In recent years, the automotive sector is going through a period of strong innovation linked to the vehicle connection not only to each other but also to Smart City systems. A direct consequence is an increase in the vehicle attack surface that could lead to complex attacks by providing potential access to a strategic network for government and military organizations for the 'Country System', violating the national security perimeter. The target of these could be the Machine Learning (ML) based Intrusion Detection System (IDS) delegated to protect such assets. Therefore, this research aims to verify the applicability of some Black-Box Adversarial Machine Learning attacks in the CAN bus frame detection task. The victim is a Supervised ML-based IDS assumed to be resident in the vehicle itself. The attack types consist of one evasion and one inference attack. The results show the evasion attack impact (weighted accuracy loss) is about 7 0% and the inference attack is not successful. A Multi-Domain (M-D) qualitative impact analysis involving 'Cyber' and 'Land' domains is proposed in an application scenario of Cyber Warfare and Cyber Espionage constituting integral parts of Multi-Domain Operations (MDOs) potentially aimed at terrorism climates. The victim organization is the entire Nation. This analysis shows the impact of these attacks on real-world assets is very high so a Security by Design approach is needed.

Black-Box Adversarial ML Attacks on IDS and Multi-Domain Impact Analysis for Threat Intelligence in Automotive Scenarios

Barletta, V. S.
;
Caivano, D.;Catalano, C.;
2024-01-01

Abstract

In recent years, the automotive sector is going through a period of strong innovation linked to the vehicle connection not only to each other but also to Smart City systems. A direct consequence is an increase in the vehicle attack surface that could lead to complex attacks by providing potential access to a strategic network for government and military organizations for the 'Country System', violating the national security perimeter. The target of these could be the Machine Learning (ML) based Intrusion Detection System (IDS) delegated to protect such assets. Therefore, this research aims to verify the applicability of some Black-Box Adversarial Machine Learning attacks in the CAN bus frame detection task. The victim is a Supervised ML-based IDS assumed to be resident in the vehicle itself. The attack types consist of one evasion and one inference attack. The results show the evasion attack impact (weighted accuracy loss) is about 7 0% and the inference attack is not successful. A Multi-Domain (M-D) qualitative impact analysis involving 'Cyber' and 'Land' domains is proposed in an application scenario of Cyber Warfare and Cyber Espionage constituting integral parts of Multi-Domain Operations (MDOs) potentially aimed at terrorism climates. The victim organization is the entire Nation. This analysis shows the impact of these attacks on real-world assets is very high so a Security by Design approach is needed.
2024
9798331505585
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11586/533203
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact