Skip to main content
SHARE
Publication

Towards a CAN IDS Based on a Neural Network Data Field Predictor...

by Krzysztof Pawelec, Robert A Bridges, Frank L Combs
Publication Type
Conference Paper
Journal Name
Proceedings of the ACM Workshop on Automotive Cybersecurity
Publication Date
Page Numbers
31 to 34
Volume
2019
Issue
1
Conference Name
ACM Workshop on Automotive Cybersecurity (AutoSec)in conjunction with ACM CODASPY 2019
Conference Location
Dallas, Texas, United States of America
Conference Sponsor
ACM
Conference Date

Modern vehicles contain a few controller area networks (CANs), which allow scores of on-board electronic control units (ECUs) to communicate messages critical to vehicle functions and driver safety. CAN provides a lightweight and reliable broadcast protocol but is bereft of security features. As evidenced by many recent research works, CAN exploits are possible both remotely and with direct access, fueling a growing CAN intrusion detection system (IDS) body of research. A challenge for pioneering vehicle-agnostic IDSs is that passenger vehicles' CAN message encodings are proprietary, defined and held secret by original equipment manufacturers (OEMs). Targeting detection of next-generation attacks, in which messages are sent from the expected ECU at the expected time but with malicious content, researchers are now seeking to leverage "CAN data models'', which predict future CAN messages and use prediction error to identify anomalous, hopefully malicious CAN messages. Yet, current works model CAN signals post-translation, i.e., after applying OEM-donated or reverse-engineered translations from raw data. We present initial IDS results testing deep neural networks used to predict CAN data at the bit level, targeting IDS capabilities that avoiding reverse engineering proprietary encodings. Our results suggest the method is promising for data with signals exhibiting dependence on previous or concurrent inputs.