An Ontology Based Anomaly Detection System for Vehicular - - PowerPoint PPT Presentation

an ontology based anomaly detection system for vehicular
SMART_READER_LITE
LIVE PREVIEW

An Ontology Based Anomaly Detection System for Vehicular - - PowerPoint PPT Presentation

An Ontology Based Anomaly Detection System for Vehicular Communications Quentin Ricard, Philippe Owezarski qricard@laas.fr owe@laas.fr ERTS - 2020 10th European Congress on Embedded Real Time Software and Systems January 29, 2020 Laboratoire


slide-1
SLIDE 1

An Ontology Based Anomaly Detection System for Vehicular Communications

Quentin Ricard, Philippe Owezarski

qricard@laas.fr owe@laas.fr ERTS - 2020

10th European Congress on Embedded Real Time Software and Systems January 29, 2020 LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS Laboratoire conventionné avec l’Université Fédérale de Toulouse Midi-Pyrénées

slide-2
SLIDE 2

Outline

1 Context and Problem Statement 2 Our Contribution 3 Detection Evaluation 4 Conclusion

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 2/ 16

slide-3
SLIDE 3

Context

E-horizon project: Continental Improving 3 types of services:

1 Safety: Ex: Weather condition, maximum advised speed; 2 Fleet monitoring: Ex: fuel consumption, premature wear detection; 3 User experience: Ex: ETA, points of interest;

1 2 4 3

Implies creating a new communication channel between vehicles and the rest of the world

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 3/ 16

slide-4
SLIDE 4

Problem Statement

New attack vector

Jeep Cherokee, Miller and Valasek [2015] Nissan Leaf, Troy Hunt [2016] Volkswagen/Audi, Keuper and Alkemad Computest [2018]

How can we prevent these new attacks and protect vehicles? Anomaly Detection Apply existing methods to the automotive field:

Adapt algorithms to mobile network traffic; Use relevant communication datasets;

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 4/ 16

slide-5
SLIDE 5

Problem Statement

New attack vector

Jeep Cherokee, Miller and Valasek [2015] Nissan Leaf, Troy Hunt [2016] Volkswagen/Audi, Keuper and Alkemad Computest [2018]

How can we prevent these new attacks and protect vehicles? Anomaly Detection Apply existing methods to the automotive field:

Adapt algorithms to mobile network traffic; Use relevant communication datasets;

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 4/ 16

slide-6
SLIDE 6

Challenges

Nature of the communications Vehicle-related traffic:

Built from sensors and actuators of the vehicle.

User-related traffic:

Use of infotainment applications e.g. e-mails, music streaming.

Requirements for the detector Online Small footprint Broad spectrum of detection

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 5/ 16

slide-7
SLIDE 7

Ontological representation of the communications

Flow Class Differentiated by IPs and ports Frame Class Collection of packets received during δt window Packet Class Semantic description of the packet Entity Frame Frame Flow Flow features S SA A PA Packet Packet class Frame features Packet features LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 6/ 16

slide-8
SLIDE 8

Anomaly Detection Process

HTM

a( )

t Feature Extraction Monitor Symptom

π( )

Anomaly Score Detector

s( )

HTM algorithm Hierarchical temporal memory algorithm Hawkins and Blakeslee [2007] Online and unsupervised Ahmad et al. [2017]

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 7/ 16

slide-9
SLIDE 9

Anomaly representation and Inference Rules

What is considered anomalous ? Every frame whose anomaly score > threshold Related frames and flows over the same period Inference Rules Contaminated Frames Suspicious Flows Contextual Frames

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 8/ 16

slide-10
SLIDE 10

Inference Rules

Anomalous frame Contaminated frames Suspicious flow Contextual frame

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 9/ 16

slide-11
SLIDE 11

Evaluation

Autobot emulation environnement Ricard and Owezarski [2019] Communicating applications Telemetry and infotainment traffic Dynamic generation of anomalies Port Scan DNS Tunneling Telemetry anomaly

