an ontology based anomaly detection system for vehicular
play

An Ontology Based Anomaly Detection System for Vehicular - PowerPoint PPT Presentation

An Ontology Based Anomaly Detection System for Vehicular Communications Quentin Ricard, Philippe Owezarski qricard@laas.fr owe@laas.fr ERTS - 2020 10th European Congress on Embedded Real Time Software and Systems January 29, 2020 Laboratoire


  1. An Ontology Based Anomaly Detection System for Vehicular Communications Quentin Ricard, Philippe Owezarski qricard@laas.fr owe@laas.fr ERTS - 2020 10th European Congress on Embedded Real Time Software and Systems January 29, 2020 Laboratoire conventionné LAAS-CNRS avec l’Université Fédérale / Laboratoire d’analyse et d’architecture des systèmes du CNRS de Toulouse Midi-Pyrénées

  2. Outline 1 Context and Problem Statement 2 Our Contribution 3 Detection Evaluation 4 Conclusion LAAS-CNRS 2/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  3. Context E-horizon project: Continental 2 Improving 3 types of services: 3 1 Safety: Ex: Weather condition, maximum advised speed; 4 2 Fleet monitoring: 1 Ex: fuel consumption, premature wear detection; 3 User experience: Ex: ETA, points of interest; Implies creating a new communication channel between vehicles and the rest of the world LAAS-CNRS 3/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  4. Problem Statement New attack vector Jeep Cherokee, Miller and Valasek [2015] Nissan Leaf, Troy Hunt [2016] Volkswagen/Audi, Keuper and Alkemad Computest [2018] How can we prevent these new attacks and protect vehicles? Anomaly Detection Apply existing methods to the automotive field: Adapt algorithms to mobile network traffic; Use relevant communication datasets; LAAS-CNRS 4/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  5. Problem Statement New attack vector Jeep Cherokee, Miller and Valasek [2015] Nissan Leaf, Troy Hunt [2016] Volkswagen/Audi, Keuper and Alkemad Computest [2018] How can we prevent these new attacks and protect vehicles? Anomaly Detection Apply existing methods to the automotive field: Adapt algorithms to mobile network traffic; Use relevant communication datasets; LAAS-CNRS 4/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  6. Challenges Nature of the communications Vehicle-related traffic: Built from sensors and actuators of the vehicle. User-related traffic: Use of infotainment applications e.g. e-mails, music streaming. Requirements for the detector Online Small footprint Broad spectrum of detection LAAS-CNRS 5/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  7. Ontological representation of the communications Flow Class Flow Flow features Differentiated by IPs and ports Frame Entity Frame Class Frame Frame features Collection of packets received during δ t window Packet Class Packet features Packet Semantic description of the packet S SA A PA Packet class LAAS-CNRS 6/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  8. Anomaly Detection Process t a( ) s( ) Feature HTM Anomaly Score Extraction π ( ) Symptom Monitor Detector HTM algorithm Hierarchical temporal memory algorithm Hawkins and Blakeslee [2007] Online and unsupervised Ahmad et al. [2017] LAAS-CNRS 7/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  9. Anomaly representation and Inference Rules What is considered anomalous ? Every frame whose anomaly score > threshold Related frames and flows over the same period Inference Rules Contaminated Frames Suspicious Flows Contextual Frames LAAS-CNRS 8/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  10. Inference Rules Anomalous frame Contaminated frames Suspicious flow Contextual frame LAAS-CNRS 9/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  11. Evaluation Autobot emulation environnement Ricard and Owezarski [2019] Communicating applications Telemetry and infotainment traffic Dynamic generation of anomalies Port Scan DNS Tunneling Telemetry anomaly LAAS-CNRS 10/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  12. Autobot Docker LTE OS-level virtualization tool Containers embed realistic applications vehicle