islam, M.R., Oh, I., Yim, K.: Universal intrusion detection system on in-vehicle network. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol. 177. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-35836-4_9
Koh, Yeji & Kim, Seoyeon & Kim, Yoonji & Oh, Insu & Yim, Kangbin. (2022). Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network. https://doi.org/10.1007/978-3-031-08819-3_10
PCAN-API documentation: documentation.help/PCAN-Basic/PCAN-API.html
Khastgir, S., Brewerton, S., Thomas, J., Jennings, P.: Systems approach to creating test scenarios for automated driving systems. Reliab. Eng. Syst. Saf. 215, 107610 (2021). ISSN 0951-8320, https://doi.org/10.1016/j.ress.2021.107610
Confusion Matrix: https://en.wikipedia.org/wiki/Confusion_matrix
Acknowledgments
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2021R1A4A2001810) and Institute for Information & communications Technology Planning&Evaluation(IITP) grant funded by the Korea government(MSIT) (No. 2022-0-01197, Convergence security core talent training business (SoonChunHyangUniversity)).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Batzorig, M., Koh, Y., Oh, I., Yim, K. (2023). A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network. In: Barolli, L. (eds) Advances in Networked-based Information Systems. NBiS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-031-40978-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-40978-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-40977-6
Online ISBN: 978-3-031-40978-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)