Two-Step Algorithm to Detect Cyber-Attack Over the Can-Bus: A Preliminary Case Study in Connected Vehicles

Author(s):  
Marco Lombardi ◽  
Francesco Pascale ◽  
Domenico Santaniello

Abstract Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to Everything' (V2X), which indicates a system of communication between a vehicle to any entity that may influence the vehicle and vice versa. However, it introduces problems regarding the vehicle's IT security. It is possible, for example, by tampering with one of the Electronic Control Units (ECUs) to take partial or total control of the vehicle. In this paper, we introduce a preliminary study case to guarantee cybersecurity inside connected vehicles. In particular, an Intrusion Detection System over the CAN-Bus to allow the possible malicious massages. In particular, through the use of a two-step detection algorithm that exploits both the variation of the status parameters of the various ECUs over time and the Bayesian networks can identify a possible attack. The first experimental results seem encouraging.

2010 ◽  
Vol 34-35 ◽  
pp. 1305-1308 ◽  
Author(s):  
Guo Hui Zhang ◽  
Jian Fang Sun

In this paper the system architecture of the vehicular monitoring system based on high speed CAN bus and low speed CAN Bus and SAE J1939 so as to share information between different ECUs (Electronic Control Units) has been designed. Using Visual C++ 6.0, vehicular monitoring software platform has been developed to realize vehicular runtime parameters monitoring, device controllers monitoring and malfunction monitoring. Also a case study has been given, and the results of the system application are reasonable.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1765
Author(s):  
Francesco Pascale ◽  
Ennio Andrea Adinolfi ◽  
Simone Coppola ◽  
Emanuele Santonicola

Today’s modern vehicles are connected to a network and are considered smart objects of IoT, thanks to the capability to send and receive data from the network. One of the greatest challenges in the automotive sector is to make the vehicle secure and reliable. In fact, there are more connected instruments on a vehicle, such as the infotainment system and/or data interchange systems. Indeed, with the advent of new paradigms, such as Smart City and Smart Road, the vision of Internet of Things has evolved substantially. Today, we talk about the V2X systems in which the vehicle is strongly connected with the rest of the world. In this scenario, the main aim of all connected vehicles vendors is to provide a secure system to guarantee the safety of the drive and persons against a possible cyber-attack. So, in this paper, an embedded Intrusion Detection System (IDS) for the automotive sector is introduced. It works by adopting a two-step algorithm that provides detection of a possible cyber-attack. In the first step, the methodology provides a filter of all the messages on the Controller Area Network (CAN-Bus) thanks to the use of a spatial and temporal analysis; if a set of messages are possibly malicious, these are analyzed by a Bayesian network, which gives the probability that a given event can be classified as an attack. To evaluate the efficiency and effectiveness of our method, an experimental campaign was conducted to evaluate them, according to the classic evaluation parameters for a test’s accuracy. These results were compared with a common data set on cyber-attacks present in the literature. The first experimental results, obtained in a test scenario, seem to be interesting. The results show that our method has good correspondence in the presence of the most common cyber-attacks (DDoS, Fuzzy, Impersonating), obtaining a good score relative to the classic evaluation parameters for a test’s accuracy. These results have decreased performance when we test the system on a Free State Attack.


2018 ◽  
Vol 8 (10) ◽  
pp. 1995 ◽  
Author(s):  
Kun-Lin Lu ◽  
Edward Chu

Due to advances in medical technology, the elderly population has continued to grow. Elderly healthcare issues have been widely discussed—especially fall accidents—because a fall can lead to a fracture and have serious consequences. Therefore, the effective detection of fall accidents is important for both elderly people and their caregivers. In this work, we designed an Image-based FAll Detection System (IFADS) for nursing homes, where public areas are usually equipped with surveillance cameras. Unlike existing fall detection algorithms, we mainly focused on falls that occur while sitting down and standing up from a chair, because the two activities together account for a higher proportion of falls than forward walking. IFADS first applies an object detection algorithm to identify people in a video frame. Then, a posture recognition method is used to keep tracking the status of the people by checking the relative positions of the chair and the people. An alarm is triggered when a fall is detected. In order to evaluate the effectiveness of IFADS, we not only simulated different fall scenarios, but also adopted YouTube and Giphy videos that captured real falls. Our experimental results showed that IFADS achieved an average accuracy of 95.96%. Therefore, IFADS can be used by nursing homes to improve the quality of residential care facilities.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Faten Fakhfakh ◽  
Mohamed Tounsi ◽  
Mohamed Mosbah

PurposeNowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication rate. Even though it is an efficient standard which provides communication for in-vehicle networks, it is prone to various cybersecurity attacks. This paper aims to present a systematic literature review (SLR) which focuses on potential attacks on CAN bus networks. Then, it surveys the solutions proposed to overcome these attacks. In addition, it investigates the validation strategies aiming to check their accuracy and correctness.Design/methodology/approachThe authors have adopted the SLR methodology to summarize existing research papers that focus on the potential attacks on CAN bus networks. In addition, they compare the selected papers by classifying them according to the adopted validation strategies. They identify also gaps in the existing literature and provide a set of open challenges that can significantly improve the existing works.FindingsThe study showed that most of the examined papers adopted the simulation as a validation strategy to imitate the system behavior and evaluate a set of performance criteria. Nevertheless, a little consideration has been given to the formal verification of the proposed systems.Originality/valueUnlike the existing surveys, this paper presents the first SLR that identifies local and remote security attacks that can compromise in-vehicle and inter-vehicle communications. Moreover, it compares the reviewed papers while focusing on the used validation strategies.


Author(s):  
Bechoo Lal ◽  
Chandrahauns R Chavan

The researcher stated that critical analysis on attacks and defense modeling approach to cyber security which is one of the significant research issues in the computing environment. The researcher focused on some of the factors such as control the side of damage, perform forensic analysis, executive standard counter measures, perform threat detection and hunting, and gather threat intelligence. These all are the defense parameters which are stated to modeling approach in cyber security. During the research the researcher evaluated the security parameters including password strength, fraud detection system, firewall and others security parameters which are significant with respect to cyber attach and environment. The researcher shown statistical report on industries impacted by cyber-attacks worldwide as of September 2017. The researcher stated that passwords are basic cyber-security tool that people encounter nearly every day to prevent valuable data and highly sensitive information from unauthorized persons. The researcher represented an attack and defense modeling approach with the help of cyber security attributes such as information security, network security, operational security, end-user protection and application security. The researcher also stated that a case study of the 2016 Korean cyber command compromise: the victim of a prospering cyber-attack that allowed access to internal networks. Per usual with massive scale attacks against South Korean entities, the hack was straight off attributed to DPRK. Case study-2: cyber warfare conflict analysis and case studies, to analysis historical cyber warfare incidents from the past to the current and capture relevant information in a very information acquisition section.


2019 ◽  
Vol 3 (1) ◽  
pp. 1-8
Author(s):  
Sarmistha R. Majumdar

Fracking has helped to usher in an era of energy abundance in the United States. This advanced drilling procedure has helped the nation to attain the status of the largest producer of crude oil and natural gas in the world, but some of its negative externalities, such as human-induced seismicity, can no longer be ignored. The occurrence of earthquakes in communities located at proximity to disposal wells with no prior history of seismicity has shocked residents and have caused damages to properties. It has evoked individuals’ resentment against the practice of injection of fracking’s wastewater under pressure into underground disposal wells. Though the oil and gas companies have denied the existence of a link between such a practice and earthquakes and the local and state governments have delayed their responses to the unforeseen seismic events, the issue has gained in prominence among researchers, affected community residents, and the media. This case study has offered a glimpse into the varied responses of stakeholders to human-induced seismicity in a small city in the state of Texas. It is evident from this case study that although individuals’ complaints and protests from a small community may not be successful in bringing about statewide changes in regulatory policies on disposal of fracking’s wastewater, they can add to the public pressure on the state government to do something to address the problem in a state that supports fracking.


2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2021 ◽  
pp. 003232172110205
Author(s):  
Giulia Mariani ◽  
Tània Verge

Building on historical and discursive institutionalism, this article examines the agent-based dynamics of gradual institutional change. Specifically, using marriage equality in the United States as a case study, we examine how actors’ ideational work enabled them to make use of the political and discursive opportunities afforded by multiple venues to legitimize the process of institutional change to take off sequentially through layering, displacement, and conversion. We also pay special attention to how the discursive strategies deployed by LGBT advocates, religious-conservative organizations and other private actors created new opportunities to influence policy debates and tip the scales to their preferred policy outcome. The sequential perspective adopted in this study allows problematizing traditional conceptualizations of which actors support or contest the status quo, as enduring oppositional dynamics lead them to perform both roles in subsequent phases of the institutional change process.


Sign in / Sign up

Export Citation Format

Share Document