Detecting masquerade attacks in controller area networks using graph machine learning

W Marfo, P Moriano, DK Tosh, SV Moore - arxiv preprint arxiv:2408.05427, 2024‏ - arxiv.org
Modern vehicles rely on a myriad of electronic control units (ECUs) interconnected via
controller area networks (CANs) for critical operations. Despite their ubiquitous use and …

[HTML][HTML] Cybersecurity of Automotive Wired Networking Systems: Evolution, Challenges, and Countermeasures

N Canino, P Dini, S Mazzetti, D Rossi, S Saponara… - Electronics, 2025‏ - mdpi.com
The evolution of Electrical and Electronic (E/E) architectures in the automotive industry has
been a significant factor in the transformation of vehicles from traditional mechanical …

Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN

P Moriano, SC Hespeler, M Li, RA Bridges - arxiv preprint arxiv …, 2024‏ - arxiv.org
Vehicular controller area networks (CANs) are susceptible to masquerade attacks by
malicious adversaries. In masquerade attacks, adversaries silence a targeted ID and then …

MULSAM: Multidimensional Attention With Hardware Acceleration for Efficient Intrusion Detection on Vehicular CAN Bus

H Xu, X Shi, H Liu, Y Wang, J Lu… - … on Computer-Aided …, 2025‏ - ieeexplore.ieee.org
Controller Area Network (CAN) protocol is an efficient standard enabling communication
among Electronic Control Units (ECUs). However, the CAN bus is vulnerable to malicious …

CAN-Modes: In-vehicle datasets generation and analysis in different driving situations

ADS Roque, LMDS Alves… - 2024 Workshop on …, 2024‏ - ieeexplore.ieee.org
In-vehicle networks are responsible for safety-critical control applications, depending on
data communication between electronic control units, and most are based on the CAN …

CANini: In-Depth Traffic Analysis for Design and Robustness Evaluation of DTree-based IDS in Automotive Networking Systems

N Canino, P Dini, S Mazzetti, D Rossi, S Saponara - 2025‏ - techrxiv.org
Abstract In-Vehicle Networks (IVNs) have become increasingly complex due to the need to
enhance driving experience and provide passengers with a broader range of services. The …

Attack Datasets for ROS Intrusion Detection Systems

H Kim, S Lee, J Heo, HJ Jo - Journal of the Korea Institute of …, 2024‏ - koreascience.kr
In recent decades, research and development in the field of industrial robotics, such as an
unmanned ground vehicle (UGV) and an unmanned aerial vehicle (UAV), has been …

Efficient Anomaly Detection Driven by Different Machine Learning Architectures and Models

W Marfo - 2024‏ - search.proquest.com
The rapid growth and ubiquitous adoption of the internet and cyber-physical systems (CPS)
have fundamentally transformed modern communication, work, and human-system …

ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축

김형훈, 이승민, 허재웅, 조효진 - 정보보호학회논문지, 2024‏ - dbpia.co.kr
최근 수년 동안 무인지상차량 및 무인항공기와 같은 Robotics 분야에 대한 연구 및 개발이
활발히 진행되고 있다. 이러한 발전에는 서로 다른 애플리케이션 간의 통신 및 데이터 관리를 …