메뉴 건너뛰기




Volumn Part F129886, Issue September, 2017, Pages

Research on CAN Network Security Aspects and Intrusion Detection Design

Author keywords

[No Author keywords available]

Indexed keywords

ADVANCED DRIVER ASSISTANCE SYSTEMS; AUTHENTICATION; AUTOMOBILE DRIVERS; COMPUTER CRIME; CONTROL SYSTEM SYNTHESIS; CRYPTOGRAPHY; ELECTRIC AUTOMOBILES; FUZZY INFERENCE; FUZZY NEURAL NETWORKS; GATEWAYS (COMPUTER NETWORKS); INTRUSION DETECTION; NETWORK PROTOCOLS;

EID: 85029009168     PISSN: None     EISSN: 01487191     Source Type: Journal    
DOI: 10.4271/2017-01-2007     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 1
    • 21644462279 scopus 로고    scopus 로고
    • Trends in Automotive Communication Systems
    • Navet N., Song Y., Simonot-Lion F., and Wilwert C., " Trends in Automotive Communication Systems," Proc. of the IEEE, vol. 93, no. 6, p. 1204-1223, 2005, doi: http://dx.doi.org/10.1109/JPROC.2005.849725 10.1109/JPROC.2005.849725.
    • (2005) Proc. of the IEEE , vol.93 , Issue.6 , pp. 1204-1223
    • Navet, N.1    Song, Y.2    Simonot-Lion, F.3    Wilwert, C.4
  • 2
    • 84859921075 scopus 로고    scopus 로고
    • Comprehensive Experimental Analyses of Automotive Attack Surfaces
    • Checkoway S., Mccoy D., Kantor B., et al, " Comprehensive Experimental Analyses of Automotive Attack Surfaces," Usenix Security Symposium. 2011: 43-43.
    • (2011) Usenix Security Symposium , pp. 43
    • Checkoway, S.1    McCoy, D.2    Kantor, B.3
  • 3
    • 84929768227 scopus 로고    scopus 로고
    • A Survey of Remote Automotive Attack Surfaces
    • http://illmatics.com/remote attack surfaces.pdf
    • Charlie Miller, Chris Valasek., " A Survey of Remote Automotive Attack Surfaces," Defcon 22: 1-90. Retrieved from http://illmatics.com/remote%20attack%20surfaces.pdf http://illmatics.com/remote attack surfaces.pdf.
    • Defcon , vol.22 , pp. 1-90
    • Charlie, M.1    Chris, V.2
  • 4
    • 85028151945 scopus 로고    scopus 로고
    • Potential Cyberattacks on Automated Vehicles
    • Petit J., Shladover S. E., " Potential Cyberattacks on Automated Vehicles," IEEE Transactions on Intelligent Transportation Systems, 2015, 16 (2): 546-556, doi: http://dx.doi.org/10.1109/TITS.2014.2342271 10.1109/TITS.2014.2342271.
    • (2015) IEEE Transactions on Intelligent Transportation Systems , vol.16 , Issue.2 , pp. 546-556
    • Petit, J.1    Shladover, S.E.2
  • 5
    • 78651579602 scopus 로고    scopus 로고
    • A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
    • september
    • Nilsson D. K., Larson U. E., " A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure," Journal of Networks, vol. 4, no. 7, september, 2009: 552-564, doi: http://dx.doi.org/10.4304/jnw.4.7.552-564 10.4304/jnw.4.7.552-564.
    • (2009) Journal of Networks , vol.4 , Issue.7 , pp. 552-564
    • Nilsson, D.K.1    Larson, U.E.2
  • 6
    • 70449553428 scopus 로고    scopus 로고
    • Secure and authentic communication on existing in-vehicle networks
    • Groll A., Ruland C., " Secure and authentic communication on existing in-vehicle networks," Intelligent Vehicles Symposium. IEEE, 2009: 1093-1097, doi: http://dx.doi.org/10.1109/IVS.2009.5164434 10.1109/IVS.2009.5164434.
    • (2009) Intelligent Vehicles Symposium. IEEE , pp. 1093-1097
    • Groll, A.1    Ruland, C.2
  • 8
    • 79960771504 scopus 로고    scopus 로고
    • Security aspects of the in-vehicle network in the connected car
    • Kleberger P., Olovsson T., Jonsson E., " Security aspects of the in-vehicle network in the connected car," Intelligent Vehicles Symposium. IEEE Xplore, 2011: 528-533, doi: http://dx.doi.org/10.1109/IVS.2011.5940525 10.1109/IVS.2011.5940525.
    • (2011) Intelligent Vehicles Symposium. IEEE Xplore , pp. 528-533
    • Kleberger, P.1    Olovsson, T.2    Jonsson, E.3
  • 9
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
    • Salzburg, Austria
    • Hoppe T., Dittman J., " Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy," In Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), Salzburg, Austria, 2007.
    • (2007) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS)
    • Hoppe, T.1    Dittman, J.2
  • 10
    • 57749193296 scopus 로고    scopus 로고
    • An approach to specification-based attack detection for in-vehicle networks
    • Larson U. E., Nilsson D. K., Jonsson E., " An approach to specification-based attack detection for in-vehicle networks," Intelligent Vehicles Symposium. IEEE Xplore, 2008: 220-225, doi: http://dx.doi.org/10.1109/IVS.2008.4621263 10.1109/IVS.2008.4621263.
    • (2008) Intelligent Vehicles Symposium. IEEE Xplore , pp. 220-225
    • Larson, U.E.1    Nilsson, D.K.2    Jonsson, E.3
  • 11
    • 79960791793 scopus 로고    scopus 로고
    • Entropy-Based Anomaly Detection for In-Vehicle Networks
    • Baden-Baden, Germany, June 5-9
    • Michael Müter, Naim Asaj., " Entropy-Based Anomaly Detection for In-Vehicle Networks," 2011 IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany, June 5-9, 2011: 528-533, doi: http://dx.doi.org/10.1109/IVS.2011.5940552 10.1109/IVS.2011.5940552.
    • (2011) 2011 IEEE Intelligent Vehicles Symposium (IV) , pp. 528-533
    • Michael, M.1    Naim, A.2
  • 13
    • 78649321196 scopus 로고    scopus 로고
    • Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
    • Tobias Hoppe, Stefan Kiltz, Jana Dittmann., " Security Threats to Automotive CAN Networks-Practical Examples and Selected Short-Term Countermeasures," Reliability Engineering and System Safety, 96, 2011, 11-25, doi: http://dx.doi.org/10.1007/978-3-540-87698-4-21 10.1007/978-3-540-87698-4-21.
    • (2011) Reliability Engineering and System Safety , vol.96 , pp. 11-25
    • Tobias, H.1    Stefan, K.2    Jana, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.