Open Access

Anomaly-Based Intrusion Detection Using the Density Estimation of Reception Cycle Periods for In-Vehicle Networks

Journal Article
11-01-01-0003
ISSN: 2572-1046, e-ISSN: 2572-1054
Published May 16, 2018 by SAE International in United States
Anomaly-Based Intrusion Detection Using the Density Estimation of
                    Reception Cycle Periods for In-Vehicle Networks
Sector:
Citation: Hamada, Y., Inoue, M., Ueda, H., Miyashita, Y. et al., "Anomaly-Based Intrusion Detection Using the Density Estimation of Reception Cycle Periods for In-Vehicle Networks," SAE Int. J. Transp. Cyber. & Privacy 1(1):39-56, 2018, https://doi.org/10.4271/11-01-01-0003.
Language: English

References

  1. Charette , R.N. This Car Runs on Code http://spectrum.ieee.org/transportation/systems/this-car-runs-on-code 2017
  2. Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces Proceedings of the 20th USENIX Conference on Security 2011
  3. Miller , C. and Valasek , C. Adventures in Automotive Networks and Control Units DEF CON 21 2013
  4. Miller , C. and Valasek , C. Remote Exploitation of an Unaltered Passenger Vehicle DEF CON 23 2015
  5. Miller , C. and Valasek , C. Advanced Can Injection Techniques for Vehicle Networks DEF CON 24 2016
  6. Scarfone , K.A. and Mell , P.M. 2007
  7. International Organization for Standardization 2003
  8. International Organization for Standardization 2015
  9. Koscher , K. , Czeskis , A. , Roesner , F. , Patel , S. et al. Experimental Security Analysis of a Modern Automobile 2010 IEEE Symposium on Security and Privacy 2010 10.1109/SP.2010.34
  10. Chandola , V. , Banerjee , A. , and Kumar , V. Anomaly Detection: A Survey ACM Computing Surveys 41 3 2009 10.1145/1541880.1541882
  11. Larson , U.E. , Nilsson , D.K. , and Jonsson , E. An Approach to Specification-Based Attack Detection for In-Vehicle Networks 2008 IEEE Intelligent Vehicle Symposium 2008 10.1109/IVS.2008.4621263
  12. Otsuka , S. , Ishigooka , T. , Oishi , Y. , and Sasazawa , K. CAN Security: Cost-Effective Intrusion Detection for Real-Time Control Systems SAE Technical Paper 2014-01-0340 2014 10.4271/2014-01-0340
  13. Müter , M. and Asaj , N. Entropy-Based Anomaly Detection for In-Vehicle Networks 2011 IEEE Intelligent Vehicle Symposium (IV) 2011 10.1109/IVS.2011.5940552
  14. Markovitz , M. and Wool , A. Field Classification, Modeling and Anomaly Detection in Unknown CAN Bus Networks the 13th escar Europe Conference 2015
  15. Wasicek , A. , Pesé , M. , Weimerskirch , A. , Burakova , Y. et al. Context-Aware Intrusion Detection in Automotive Control System the 5th escar USA Conference Detroit Metropolitan, MI 2017
  16. Yamanishi , K. , Takeuchi , J. , and Williams , G. On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms Data Mining and Knowledge Discovery Journal 8 3 275 300 2004
  17. Dempster , A.P. , Laird , N.M. , and Rubin , D.B. Maximum Likelihood from Incomplete Data via the EM Algorithm Journal of Royal Statistical Society. Series B (Methodological) 39 1 1 38 1977

Cited By

Recommended Content

Ground Vehicle Standard J1939 Digital Annex
Ground Vehicle Standard Pass-Thru Extended Features - CAN with Flexible Data Rate
Ground Vehicle Standard Network Layer