WEKO3
アイテム
Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS Against DoS Attacks on In-Vehicle Networks
http://hdl.handle.net/10061/13977
http://hdl.handle.net/10061/139772652bf8c-7d51-4ddb-9b1a-c88961ba9adc
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2020-03-24 | |||||
タイトル | ||||||
タイトル | Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS Against DoS Attacks on In-Vehicle Networks | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Automotive security | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | controller area network | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | DoS attack | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | intrusion detection system | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | simulated annealing | |||||
資源タイプ | ||||||
資源タイプ | journal article | |||||
アクセス権 | ||||||
アクセス権 | open access | |||||
著者 |
Ohira, Shuji
× Ohira, Shuji× Araya, Kibrom Desta× Arai, Ismail× Inoue, Hiroyuki× Fujikawa, Kazutoshi |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Controller Area Network (CAN) is a de facto standard of in-vehicle networks. Since CAN employs broadcast communication and a slower network than other general networks (e.g. Ethernet, IEEE802.11), it is inherently vulnerable to Denial-of-Service (DoS) attacks. As a countermeasure against DoS attacks on CAN, a method for detecting a DoS attack using the entropy in a sliding window has been proposed.Thismethodhasagoodadvantageintermsofeffectivenessandthesmallcomputationaloverhead. However, this method may only be effective against DoS attacks under naive conditions such as some higher priority messages. In addition, if an adversary can adjust the entropy of the DoS attack to its normal value, the conventional method cannot detect a DoS attack in which the adversary manipulates the entropy. We found this type of DoS attack, which is called an entropy-manipulated attack. In this paper, we propose a method that can detect an entropy-manipulated attack by using the similarity of two sliding windows. We con?rmed that the proposed method detected the DoS attack in 100% of the cases in our experiment, and we showed that the detection time is up to 93% (14 μs) shorter than the conventional method. | |||||
書誌情報 |
en : IEEE Access 巻 8, p. 42422-42435, 発行日 2020-02-24 |
|||||
出版者 | ||||||
出版者 | IEEE | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 2169-3536 | |||||
出版者版DOI | ||||||
関連タイプ | isIdenticalTo | |||||
識別子タイプ | DOI | |||||
関連識別子 | https://doi.org/10.1109/ACCESS.2020.2975893 | |||||
権利 | ||||||
権利情報 | This work is licensed under a Creative Commons Attribution 4.0 License | |||||
著者版フラグ | ||||||
出版タイプ | VoR |