Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review
The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents....
Gespeichert in:
Veröffentlicht in: | arXiv.org 2024-02 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Shaila Sharmin Mansor, Hafizah Andi Fitriah Abdul Kadir Aziz, Normaziah A |
description | The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified. |
doi_str_mv | 10.48550/arxiv.2402.06904 |
format | Article |
fullrecord | <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2402_06904</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2925758375</sourcerecordid><originalsourceid>FETCH-LOGICAL-a954-71e86d42db0f53ebda5713fb002666e237650529ad84fcd448ec92ba4069f5d23</originalsourceid><addsrcrecordid>eNotkMtOwzAQRS0kJKrSD2CFJTawSHH8yINdCBQqVUWi3UdOPIG0TVxsJ6V_T9KymtHMndG9B6Ebn0x5JAR5lOa36qaUEzolQUz4BRpRxnwv4pReoYm1G0IIDUIqBBuh7hma4ruWZls1X3hmZA0HbbYWy0bhVNd7aaSrOsAr16oKLNZlP26c0bsdGJwYkHgJbrjB92myfMDzftnaSjf4BRwUbuhWR-ugtk84wZ_QVXC4Rpel3FmY_NcxWs9e1-m7t_h4m6fJwpOx4F7oQxQoTlVOSsEgV1KEPivzwX8QAGVhIIigsVQRLwvFeQRFTHPJ--ClUJSN0e357QlKtjdVn_SYDXCyE5xecXdW7I3-acG6bKNb0_SeMhpTEYqIhYL9AaaKZ74</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2925758375</pqid></control><display><type>article</type><title>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</title><source>Freely Accessible Journals</source><source>arXiv.org</source><creator>Shaila Sharmin ; Mansor, Hafizah ; Andi Fitriah Abdul Kadir ; Aziz, Normaziah A</creator><creatorcontrib>Shaila Sharmin ; Mansor, Hafizah ; Andi Fitriah Abdul Kadir ; Aziz, Normaziah A</creatorcontrib><description>The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2402.06904</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Automobiles ; Benchmarks ; Comparative studies ; Computer Science - Cryptography and Security ; Controller area network ; Controllers ; Design analysis ; In vehicle ; Intrusion detection systems ; Workload ; Workloads</subject><ispartof>arXiv.org, 2024-02</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,780,881,27902</link.rule.ids><backlink>$$Uhttps://doi.org/10.3233/JCS-230027$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.2402.06904$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Shaila Sharmin</creatorcontrib><creatorcontrib>Mansor, Hafizah</creatorcontrib><creatorcontrib>Andi Fitriah Abdul Kadir</creatorcontrib><creatorcontrib>Aziz, Normaziah A</creatorcontrib><title>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</title><title>arXiv.org</title><description>The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified.</description><subject>Automobiles</subject><subject>Benchmarks</subject><subject>Comparative studies</subject><subject>Computer Science - Cryptography and Security</subject><subject>Controller area network</subject><subject>Controllers</subject><subject>Design analysis</subject><subject>In vehicle</subject><subject>Intrusion detection systems</subject><subject>Workload</subject><subject>Workloads</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><sourceid>GOX</sourceid><recordid>eNotkMtOwzAQRS0kJKrSD2CFJTawSHH8yINdCBQqVUWi3UdOPIG0TVxsJ6V_T9KymtHMndG9B6Ebn0x5JAR5lOa36qaUEzolQUz4BRpRxnwv4pReoYm1G0IIDUIqBBuh7hma4ruWZls1X3hmZA0HbbYWy0bhVNd7aaSrOsAr16oKLNZlP26c0bsdGJwYkHgJbrjB92myfMDzftnaSjf4BRwUbuhWR-ugtk84wZ_QVXC4Rpel3FmY_NcxWs9e1-m7t_h4m6fJwpOx4F7oQxQoTlVOSsEgV1KEPivzwX8QAGVhIIigsVQRLwvFeQRFTHPJ--ClUJSN0e357QlKtjdVn_SYDXCyE5xecXdW7I3-acG6bKNb0_SeMhpTEYqIhYL9AaaKZ74</recordid><startdate>20240210</startdate><enddate>20240210</enddate><creator>Shaila Sharmin</creator><creator>Mansor, Hafizah</creator><creator>Andi Fitriah Abdul Kadir</creator><creator>Aziz, Normaziah A</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240210</creationdate><title>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</title><author>Shaila Sharmin ; Mansor, Hafizah ; Andi Fitriah Abdul Kadir ; Aziz, Normaziah A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a954-71e86d42db0f53ebda5713fb002666e237650529ad84fcd448ec92ba4069f5d23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Automobiles</topic><topic>Benchmarks</topic><topic>Comparative studies</topic><topic>Computer Science - Cryptography and Security</topic><topic>Controller area network</topic><topic>Controllers</topic><topic>Design analysis</topic><topic>In vehicle</topic><topic>Intrusion detection systems</topic><topic>Workload</topic><topic>Workloads</topic><toplevel>online_resources</toplevel><creatorcontrib>Shaila Sharmin</creatorcontrib><creatorcontrib>Mansor, Hafizah</creatorcontrib><creatorcontrib>Andi Fitriah Abdul Kadir</creatorcontrib><creatorcontrib>Aziz, Normaziah A</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shaila Sharmin</au><au>Mansor, Hafizah</au><au>Andi Fitriah Abdul Kadir</au><au>Aziz, Normaziah A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</atitle><jtitle>arXiv.org</jtitle><date>2024-02-10</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2402.06904</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2024-02 |
issn | 2331-8422 |
language | eng |
recordid | cdi_arxiv_primary_2402_06904 |
source | Freely Accessible Journals; arXiv.org |
subjects | Automobiles Benchmarks Comparative studies Computer Science - Cryptography and Security Controller area network Controllers Design analysis In vehicle Intrusion detection systems Workload Workloads |
title | Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T10%3A15%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Benchmarking%20Frameworks%20and%20Comparative%20Studies%20of%20Controller%20Area%20Network%20(CAN)%20Intrusion%20Detection%20Systems:%20A%20Review&rft.jtitle=arXiv.org&rft.au=Shaila%20Sharmin&rft.date=2024-02-10&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2402.06904&rft_dat=%3Cproquest_arxiv%3E2925758375%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2925758375&rft_id=info:pmid/&rfr_iscdi=true |