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 10/ 16

slide-12
SLIDE 12

Autobot

Docker

OS-level virtualization tool Containers embed realistic applications

Docker Network

Connects containers to one another & Internet Route packets

Traffic Control

Emulates cellular network connectivity Shapes the traffic

server

LTE

Docker Container docker network vehicle

Emulated World Emulation

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 11/ 16

slide-13
SLIDE 13

Embedded applications

Telemetry

Aggregated CAN bus data Sensoris message format Send messages over MQTT session

Infotainment

Spotifyd Waze

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 12/ 16

slide-14
SLIDE 14

Detection Evaluation

Label No Ontology Ontology No Inference Inference FPR 2.3% (97/3291) 3.4% (298/8736) 14% (1228/8736) Scan 0% (0/2) 0.6% (7/1024) 0.6% (7/1024) DNS 1.4% (3/211) 9.4% (25/264) 39.0% (103/264) Tele 3.7% (1/27) 27.2% (3/11) 90.9% (10/11) Frame based detection Detection of frames containing anomalies

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 13/ 16

slide-15
SLIDE 15

Comparison with other algorithms

Label HTM OCSVM DBSCAN S1 S2 S1 S2 S1 S2 FPR 6.6% 3.4% 0.16% 37.1% 68.3% 0% Scan 0.1% 0.6% 97.7% 97.7% 0% 0% DNS 6.1% 9.4% 0% 96.2% 100% 0% Tele 9% 27.2% 0% 90.1% 100% 0% Feature Set S1 : 44 features based on Lashkari et al. [2017]. S2 : packets/s, mean packet length in forward direction and average packet size.

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 14/ 16

slide-16
SLIDE 16

Conclusion

Detection Results and ontology HTM obtains good results with relatively few features Broad spectrum of detection Communication model has great impact on the detection Current and future work Feature selection instead of feature weighting Reduce false positives using score based on history (Anomaly likelihood)

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 15/ 16

slide-17
SLIDE 17

Thank you for your attention.

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 16/ 16

slide-18
SLIDE 18

References I

Subutai Ahmad, Alexander Lavin, Scott Purdy, and Zuha

  • Agha. Unsupervised real-time anomaly detection for

streaming data. Neurocomputing, 262:134–147, 2017.

  • Computest. The connected car-ways to get unauthorized

access and potential implications. Online: https://www.computest.nl/wp- content/uploads/2018/04/connected-car-rapport.pdf, 2018. Jeff Hawkins and Sandra Blakeslee. On intelligence: How a new understanding of the brain will lead to the creation of truly intelligent machines. Macmillan, 2007.

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 17/ 16

slide-19
SLIDE 19

References II

Troy Hunt. Controlling vehicle features of nissan leafs across the globe via vulnerable apis. 2016. Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, and Ali A Ghorbani. Characterization

  • f tor traffic using time based features. In ICISSP, pages

253–262, 2017. Charlie Miller and Chris Valasek. Remote exploitation of an unaltered passenger vehicle. 2015. Quentin Ricard and Philippe Owezarski. Autobot: An emulation environment for cellular vehicular

  • communications. In Proceedings of the 2019 IEEE/ACM

23rd International Symposium on Distributed Simulation and Real Time Applications. IEEE Computer Society, 2019.

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 18/ 16

slide-20
SLIDE 20

HTM

Proximal connection Distal connection Sparse Distributed Representation

Spatial Pooler Input Encoder

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 19/ 16

slide-21
SLIDE 21

Features

totalfpackets totalbpackets totalfpktl totalbpktl fpktspersecond bpktspersecond flowpktspersecond flowbytespersecond minfpktl minbpktl maxfpktl maxbpktl meanfpktl meanbpktl stdfpktl stdbpktl varfpktl varbpktl totalfiat totalbiat minfiat minbiat maxfiat maxbiat meanfiat meanbiat stdfiat stdbiat varfiat varbiat varflowpktl varflowiat minflowpktl maxflowpktl meanflowpktl stdflowpktl minflowiat maxflowiat meanflowiat stdflowiat

Table: Features stored inside the ontology

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 20/ 16

slide-22
SLIDE 22

Tools

Docker

https://docs.docker.com/v17.09/

Traffic-control :

http://man7.org/linux/man-pages/man8/tc- netem.8.html

Spotifyd

https://github.com/Spotifyd/spotifyd

LAAS-CNRS / Laboratoire d’analyse et d’architecture des systèmes du CNRS 21/ 16