期刊文献+

基于关联规则与离群点的新能源汽车动力域入侵检测

Intrusion Detection in New Energy Vehicle Power Domains Based on Association Rules and Outlier Detection
下载PDF
导出
摘要 为提高新能源汽车动力域中针对篡改攻击的入侵检测系统效果,建立包括关联规则检测和离群点检测的动力域防护模型,通过实车采集固定工况下的动力域报文数据,基于关联规则算法建立规则库检测篡改攻击;在关联规则检测的基础上通过离群点检测,检测复杂类型的篡改攻击。仿真结果表明,该方法相比于传统的关联规则方法检测准确率提高5.83%,能有效检测针对新能源汽车动力域的篡改攻击。 To improve the effectiveness of intrusion detection systems against tampering attacks in the power domain of new energy vehicles,a power domain protection model is established,including both association rule detection and outlier detection.By collecting the power domain messages from the actual vehicles and establishing a rule base using the association rule algorithm,this model aims to detect tampering attacks.On the basis of association rule detection,complex types of tampering attacks are identified through outlier detection.The simulation results show that this method improves the detection accuracy by 5.83%compared to traditional association rule methods,effectively detecting tampering attacks in the power domain of new energy vehicles.
作者 余辰熠 魏洪乾 张幽彤 YU Chenyi;WEI Hongqian;ZHANG Youtong(School of Mechanical and Vehicular Engineering,Beijing Institute of Technology,Beijing 100081,China;Vehicle Measurement,Control and Safety Key Laboratory of Sichuan Province,Chengdu 610039,China)
出处 《汽车工程学报》 2024年第3期412-421,共10页 Chinese Journal of Automotive Engineering
关键词 动力域 篡改攻击 入侵检测系统 关联规则 离群点检测 automobile power domain tampering attacks intrusion detection systems association rules outlier detection
  • 相关文献

参考文献7

二级参考文献53

  • 1Miller C, Valasek C. Adventures in automotive net- works and control units[C]//DEFCON 21 Hacking Conference, Las Vegas,2013. 被引量:1
  • 2Miller C, Valasek C. A survey of remote automotive attack surfaces[C] // Black Hat, Las Vegas, USA, 2014. 被引量:1
  • 3Miller C, Valasek C. Remote Exploitation of an Un- altered Passenger Vehicle[C] // Black Hat, Las Ve- gas,USA, 2015. 被引量:1
  • 4Leinmtiller T, Buttyan L, Hubaux J P, et al. Seve- corn-secure vehicle communication[C]//IST Mobile and Wireless Communication Summit, Myconos Greece,2006. 被引量:1
  • 5European Commission within the Seventh Frame- work Programme. E-safety vehicle intrusion protec- ted applications (EVITA) project [OB/OL]. ht- tp ://www. evitaproject, org. 被引量:1
  • 6Groza B, Murvay S. Broadcast Authentication in a Low Speed Controller Area Network[M]. E-Busi- ness and Telecommunications: Springer, 2012: 330- 344. 被引量:1
  • 7Groza B, Murvay S. Efficient protocols for secure broadcast in controller area networks[J]. IEEE Transactions on Industrial Informatics, 2013, 9(4): 2034-2042. 被引量:1
  • 8Groza B, Murvay S, van Herrewege A, et al. Libra- can: a Lightweight Broadcast Authentication Proto- col for Controller Area Networks[M]. Cryptology and Network Seeurity: Springer, 2012: 185-200. 被引量:1
  • 9Murray P S, Groza B. Source identification using signal characteristics in controller area networks[J]. Signal Processing Letters,2014, 21(4): 395-399. 被引量:1
  • 10Lin Chung-wei, Sangiovanni-Vincentelli A. Cyber- security for the controller area network (CAN) communication protocol[C]//International Confer- ence on Cyber Security, Washingtong DC, 2012: 1-7. 被引量:1

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部