Modern vehicles are increasingly vulnerable to attacks that exploit network infrastructures, particularly the Controller Area Network (CAN) networks. To effectively counter such threats using contemporary tools like Intrusion Detection Systems (IDSs) based on data analysis and classification, large datasets of CAN messages become imperative.This paper delves into the feasibility of generating synthetic datasets by harnessing the modeling capabilities of simulation frameworks such as Simulink coupled with a robust representation of attack models to present CARACAS, a vehicular model, including component control via CAN messages and attack injection capabilities. CARACAS showcases the efficacy of this methodology, including a Battery Electric Vehicle (BEV) model, and focuses on attacks targeting torque control in two distinct scenarios.

CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation / Kirdi, Sadek Misto; Scarano, Nicola; Oberti, Franco; Mannella, Luca; Di Carlo, Stefano; Savino, Alessandro. - (2024), pp. 1-6. (Intervento presentato al convegno 29th IEEE Symposium on Computers and Communications, ISCC 2024 tenutosi a Paris, France nel 26-29 June 2024) [10.1109/iscc61673.2024.10733705].

CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation

Kirdi, Sadek Misto;Scarano, Nicola;Oberti, Franco;Mannella, Luca;Di Carlo, Stefano;Savino, Alessandro
2024

Abstract

Modern vehicles are increasingly vulnerable to attacks that exploit network infrastructures, particularly the Controller Area Network (CAN) networks. To effectively counter such threats using contemporary tools like Intrusion Detection Systems (IDSs) based on data analysis and classification, large datasets of CAN messages become imperative.This paper delves into the feasibility of generating synthetic datasets by harnessing the modeling capabilities of simulation frameworks such as Simulink coupled with a robust representation of attack models to present CARACAS, a vehicular model, including component control via CAN messages and attack injection capabilities. CARACAS showcases the efficacy of this methodology, including a Battery Electric Vehicle (BEV) model, and focuses on attacks targeting torque control in two distinct scenarios.
2024
979-8-3503-5423-2
File in questo prodotto:
File Dimensione Formato  
Paper____TrustAICyberSec_2024___Vehicular_Modular_Architecture_for_detailed_CAN_attacks_Simulation.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Pubblico - Tutti i diritti riservati
Dimensione 2.18 MB
Formato Adobe PDF
2.18 MB Adobe PDF Visualizza/Apri
CARACAS_vehiCular_ArchitectuRe_for_detAiled_Can_Attacks_Simulation.pdf

accesso riservato

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 2.23 MB
Formato Adobe PDF
2.23 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2995722