Anomaly Detection Methodology of In-vehicle Network Based on Graph Pattern Matching


  •  Mengsi Sun    
  •  Jiarun Wu    

Abstract

Vehicles are becoming more and more connected today, with many direct interfaces and infotainment units widely deployed in in-vehicle networks. However, the increase in interfaces and units can also lead to an increase in cyberattacks surfaces. As the de facto standard for the in-vehicle network protocol, the Controller Area Network (CAN) protocol provides an efficient, stable, and cost-effective communication channel between electric control units (ECUs). Nonetheless, it is increasingly threatened by cyberattack due to the lack of security mechanisms by design. This paper proposes a novel anomaly detection methodology based on graph pattern matching, which expresses CAN traffic in terms of graph structures. Given a base graph and window graph, we determine whether the window graph represents normal or anomaly by using the distance measure on the base graph. We have validated this anomaly detection methodology on public datasets and in an actual vehicle environment. Experimental results show that this methodology significantly improved the detection of unknown attacks and outperforms other CAN traffic-based approaches.


This work is licensed under a Creative Commons Attribution 4.0 License.
  • ISSN(Print): 1913-8989
  • ISSN(Online): 1913-8997
  • Started: 2008
  • Frequency: semiannual

Journal Metrics

WJCI (2022): 0.636

Impact Factor 2022 (by WJCI):  0.419

h-index (January 2024): 43

i10-index (January 2024): 193

h5-index (January 2024): N/A

h5-median(January 2024): N/A

( The data was calculated based on Google Scholar Citations. Click Here to Learn More. )

Contact