Analysis of ID sequences similarity using DTW in intrusion detection for CAN bus

H Sun, M Sun, J Weng, Z Liu - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
Connected vehicles have recently attracted considerable attention for revolutionizing the
transportation industry. Although connectivity brings about a vast number of benefits, it can …

SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN

J Song, G Qin, Y Liang, J Yan, M Sun - Computers & Security, 2024 - Elsevier
Due to the absence of encryption and authentication mechanisms in the Controller Area
Network (CAN), it is highly susceptible to attacks, especially with the increasing connectivity …

ID sequence analysis for intrusion detection in the CAN bus using long short term memory networks

AK Desta, S Ohira, I Arai… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The number of computer controlled vehicles throughout the world is rising at a staggering
speed. Even though this enhances the driving experience, it opens a new security hole in …

Anomaly detection in vehicular CAN bus using message identifier sequences

TCM Dönmez - IEEE Access, 2021 - ieeexplore.ieee.org
As the automotive industry moves forward, security of vehicular networks becomes
increasingly important. Controller area network (CAN bus) remains as one of the most …

STC‐IDS: Spatial–temporal correlation feature analyzing based intrusion detection system for intelligent connected vehicles

P Cheng, M Han, A Li, F Zhang - International Journal of …, 2022 - Wiley Online Library
Intrusion detection is an important defensive measure for automotive communications
security. Accurate frame detection models assist vehicles to avoid malicious attacks …

Universal intrusion detection system on in-vehicle network

MR Islam, I Oh, K Yim - International Conference on Innovative Mobile and …, 2023 - Springer
Abstract The Controller Area Network (CAN) protocol is widely used in automotive and
industrial applications for communication. However, the lack of authentication and …

Anomaly intrusion detection method for vehicular networks based on survival analysis

ML Han, BI Kwak, HK Kim - Vehicular communications, 2018 - Elsevier
In recent years, alongside with the convergence of In-vehicle network (IVN) and wireless
communication technology, vehicle communication technology has been steadily …

Cosine similarity based anomaly detection methodology for the CAN bus

BI Kwak, ML Han, HK Kim - Expert Systems with Applications, 2021 - Elsevier
In recent years, vehicular technology has rapidly evolved in terms of the driver's
convenience and safety, along with the convergence of vehicle communication and the …

Detecting attacks to internal vehicle networks through Hamming distance

D Stabili, M Marchetti… - 2017 AEIT International …, 2017 - ieeexplore.ieee.org
Analysis of in-vehicle networks is an open research area that gained relevance after recent
reports of cyber attacks against connected vehicles. After those attacks gained international …

A lightweight intrusion detection system for can protocol using neighborhood similarity

RUD Refat, AA Elkhail, H Malik - 2022 7th International …, 2022 - ieeexplore.ieee.org
The Controller Area Network (CAN) protocol is the most commonly used communication
protocol for in-vehicle networks due to its simplicity, efficiency and robustness. However, the …