Alfredo Cuzzocrea, Francesco Mercaldo, Fabio Martinelli
International Conference on Knowledge-Based and Intelligent Information & Engineering Systems KES 2020
https://doi.org/10.1016/j.procs.2020.09.203
Modern vehicles contain a plethora of electronic units aimed to send and receive data by exploiting the serial communication provided by the CAN bus. CAN packets are broadcasted to all components and it is in charge of the single component to decide if it is the receiver of the packets. Furthermore, this protocol does not provide source identification of authentication: for these reason it clear that the CAN bus can be easily exposed to attacks. In this paper we propose a method to detect CAN bus targeting attacks. We take into account deep learning algorithms and we evaluate the proposed method by exploiting CAN messages obtained from a real vehicle injecting four different attacks (i.e. dos, fuzzy, gear and rpm), with interesting results in CAN bus attacks detection.
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use