[HTML][HTML] can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection

B Lampe, W Meng - Computers & Security, 2024 - Elsevier
When it comes to in-vehicle networks (IVNs), the controller area network (CAN) bus
dominates the market; automobiles manufactured and sold worldwide depend on the CAN …

[HTML][HTML] V-soc4as: A vehicle-soc for improving automotive security

VS Barletta, D Caivano, MD Vincentiis, A Ragone… - Algorithms, 2023 - mdpi.com
Integrating embedded systems into next-generation vehicles is proliferating as they increase
safety, efficiency, and driving comfort. These functionalities are provided by hundreds of …

A multidisciplinary detection system for cyber attacks on powertrain cyber physical systems

D Stabili, R Romagnoli, M Marchetti, B Sinopoli… - Future Generation …, 2023 - Elsevier
With the introduction of external connectivity to modern vehicles, both academic and industry
security practitioners addressed the issues related to external communication interfaces …

[HTML][HTML] An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network

T Kim, J Kim, I You - Electronics, 2023 - mdpi.com
The CAN (Controller Area Network) protocol is widely adopted for in-vehicle networks due to
its cost efficiency and reliable transmission. However, despite its popularity, the protocol …

Performance comparison of timing-based anomaly detectors for controller area network: A reproducible study

F Pollicino, D Stabili, M Marchetti - ACM Transactions on Cyber-Physical …, 2024 - dl.acm.org
This work presents an experimental evaluation of the detection performance of eight
different algorithms for anomaly detection on the Controller Area Network (CAN) bus of …

Comparison of machine learning-based anomaly detectors for controller area network

A Venturi, D Stabili, F Pollicino… - 2022 IEEE 21st …, 2022 - ieeexplore.ieee.org
This paper presents a comparative analysis of different Machine Learning-based detection
algorithms designed for Controller Area Network (CAN) communication on three different …

Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features …

M Hassaoui, M Hanini, S El Kafhali - Journal of Network and Systems …, 2024 - Springer
Abstract Domain Generation Algorithms (DGAs) are often used for generating huge amounts
of domain names to maintain command and control between the infected computer and the …

Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles

JRV Solaas, N Tuptuk, E Mariconti - arXiv preprint arXiv:2405.02731, 2024 - arxiv.org
This systematic review focuses on anomaly detection for connected and autonomous
vehicles. The initial database search identified 2160 articles, of which 203 were included in …

DGIDS: Dynamic graph-based intrusion detection system for CAN

J Song, G Qin, Y Liang, J Yan, M Sun - Computers & Security, 2024 - Elsevier
Abstract The Controller Area Network (CAN) is widely used in automobiles to interconnect
safety-critical electronic control units (ECUs). Unfortunately, CAN does not have inherent …

SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN

J Song, G Qin, Y Liang, J Yan, M Sun - Computers & Security, 2024 - Elsevier
Due to the absence of encryption and authentication mechanisms in the Controller Area
Network (CAN), it is highly susceptible to attacks, especially with the increasing connectivity …