Skip navigation

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles

Vuong, Tuan Phan, Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:https://doi.org/10.1109/WIFS.2015.7368559)

[img]
Preview
PDF (Author's Accepted Manuscript)
15015_Loukas_Decision tree based detection (AAM) 2015.pdf - Accepted Version

Download (861kB) | Preview

Abstract

Mobile cyber-physical systems, such as automobiles, drones and robotic vehicles, are gradually becoming attractive targets for cyber attacks. This is a challenge because intrusion detection systems built for conventional computer systems tend to be unsuitable. They can be too demanding for resource-restricted cyber-physical systems or too inaccurate due to the lack of real- world data on actual attack behaviours. Here, we focus on the security of a small remote-controlled robotic vehicle. Having observed that certain types of cyber attacks against it exhibit physical impact, we have developed an intrusion detection system that takes into account not only cyber input features, such as network traffic and disk data, but also physical input features, such as speed, physical jittering and power consumption. As the system is resource-restricted, we have opted for a decision tree-based approach for generating simple detection rules, which we evaluate against denial of service and command injection attacks. We observe that the addition of physical input features can markedly reduce the false positive rate and increase the overall accuracy of the detection.

Item Type: Conference Proceedings
Title of Proceedings: 2015 IEEE International Workshop on Information Forensics and Security (WIFS)
Additional Information: © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. IEEE International Workshop on Information Forensics and Security, November 16-19, 2015, Rome, Italy.
Uncontrolled Keywords: cyber-physical security, cyber security, cyber-physical systems, vehicles, intrusion detection
Faculty / Department / Research Group: Faculty of Architecture, Computing & Humanities
Faculty of Architecture, Computing & Humanities > Department of Computing & Information Systems
Last Modified: 19 May 2019 17:04
Selected for GREAT 2016: None
Selected for GREAT 2017: GREAT a
Selected for GREAT 2018: None
Selected for GREAT 2019: GREAT 2
URI: http://gala.gre.ac.uk/id/eprint/15015

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics