{"created":"2023-07-25T10:25:45.372009+00:00","id":4198,"links":{},"metadata":{"_buckets":{"deposit":"09848d68-7f8d-40d7-a082-128700685d24"},"_deposit":{"created_by":4,"id":"4198","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"4198"},"status":"published"},"_oai":{"id":"oai:naist.repo.nii.ac.jp:00004198","sets":["34:35"]},"author_link":["8847","8848","8849","8850","37"],"item_7_biblio_info_9":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2020-02-24","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"42435","bibliographicPageStart":"42422","bibliographicVolumeNumber":"8","bibliographic_titles":[{"bibliographic_title":"IEEE Access","bibliographic_titleLang":"en"}]}]},"item_7_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Controller Area Network (CAN) is a de facto standard of in-vehicle networks. Since CAN employs broadcast communication and a slower network than other general networks (e.g. Ethernet, IEEE802.11), it is inherently vulnerable to Denial-of-Service (DoS) attacks. As a countermeasure against DoS attacks on CAN, a method for detecting a DoS attack using the entropy in a sliding window has been proposed.Thismethodhasagoodadvantageintermsofeffectivenessandthesmallcomputationaloverhead. However, this method may only be effective against DoS attacks under naive conditions such as some higher priority messages. In addition, if an adversary can adjust the entropy of the DoS attack to its normal value, the conventional method cannot detect a DoS attack in which the adversary manipulates the entropy. We found this type of DoS attack, which is called an entropy-manipulated attack. In this paper, we propose a method that can detect an entropy-manipulated attack by using the similarity of two sliding windows. We con?rmed that the proposed method detected the DoS attack in 100% of the cases in our experiment, and we showed that the detection time is up to 93% (14 μs) shorter than the conventional method.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_7_publisher_10":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_7_relation_17":{"attribute_name":"出版者版DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1109/ACCESS.2020.2975893","subitem_relation_type_select":"DOI"}}]},"item_7_rights_18":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"This work is licensed under a Creative Commons Attribution 4.0 License","subitem_rights_language":"en"}]},"item_7_source_id_12":{"attribute_name":"EISSN/PISSN","attribute_value_mlt":[{"subitem_source_identifier":"2169-3536","subitem_source_identifier_type":"ISSN"}]},"item_7_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ohira, Shuji","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"8847","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Araya, Kibrom Desta","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"8848","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Arai, Ismail","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"8849","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Inoue, Hiroyuki","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"8850","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Fujikawa, Kazutoshi","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"37","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"30252729","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=30252729"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-02"}],"displaytype":"detail","filename":"1.pdf","filesize":[{"value":"1.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"fulltext","objectType":"fulltext","url":"https://naist.repo.nii.ac.jp/record/4198/files/1.pdf"},"version_id":"eebc9f0a-1fdd-4c53-86eb-86fb56c2fc58"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Automotive security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"controller area network","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"DoS attack","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"intrusion detection system","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"simulated annealing","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS Against DoS Attacks on In-Vehicle Networks","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS Against DoS Attacks on In-Vehicle Networks","subitem_title_language":"en"}]},"item_type_id":"7","owner":"4","path":["35"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-03-24"},"publish_date":"2020-03-24","publish_status":"0","recid":"4198","relation_version_is_last":true,"title":["Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS Against DoS Attacks on In-Vehicle Networks"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-11-29T08:22:04.474045+00:00"}