{"id":"https://openalex.org/W3194066230","doi":"https://doi.org/10.1145/3465481.3465755","title":"In-vehicle detection of targeted CAN bus attacks","display_name":"In-vehicle detection of targeted CAN bus attacks","publication_year":2021,"publication_date":"2021-08-16","ids":{"openalex":"https://openalex.org/W3194066230","doi":"https://doi.org/10.1145/3465481.3465755","mag":"3194066230"},"language":"en","primary_location":{"id":"doi:10.1145/3465481.3465755","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3465481.3465755","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3465481.3465755","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3465481.3465755","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009561099","display_name":"Florian Fenzl","orcid":"https://orcid.org/0000-0002-2707-2763"},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Florian Fenzl","raw_affiliation_strings":["Fraunhofer SIT, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer SIT, Germany","institution_ids":["https://openalex.org/I4210133470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048729364","display_name":"Roland Rieke","orcid":"https://orcid.org/0000-0003-3461-0520"},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Roland Rieke","raw_affiliation_strings":["Fraunhofer SIT, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer SIT, Germany","institution_ids":["https://openalex.org/I4210133470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060290595","display_name":"Andreas Dominik","orcid":"https://orcid.org/0000-0002-9368-0812"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andreas Dominik","raw_affiliation_strings":["THM University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"THM University of Applied Sciences, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009561099"],"corresponding_institution_ids":["https://openalex.org/I4210133470"],"apc_list":null,"apc_paid":null,"fwci":1.5911,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84216555,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7590550184249878},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7187314629554749},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7154303789138794},{"id":"https://openalex.org/keywords/genetic-programming","display_name":"Genetic programming","score":0.6278660893440247},{"id":"https://openalex.org/keywords/can-bus","display_name":"CAN bus","score":0.5901387929916382},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5351764559745789},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.46581271290779114},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.44734737277030945},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4068154990673065},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3863520920276642},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3792223334312439},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28630876541137695},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.10344520211219788}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7590550184249878},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7187314629554749},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7154303789138794},{"id":"https://openalex.org/C110332635","wikidata":"https://www.wikidata.org/wiki/Q629498","display_name":"Genetic programming","level":2,"score":0.6278660893440247},{"id":"https://openalex.org/C201762086","wikidata":"https://www.wikidata.org/wiki/Q728183","display_name":"CAN bus","level":2,"score":0.5901387929916382},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5351764559745789},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.46581271290779114},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.44734737277030945},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4068154990673065},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3863520920276642},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3792223334312439},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28630876541137695},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.10344520211219788},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3465481.3465755","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3465481.3465755","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3465481.3465755","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:fraunhofer.de:N-638899","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-638899.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer SIT","raw_type":"Conference Paper"},{"id":"pmh:oai:null:publica/411860","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/411860","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":{"id":"doi:10.1145/3465481.3465755","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3465481.3465755","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3465481.3465755","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6299999952316284}],"awards":[{"id":"https://openalex.org/G1212130249","display_name":null,"funder_award_id":"16KIS08","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G1835803654","display_name":null,"funder_award_id":"National Research Center for Applied Cybersecurity ATHENE","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G2910375108","display_name":null,"funder_award_id":"16KIS0835","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G352791218","display_name":null,"funder_award_id":"(BMBF)","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G4956428346","display_name":null,"funder_award_id":"Horizon 2020 research and innovatio","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5036817778","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innov","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6050938040","display_name":null,"funder_award_id":"ATHENE","funder_id":"https://openalex.org/F4320321961","funder_display_name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst"},{"id":"https://openalex.org/G7534829111","display_name":"Edge enabled Privacy and Security Platform for Multi Modal Transport","funder_award_id":"883135","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8566578122","display_name":null,"funder_award_id":"ATHENE","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G8633428685","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innovat","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"},{"id":"https://openalex.org/F4320321961","display_name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst","ror":"https://ror.org/00zd5gr55"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3194066230.pdf","grobid_xml":"https://content.openalex.org/works/W3194066230.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W26711432","https://openalex.org/W157468466","https://openalex.org/W587808035","https://openalex.org/W1599482613","https://openalex.org/W1608350059","https://openalex.org/W1985987493","https://openalex.org/W2027649639","https://openalex.org/W2081707439","https://openalex.org/W2109042184","https://openalex.org/W2116520617","https://openalex.org/W2408008555","https://openalex.org/W2592742990","https://openalex.org/W2739928414","https://openalex.org/W2782685722","https://openalex.org/W2783474208","https://openalex.org/W2911964244","https://openalex.org/W2914845865","https://openalex.org/W2959120033","https://openalex.org/W2978065103","https://openalex.org/W2979202956","https://openalex.org/W3000276033","https://openalex.org/W3025337514","https://openalex.org/W3105105644","https://openalex.org/W6950685506"],"related_works":["https://openalex.org/W1535080110","https://openalex.org/W306312984","https://openalex.org/W857189463","https://openalex.org/W2979675132","https://openalex.org/W2790520092","https://openalex.org/W4306309337","https://openalex.org/W20648474","https://openalex.org/W2109516765","https://openalex.org/W4288094128","https://openalex.org/W4313563004"],"abstract_inverted_index":{"Most":[0],"vehicles":[1],"use":[2],"the":[3,18,34,51,85,118,124,147,154,160,172],"controller":[4],"area":[5],"network":[6,20,46],"bus":[7,24],"for":[8,146,159],"communication":[9],"between":[10,139],"their":[11,59],"components.":[12],"Attackers":[13],"who":[14],"have":[15,77],"already":[16],"penetrated":[17],"in-vehicle":[19],"often":[21,41],"utilize":[22],"this":[23,64,90],"in":[25,117,175],"order":[26],"to":[27,43,93,131,136],"take":[28],"control":[29],"of":[30,33,89,114,149,162,165],"safety-relevant":[31],"components":[32],"vehicle.":[35],"Such":[36],"targeted":[37,107,151],"attack":[38],"scenarios":[39],"are":[40,168],"hard":[42],"detect":[44],"by":[45,171],"intrusion":[47,69],"detection":[48,70],"systems":[49],"because":[50],"specific":[52,106,150],"payload":[53],"is":[54,128,156],"usually":[55],"not":[56],"contained":[57],"within":[58],"training":[60],"data":[61],"sets.":[62],"In":[63],"work,":[65],"we":[66,102,143],"describe":[67],"an":[68],"system":[71,155],"that":[72,76,123],"uses":[73],"decision":[74],"trees":[75],"been":[78],"modelled":[79],"through":[80],"genetic":[81,125],"programming.":[82],"We":[83],"evaluate":[84],"advantages":[86],"and":[87,97,104],"disadvantages":[88],"approach":[91,127],"compared":[92],"artificial":[94],"neural":[95],"networks":[96],"rule-based":[98],"approaches.":[99,184],"For":[100],"this,":[101],"model":[103],"simulate":[105],"attacks":[108,166],"as":[109,111],"well":[110,129],"several":[112],"types":[113,164],"intrusions":[115,133],"described":[116],"literature.":[119],"The":[120],"results":[121],"show":[122],"programming":[126],"suited":[130],"identify":[132],"with":[134],"respect":[135],"complex":[137],"relationships":[138],"sensor":[140],"values":[141],"which":[142,167],"consider":[144,182],"important":[145],"classification":[148,161],"attacks.":[152],"However,":[153],"less":[157],"efficient":[158],"other":[163],"better":[169],"identified":[170],"alternative":[173],"methods":[174],"our":[176],"evaluation.":[177],"Further":[178],"research":[179],"could":[180],"thus":[181],"hybrid":[183]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
