SaTC: CORE: Small: Collaborative: GOALI: Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles

Information

  • NSF Award
  • 1715409
Owner
  • Award Id
    1715409
  • Award Effective Date
    8/1/2017 - 7 years ago
  • Award Expiration Date
    7/31/2020 - 4 years ago
  • Award Amount
    $ 256,000.00
  • Award Instrument
    Standard Grant

SaTC: CORE: Small: Collaborative: GOALI: Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles

Heavy vehicles (e.g., trucks and busses) are a critical element of U.S. and worldwide logistics, often carrying cargo of high value or high risk (e.g., explosive liquids and gasses). Heavy vehicles often have hundreds of Electronic Control Units (ECUs) that communicate over an internal network to carry commands (such as "engage the brakes") or share sensor data (such as the temperature of pressurized cargo unit carrying petroleum). ECUs with access to the communication network can send any message they want. If the network or an ECU is compromised by an attack, the truck or a cargo container safety mechanism could malfunction. This project is gathering data from operational trucks to better understand communication among components of heavy vehicles and developing techniques to detect attacks in this environment.<br/><br/>The project is working to accomplish three main objectives: (1) Collect representative Controller Area Network (CAN) bus data from operational heavy vehicles, (2) Develop detection systems that can distinguish anomalous CAN bus network traffic, and (3) Test and verify the detection systems to reduce the number of false positives. The team is developing a log algebra to efficiently assess live CAN traffic using embedded devices with limited resources. Data is being gathered from truck traffic during highway operation, enabling the application of machine learning algorithms for anomaly detection. The team is evaluating the effectiveness of their intrusion detection techniques in their heavy vehicle testbed, using synthetic attacks against testbed ECUs and real-world CAN traffic data.

  • Program Officer
    phillip regalia
  • Min Amd Letter Date
    7/22/2017 - 7 years ago
  • Max Amd Letter Date
    7/22/2017 - 7 years ago
  • ARRA Amount

Institutions

  • Name
    University of Tulsa
  • City
    Tulsa
  • State
    OK
  • Country
    United States
  • Address
    800 S. Tucker Drive
  • Postal Code
    741049700
  • Phone Number
    9186312192

Investigators

  • First Name
    Jeremy
  • Last Name
    Daily
  • Email Address
    jeremy-daily@utulsa.edu
  • Start Date
    7/22/2017 12:00:00 AM
  • First Name
    Urban
  • Last Name
    Jonson
  • Email Address
    urban.jonson@nmfta.org
  • Start Date
    7/22/2017 12:00:00 AM

Program Element

  • Text
    SPECIAL PROJECTS - CISE
  • Code
    1714
  • Text
    Secure &Trustworthy Cyberspace
  • Code
    8060

Program Reference

  • Text
    SaTC: Secure and Trustworthy Cyberspace
  • Text
    Human factors for security research
  • Text
    CNCI
  • Code
    7434
  • Text
    SMALL PROJECT
  • Code
    7923
  • Text
    EXP PROG TO STIM COMP RES
  • Code
    9150
  • Text
    UNDERGRADUATE EDUCATION
  • Code
    9178
  • Text
    RES EXPER FOR UNDERGRAD-SUPPLT
  • Code
    9251