{"created":"2025-01-19T01:45:21.297443+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240899","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240899","title":["周期に基づく CAN 侵入検知アルゴリズムへの 攻撃手法と対策手法の提案"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"824fd10d-c2d5-45cd-af07-21398d8b75b1"},"_deposit":{"id":"240899","pid":{"type":"depid","value":"240899","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"周期に基づく CAN 侵入検知アルゴリズムへの 攻撃手法と対策手法の提案","author_link":["662072","662073","662074","662075"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"周期に基づく CAN 侵入検知アルゴリズムへの 攻撃手法と対策手法の提案","subitem_title_language":"ja"},{"subitem_title":"Proposal of an Attack Method and a Countermeasure for Periodic-Based CAN Intrusion Detection Systems","subitem_title_language":"en"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"名古屋大学 大学院情報学研究科"},{"subitem_text_value":"名古屋大学 大学院情報学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Informatics, Nagoya University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Informatics, Nagoya University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240899/files/IPSJ-CSS2024153.pdf","label":"IPSJ-CSS2024153.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024153.pdf","filesize":[{"value":"601.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"106fbe33-2201-482a-86ac-06080ed8eaa6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"寺澤, 佳紀"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"倉地, 亮"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshinori, Terazawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryo, Kurachi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"車載ネットワークの標準的な通信プロトコルとして CAN(Controller Area Network)が用いられている.しかしながら,CANはブロードキャスト通信,認証フィールドを持たないという性質による脆弱性がある.CANへの攻撃に対し適切なセキュリティ強化を図るために,攻撃を受けたことを検知する必要がある.その方法として,侵入検知システム(Intrusion Detection System: IDS)が知られている.IDSには,一定時間間隔で送信されるメッセージ(周期メッセージ)に着目した攻撃検知方法がある.本論では,先行研究で紹介されている周期に基づくIDSの脆弱性を考察し,その脆弱性を突く攻撃手法と,攻撃手法への対策手法を提案する.攻撃手法によって,対象とした手法では検知されない攻撃を可能とし,対策手法によってその脆弱性を解消した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The Controller Area Network (CAN) is widely used as the standard communication protocol in in-vehicle networks. However, it has vulnerabilities due to its broadcast communication nature and the absence of authentication fields. To appropriately enhance security against attacks on CAN, it is necessary to detect when an attack has occurred. One known method for this is an Intrusion Detection System (IDS). One type of IDS focuses on detecting attacks by examining periodically transmitted messages. This paper examines the vulnerabilities of periodic-based IDS introduced in previous studies and proposes an attack method that exploits these vulnerabilities and a countermeasure against such attacks. The proposed attack method highlights the potential for undetected attacks by the targeted IDS, whereas the proposed countermeasure mitigates this vulnerability.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1147","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"1141","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240899,"updated":"2025-03-06T05:55:56.007834+00:00","links":{}}