Change Point Models for Real-Time Cyber Attack Detection in Connected Vehicle Environment

被引:11
|
作者
Comert, Gurcan [1 ,2 ]
Rahman, Mizanur [3 ]
Islam, Mhafuzul [4 ]
Chowdhury, Mashrur [4 ]
机构
[1] Benedict Coll, Dept Comp Sci Phys & Engn, Columbia, SC 29204 USA
[2] Univ Illinois, Informat Trust Inst, Urbana, IL 61801 USA
[3] Univ Alabama, Dept Civil Construct & Environm Engn, Tuscaloosa, AL 35487 USA
[4] Clemson Univ, Glenn Dept Civil Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Adaptation models; Data models; Computational modeling; Cyberattack; Connected vehicles; Real-time systems; Anomaly detection; Cyber attack detection; connected vehicles; expectation maximization; CUSUM; roadside equipment; SECURITY; PRIVACY; SCHEME;
D O I
10.1109/TITS.2021.3113675
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Connected vehicle (CV) systems are subject to potential cyber attacks because of increasing connectivity between its different components, such as vehicles, roadside infrastructure, and traffic management centers. However, it is a challenge to detect security threats in real-time and develop appropriate or effective countermeasures for a CV system because of the dynamic behavior of such attacks, high computational power requirement, and a historical data requirement for training detection models. To address these challenges, statistical models, especially change point models, have potentials for real-time anomaly detection. Thus, the objective of this study is to investigate the efficacy of two change point models; Expectation Maximization (EM) and two forms of Cumulative Summation (CUSUM) algorithms (i.e., typical and adaptive), for real-time vehicle-to-infrastructure (V2I) cyber attack detection in a CV Environment. To prove the efficacy of these models, we evaluated these two models for three different types of cyber attack, denial of service (DOS), impersonation, and false information, using basic safety messages (BSMs) generated from CVs through simulation. Results from numerical analysis revealed that EM, CUSUM, and adaptive CUSUM (aCUSUM) could detect these cyberattacks, such as DOS, impersonation, and false information with low false positives.
引用
收藏
页码:12328 / 12342
页数:15
相关论文
共 50 条
  • [1] Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems
    Biron, Zoleikha Abdollahi
    Dey, Satadru
    Pisu, Pierluigi
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (12) : 3893 - 3902
  • [2] Real-Time Cyber Attack Detection Scheme for Standalone Microgrids
    Aluko, Anuoluwapo O.
    Carpanen, Rudiren Pillay
    Dorrell, David G.
    Ojo, Evans E.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) : 21481 - 21492
  • [3] Real-time False Data Injection Attack Detection in Connected Vehicle Systems with PDE modeling
    Biroon, Roghieh A.
    Pisu, Pierluigi
    Abdollahi, Zoleikha
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 3267 - 3272
  • [4] A real-time adaptive signal control in a connected vehicle environment
    Feng, Yiheng
    Head, K. Larry
    Khoshmagham, Shayan
    Zamanipour, Mehdi
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2015, 55 : 460 - 473
  • [5] Real-Time Cyber Attack Detection Over HoneyPi Using Machine Learning
    Alhan, Birkan
    Gonen, Serkan
    Karacayilmaz, Gokce
    Bariskan, Mehmet Ali
    Yilmaz, Ercan Nurcan
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (04): : 1394 - 1401
  • [6] Real-time change point detection in linear models using the ranking selection procedure
    Gu, Chao
    Ratnasingam, Suthakaran
    SEQUENTIAL ANALYSIS-DESIGN METHODS AND APPLICATIONS, 2023, 42 (02): : 129 - 149
  • [7] On the Feasibility of Real-Time Cyber Attack Attribution on the Internet
    Wang, Xinyuan
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 289 - 294
  • [8] Cyber Attack Estimation for Intelligent Connected Vehicle
    Song, Yanzhen
    Pan, Juntao
    Yang, Weixin
    Bian, Xiangyuan
    Zhang, Xueyuan
    Gao, Xulang
    2024 IEEE 19TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, ICIEA 2024, 2024,
  • [9] Real-Time Adaptive Sensor Attack Detection in Autonomous Cyber-Physical Systems
    Akowuah, Francis
    Kong, Fanxin
    2021 IEEE 27TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2021), 2021, : 237 - 250
  • [10] Real-Time Sensor Anomaly Detection and Recovery in Connected Automated Vehicle Sensors
    Wang, Yiyang
    Masoud, Neda
    Khojandi, Anahita
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (03) : 1411 - 1421