Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review

The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2024-02
Hauptverfasser: Shaila Sharmin, Mansor, Hafizah, Andi Fitriah Abdul Kadir, Aziz, Normaziah A
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Shaila Sharmin
Mansor, Hafizah
Andi Fitriah Abdul Kadir
Aziz, Normaziah A
description The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified.
doi_str_mv 10.48550/arxiv.2402.06904
format Article
fullrecord <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2402_06904</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2925758375</sourcerecordid><originalsourceid>FETCH-LOGICAL-a954-71e86d42db0f53ebda5713fb002666e237650529ad84fcd448ec92ba4069f5d23</originalsourceid><addsrcrecordid>eNotkMtOwzAQRS0kJKrSD2CFJTawSHH8yINdCBQqVUWi3UdOPIG0TVxsJ6V_T9KymtHMndG9B6Ebn0x5JAR5lOa36qaUEzolQUz4BRpRxnwv4pReoYm1G0IIDUIqBBuh7hma4ruWZls1X3hmZA0HbbYWy0bhVNd7aaSrOsAr16oKLNZlP26c0bsdGJwYkHgJbrjB92myfMDzftnaSjf4BRwUbuhWR-ugtk84wZ_QVXC4Rpel3FmY_NcxWs9e1-m7t_h4m6fJwpOx4F7oQxQoTlVOSsEgV1KEPivzwX8QAGVhIIigsVQRLwvFeQRFTHPJ--ClUJSN0e357QlKtjdVn_SYDXCyE5xecXdW7I3-acG6bKNb0_SeMhpTEYqIhYL9AaaKZ74</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2925758375</pqid></control><display><type>article</type><title>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</title><source>Freely Accessible Journals</source><source>arXiv.org</source><creator>Shaila Sharmin ; Mansor, Hafizah ; Andi Fitriah Abdul Kadir ; Aziz, Normaziah A</creator><creatorcontrib>Shaila Sharmin ; Mansor, Hafizah ; Andi Fitriah Abdul Kadir ; Aziz, Normaziah A</creatorcontrib><description>The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2402.06904</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Automobiles ; Benchmarks ; Comparative studies ; Computer Science - Cryptography and Security ; Controller area network ; Controllers ; Design analysis ; In vehicle ; Intrusion detection systems ; Workload ; Workloads</subject><ispartof>arXiv.org, 2024-02</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,780,881,27902</link.rule.ids><backlink>$$Uhttps://doi.org/10.3233/JCS-230027$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.2402.06904$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Shaila Sharmin</creatorcontrib><creatorcontrib>Mansor, Hafizah</creatorcontrib><creatorcontrib>Andi Fitriah Abdul Kadir</creatorcontrib><creatorcontrib>Aziz, Normaziah A</creatorcontrib><title>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</title><title>arXiv.org</title><description>The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified.</description><subject>Automobiles</subject><subject>Benchmarks</subject><subject>Comparative studies</subject><subject>Computer Science - Cryptography and Security</subject><subject>Controller area network</subject><subject>Controllers</subject><subject>Design analysis</subject><subject>In vehicle</subject><subject>Intrusion detection systems</subject><subject>Workload</subject><subject>Workloads</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><sourceid>GOX</sourceid><recordid>eNotkMtOwzAQRS0kJKrSD2CFJTawSHH8yINdCBQqVUWi3UdOPIG0TVxsJ6V_T9KymtHMndG9B6Ebn0x5JAR5lOa36qaUEzolQUz4BRpRxnwv4pReoYm1G0IIDUIqBBuh7hma4ruWZls1X3hmZA0HbbYWy0bhVNd7aaSrOsAr16oKLNZlP26c0bsdGJwYkHgJbrjB92myfMDzftnaSjf4BRwUbuhWR-ugtk84wZ_QVXC4Rpel3FmY_NcxWs9e1-m7t_h4m6fJwpOx4F7oQxQoTlVOSsEgV1KEPivzwX8QAGVhIIigsVQRLwvFeQRFTHPJ--ClUJSN0e357QlKtjdVn_SYDXCyE5xecXdW7I3-acG6bKNb0_SeMhpTEYqIhYL9AaaKZ74</recordid><startdate>20240210</startdate><enddate>20240210</enddate><creator>Shaila Sharmin</creator><creator>Mansor, Hafizah</creator><creator>Andi Fitriah Abdul Kadir</creator><creator>Aziz, Normaziah A</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240210</creationdate><title>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</title><author>Shaila Sharmin ; Mansor, Hafizah ; Andi Fitriah Abdul Kadir ; Aziz, Normaziah A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a954-71e86d42db0f53ebda5713fb002666e237650529ad84fcd448ec92ba4069f5d23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Automobiles</topic><topic>Benchmarks</topic><topic>Comparative studies</topic><topic>Computer Science - Cryptography and Security</topic><topic>Controller area network</topic><topic>Controllers</topic><topic>Design analysis</topic><topic>In vehicle</topic><topic>Intrusion detection systems</topic><topic>Workload</topic><topic>Workloads</topic><toplevel>online_resources</toplevel><creatorcontrib>Shaila Sharmin</creatorcontrib><creatorcontrib>Mansor, Hafizah</creatorcontrib><creatorcontrib>Andi Fitriah Abdul Kadir</creatorcontrib><creatorcontrib>Aziz, Normaziah A</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shaila Sharmin</au><au>Mansor, Hafizah</au><au>Andi Fitriah Abdul Kadir</au><au>Aziz, Normaziah A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review</atitle><jtitle>arXiv.org</jtitle><date>2024-02-10</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>The development of intrusion detection systems (IDS) for the in-vehicle Controller Area Network (CAN) bus is one of the main efforts being taken to secure the in-vehicle network against various cyberattacks, which have the potential to cause vehicles to malfunction and result in dangerous accidents. These CAN IDS are evaluated in disparate experimental conditions that vary in terms of the workload used, the features used, the metrics reported, etc., which makes direct comparison difficult. Therefore, there have been several benchmarking frameworks and comparative studies designed to evaluate CAN IDS in similar experimental conditions to understand their relative performance and facilitate the selection of the best CAN IDS for implementation in automotive networks. This work provides a comprehensive survey of CAN IDS benchmarking frameworks and comparative studies in the current literature. A CAN IDS evaluation design space is also proposed in this work, which draws from the wider CAN IDS literature. This is not only expected to serve as a guide for designing CAN IDS evaluation experiments but is also used for categorizing current benchmarking efforts. The surveyed works have been discussed on the basis of the five aspects in the design space-namely IDS type, attack model, evaluation type, workload generation, and evaluation metrics-and recommendations for future work have been identified.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2402.06904</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2024-02
issn 2331-8422
language eng
recordid cdi_arxiv_primary_2402_06904
source Freely Accessible Journals; arXiv.org
subjects Automobiles
Benchmarks
Comparative studies
Computer Science - Cryptography and Security
Controller area network
Controllers
Design analysis
In vehicle
Intrusion detection systems
Workload
Workloads
title Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T10%3A15%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Benchmarking%20Frameworks%20and%20Comparative%20Studies%20of%20Controller%20Area%20Network%20(CAN)%20Intrusion%20Detection%20Systems:%20A%20Review&rft.jtitle=arXiv.org&rft.au=Shaila%20Sharmin&rft.date=2024-02-10&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2402.06904&rft_dat=%3Cproquest_arxiv%3E2925758375%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2925758375&rft_id=info:pmid/&rfr_iscdi=true