Affiliation:
1. Department of Computer Science, University of Bari, 70125 Bari, Italy
2. Departamento de Tecnologías y Sistemas de Información, University of Castilla-La Mancha, 13001 Ciudad Real, Spain
Abstract
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operation center for improving automotive security (V-SOC4AS) to enhance the detection, response, and prevention of cyber-attacks in the automotive context. The goal is to monitor in real-time each subsystem of intra-vehicle communication, that is controller area network (CAN), local interconnect network (LIN), FlexRay, media oriented systems transport (MOST), and Ethernet. Therefore, to achieve this goal, security information and event management (SIEM) was used to monitor and detect malicious attacks in intra-vehicle and inter-vehicle communications: messages transmitted between vehicle ECUs; infotainment and telematics systems, which provide passengers with entertainment capabilities and information about the vehicle system; and vehicular ports, which allow vehicles to connect to diagnostic devices, upload content of various types. As a result, this allows the automation and improvement of threat detection and incident response processes. Furthermore, the V-SOC4AS allows the classification of the received message as malicious and non-malicious and acquisition of additional information about the type of attack. Thus, this reduces the detection time and provides more support for response activities. Experimental evaluation was conducted on two state-of-the-art attacks: denial of service (DoS) and fuzzing. An open-source dataset was used to simulate the vehicles. V-SOC4AS exploits security information and event management to analyze the packets sent by a vehicle using a rule-based mechanism. If the payload contains a CAN frame attack, it is notified to the SOC analysts.
Funder
Secure Safe Apulia—Regional Security Center
KEIRETSU
Subject
Computational Mathematics,Computational Theory and Mathematics,Numerical Analysis,Theoretical Computer Science
Reference41 articles.
1. Attacks and Defences on Intelligent Connected Vehicles: A Survey;Dibaei;Digit. Commun. Netw.,2020
2. Bozdal, M., Samie, M., and Jennions, I. (2018, January 16–17). A Survey on Can Bus Protocol: Attacks, Challenges, and Potential Solutions. Proceedings of the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK.
3. A Survey of Remote Automotive Attack Surfaces;Miller;Black Hat USA,2014
4. Palanca, A., Evenchick, E., Maggi, F., and Zanero, S. (2017, January 6–7). A Stealth, Selective, Link-Layer Denial-of-Service Attack against Automotive Networks. Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Bonn, Germany.
5. (2023, February 07). Tencent Security Keen Lab Experimental Security Assessment of Mercedes-Benz Cars, Mercedes-Benz MBUX Security Research Report. Available online: https://keenlab.tencent.com/en/whitepapers/Mercedes_Benz_Security_Research_Report_Final.pdf.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献