Design and implementation of an intrusion detection system (IDS) for in-vehicle networks
Presented by: Noräs Salman Credits to my thesis partner: Marco Bresch
Design and implementation of an intrusion detection system (IDS) for - - PowerPoint PPT Presentation
Design and implementation of an intrusion detection system (IDS) for in-vehicle networks Presented by: Nors Salman Credits to my thesis partner: Marco Bresch Brief background: in-vehicle networks Controller Area Network (CAN) MOST
Presented by: Noräs Salman Credits to my thesis partner: Marco Bresch
2
3
4
5
Sniffing Dropping Tampering of legitimate frames Injecting of arbitrary frames + DoS Sending Node Receiving Node Receiving Node
Broadcasting Collision Avoidance
6
7
8
Nodes we add:
Attacker IDS
9
10
Virtual nodes we add:
Attacker IDS
11 Snort (Computer System) Our design (in-vehicle IDS)
12
○ Rules extracted from signal database and compared directly.
○ White-list extracted from the signal database. 13
White-list
14
Test 2 Virtual attacker node + Virtual IDS node Test 1 Virtual attacker node + Virtual IDS node
15
16 Threshold = 20 (raw) ≈ 16 (km/h) Algorithm simplified x = abs( speed(t)-speed(t-1) ) if (x >= threshold) → raise an alarm
○ Injected speed value is constant during the attack
○ Injected speed value is changing during the attack
17
18
The message here has 2 ms as cycle time Irregular shifts (clock skew)
Algorithm simplified attack = false if( (T(mt)-T(mt-1) < cycle_time){ attack =true attack_count++ if (attack_count > 1) → raise an alarm } if(!attack && count>0){ attack_count=0 }
First check Second check
19
Aggressive injection Smaller cycle time Identical cycle time
○ ECUs have limited capabilities, but we didn’t have a problem with that.
○ We suggest placing an IDS node in each domain for full coverage and lower load.
○ Plausibility detection should depend on acceleration capabilities, we only used a simulation
20
21
22
23 Monitors the signal’s value Detects the beginning and the end of an attack Monitors the message frequency Detects the whole attack