Software in modern vehicles is becoming increasingly complex and subject to vulnerabilities that an intruder can exploit to alter the functionality of vehicles. To this purpose, %The United Nations require we introduce CAHOOT, a novel context-aware Intrusion Detection System (IDS) capable of detecting potential intrusions in both human and autonomous driving modes.In CAHOOT, context information consists of data collected at run-time by vehicle's sensors and engine. Such information is used to determine drivers' habits and information related to the environment, like traffic conditions. In this paper, we create and use a dataset by using a customised version of the MetaDrive simulator capable of collecting both human and AI driving data. Then we simulate several types of intrusions while driving: denial of service, spoofing and replay attacks. As a final step, we use the generated dataset to evaluate the CAHOOT algorithm by using several machine learning methods. The results show that CAHOOT is extremely reliable in detecting intrusions.
CAHOOT: A Context-Aware veHicular intrusiOn detectiOn sysTem
G Costantino;I Matteucci;
2022
Abstract
Software in modern vehicles is becoming increasingly complex and subject to vulnerabilities that an intruder can exploit to alter the functionality of vehicles. To this purpose, %The United Nations require we introduce CAHOOT, a novel context-aware Intrusion Detection System (IDS) capable of detecting potential intrusions in both human and autonomous driving modes.In CAHOOT, context information consists of data collected at run-time by vehicle's sensors and engine. Such information is used to determine drivers' habits and information related to the environment, like traffic conditions. In this paper, we create and use a dataset by using a customised version of the MetaDrive simulator capable of collecting both human and AI driving data. Then we simulate several types of intrusions while driving: denial of service, spoofing and replay attacks. As a final step, we use the generated dataset to evaluate the CAHOOT algorithm by using several machine learning methods. The results show that CAHOOT is extremely reliable in detecting intrusions.File | Dimensione | Formato | |
---|---|---|---|
prod_474039-doc_193296.pdf
accesso aperto
Descrizione: CAHOOT
Tipologia:
Versione Editoriale (PDF)
Licenza:
Creative commons
Dimensione
729.08 kB
Formato
Adobe PDF
|
729.08 kB | Adobe PDF | Visualizza/Apri |
prod_474039-doc_204337.pdf
accesso aperto
Descrizione: CAHOOT
Tipologia:
Versione Editoriale (PDF)
Licenza:
Creative commons
Dimensione
869.3 kB
Formato
Adobe PDF
|
869.3 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.