Docker Network server Emulated World Connects containers to one another & Internet Route packets Docker Traffic Control Container docker network Emulates cellular network Emulation connectivity Shapes the traffic LAAS-CNRS 11/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  13. Embedded applications Telemetry Aggregated CAN bus data Sensoris message format Send messages over MQTT session Infotainment Spotifyd Waze LAAS-CNRS 12/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  14. Detection Evaluation Ontology Label No Ontology No Inference Inference FPR 2.3% (97/3291) 3.4% (298/8736) 14% (1228/8736) Scan 0% (0/2) 0.6% (7/1024) 0.6% (7/1024) DNS 1.4% (3/211) 9.4% (25/264) 39.0% (103/264) Tele 3.7% (1/27) 27.2% (3/11) 90.9% (10/11) Frame based detection Detection of frames containing anomalies LAAS-CNRS 13/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  15. Comparison with other algorithms HTM OCSVM DBSCAN Label S1 S2 S1 S2 S1 S2 FPR 6.6% 3.4% 0.16% 37.1% 68.3% 0% Scan 0.1% 0.6% 97.7% 97.7% 0% 0% DNS 6.1% 9.4% 0% 96.2% 100% 0% Tele 9% 27.2% 0% 90.1% 100% 0% Feature Set S1 : 44 features based on Lashkari et al. [2017]. S2 : packets/s, mean packet length in forward direction and average packet size. LAAS-CNRS 14/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  16. Conclusion Detection Results and ontology HTM obtains good results with relatively few features Broad spectrum of detection Communication model has great impact on the detection Current and future work Feature selection instead of feature weighting Reduce false positives using score based on history (Anomaly likelihood) LAAS-CNRS 15/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  17. Thank you for your attention. LAAS-CNRS 16/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  18. References I Subutai Ahmad, Alexander Lavin, Scott Purdy, and Zuha Agha. Unsupervised real-time anomaly detection for streaming data. Neurocomputing , 262:134–147, 2017. Computest. The connected car-ways to get unauthorized access and potential implications. Online: https://www.computest.nl/wp- content/uploads/2018/04/connected-car-rapport.pdf , 2018. Jeff Hawkins and Sandra Blakeslee. On intelligence: How a new understanding of the brain will lead to the creation of truly intelligent machines . Macmillan, 2007. LAAS-CNRS 17/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  19. References II Troy Hunt. Controlling vehicle features of nissan leafs across the globe via vulnerable apis. 2016. Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, and Ali A Ghorbani. Characterization of tor traffic using time based features. In ICISSP , pages 253–262, 2017. Charlie Miller and Chris Valasek. Remote exploitation of an unaltered passenger vehicle. 2015. Quentin Ricard and Philippe Owezarski. Autobot: An emulation environment for cellular vehicular communications. In Proceedings of the 2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications . IEEE Computer Society, 2019. LAAS-CNRS 18/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  20. HTM Distal connection Input Spatial Pooler Proximal connection Encoder Sparse Distributed Representation LAAS-CNRS 19/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  21. Features totalfpackets totalbpackets totalfpktl totalbpktl fpktspersecond bpktspersecond flowpktspersecond flowbytespersecond minfpktl minbpktl maxfpktl maxbpktl meanfpktl meanbpktl stdfpktl stdbpktl varfpktl varbpktl totalfiat totalbiat minfiat minbiat maxfiat maxbiat meanfiat meanbiat stdfiat stdbiat varfiat varbiat varflowpktl varflowiat minflowpktl maxflowpktl meanflowpktl stdflowpktl minflowiat maxflowiat meanflowiat stdflowiat Table: Features stored inside the ontology LAAS-CNRS 20/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

  22. Tools Docker https://docs.docker.com/v17.09/ Traffic-control : http://man7.org/linux/man-pages/man8/tc- netem.8.html Spotifyd https://github.com/Spotifyd/spotifyd LAAS-CNRS 21/ 16 / Laboratoire d’analyse et d’architecture des systèmes du CNRS

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend