Change Point Models for Real-Time Cyber Attack Detection in Connected Vehicle Environment

被引:11
|
作者
Comert, Gurcan [1 ,2 ]
Rahman, Mizanur [3 ]
Islam, Mhafuzul [4 ]
Chowdhury, Mashrur [4 ]
机构
[1] Benedict Coll, Dept Comp Sci Phys & Engn, Columbia, SC 29204 USA
[2] Univ Illinois, Informat Trust Inst, Urbana, IL 61801 USA
[3] Univ Alabama, Dept Civil Construct & Environm Engn, Tuscaloosa, AL 35487 USA
[4] Clemson Univ, Glenn Dept Civil Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Adaptation models; Data models; Computational modeling; Cyberattack; Connected vehicles; Real-time systems; Anomaly detection; Cyber attack detection; connected vehicles; expectation maximization; CUSUM; roadside equipment; SECURITY; PRIVACY; SCHEME;
D O I
10.1109/TITS.2021.3113675
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Connected vehicle (CV) systems are subject to potential cyber attacks because of increasing connectivity between its different components, such as vehicles, roadside infrastructure, and traffic management centers. However, it is a challenge to detect security threats in real-time and develop appropriate or effective countermeasures for a CV system because of the dynamic behavior of such attacks, high computational power requirement, and a historical data requirement for training detection models. To address these challenges, statistical models, especially change point models, have potentials for real-time anomaly detection. Thus, the objective of this study is to investigate the efficacy of two change point models; Expectation Maximization (EM) and two forms of Cumulative Summation (CUSUM) algorithms (i.e., typical and adaptive), for real-time vehicle-to-infrastructure (V2I) cyber attack detection in a CV Environment. To prove the efficacy of these models, we evaluated these two models for three different types of cyber attack, denial of service (DOS), impersonation, and false information, using basic safety messages (BSMs) generated from CVs through simulation. Results from numerical analysis revealed that EM, CUSUM, and adaptive CUSUM (aCUSUM) could detect these cyberattacks, such as DOS, impersonation, and false information with low false positives.
引用
收藏
页码:12328 / 12342
页数:15
相关论文
共 50 条
  • [41] Real-time Energy Optimization of Hybrid Electric Vehicle in Connected Environment Based on Deep Reinforcement Learning
    He, Weiliang
    Huang, Ying
    IFAC PAPERSONLINE, 2021, 54 (10): : 176 - 181
  • [42] Real-time DDoS attack detection using FPGA
    Hoque, N.
    Kashyap, H.
    Bhattacharyya, D. K.
    COMPUTER COMMUNICATIONS, 2017, 110 : 48 - 58
  • [43] Efficient Data Collection and Accurate Travel Time Estimation in a Connected Vehicle Environment Via Real-Time Compressive Sensing
    Lei Lin
    Weizi Li
    Srinivas Peeta
    Journal of Big Data Analytics in Transportation, 2019, 1 (2-3): : 95 - 107
  • [44] Real-Time Simulation of a Cyber-Attack Scenario on a Power Distribution Substation
    Soria, Estefano
    Jackson, Justin E.
    Albunashee, Hamdi
    Farnell, Chris
    Mantooth, H. Alan
    2020 IEEE CYBERPELS (CYBERPELS), 2020,
  • [45] Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
    Alabdulatif, Abdullah
    Thilakarathne, Navod Neranjan
    Aashiq, Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 3655 - 3683
  • [46] Real-Time Cyber-Physical False Data Attack Detection in Smart Grids Using Neural Networks
    Ferragut, Erik M.
    Laska, Jason
    Olama, Mohammed M.
    Ozmen, Ozgur
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1 - +
  • [47] Real-time detection and tracking of light point
    Yang, Xuan
    Pei, Ji-Hong
    Yang, Wan-Hai
    2001, Chinese Optical Society (20):
  • [48] Real-time detection and tracking of light point
    Yang, X
    Pei, JH
    Yang, WH
    JOURNAL OF INFRARED AND MILLIMETER WAVES, 2001, 20 (04) : 279 - 282
  • [49] Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment
    Zhang, Yanghui
    Gao, Kai
    Huang, Shuo
    Li, Xunhao
    Du, Ronghua
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1333 - 1339
  • [50] OwlSight: Platform for Real-time Detection and Visualization of Cyber Threats
    Carvalho, Vasco Samuel
    Polidoro, Maria Joao
    Magalhaes, Joao Paulo
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 61 - 66