MDHP-Net: Detecting an Emerging Time-exciting Threat in IVN

📅 2025-04-16
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses a novel class of “time-triggered” adversarial attacks on in-vehicle networks (IVNs) of intelligent connected vehicles—where temporally controlled malicious messages progressively disrupt ECU communications and compromise safety-critical functions. To tackle this threat, we first formalize a time-triggered adversarial threat model; second, we release STEIA9, the first open-source dataset specifically designed for such attacks; third, we develop MDHP-GDS, a GPU-accelerated gradient descent solver for multidimensional Hawkes processes; and fourth, we propose MDHP-Net, a detection framework jointly modeling temporal dynamics and message-level features. Evaluated across CAN, DoIP, and SOME/IP protocols under nine Ethernet-based attack scenarios, MDHP-Net significantly outperforms three baseline methods. Empirical validation further confirms both the feasibility of these attacks on real-world ADAS and SOME/IP systems and the practical detectability of our approach.

Technology Category

Application Category

📝 Abstract
The integration of intelligent and connected technologies in modern vehicles, while offering enhanced functionalities through Electronic Control Unit (ECU) and interfaces like OBD-II and telematics, also exposes the vehicle's in-vehicle network (IVN) to potential cyberattacks. Unlike prior work, we identify a new time-exciting threat model against IVN. These attacks inject malicious messages that exhibit a time-exciting effect, gradually manipulating network traffic to disrupt vehicle operations and compromise safety-critical functions. We systematically analyze the characteristics of the threat: dynamism, time-exciting impact, and low prior knowledge dependency. To validate its practicality, we replicate the attack on a real Advanced Driver Assistance System via Controller Area Network (CAN), exploiting Unified Diagnostic Service vulnerabilities and proposing four attack strategies. While CAN's integrity checks mitigate attacks, Ethernet migration (e.g., DoIP/SOME/IP) introduces new surfaces. We further investigate the feasibility of time-exciting threat under SOME/IP. To detect time-exciting threat, we introduce MDHP-Net, leveraging Multi-Dimentional Hawkes Process (MDHP) and temporal and message-wise feature extracting structures. Meanwhile, to estimate MDHP parameters, we developed the first GPU-optimized gradient descent solver for MDHP (MDHP-GDS). These modules significantly improves the detection rate under time-exciting attacks in multi-ECU IVN system. To address data scarcity, we release STEIA9, the first open-source dataset for time-exciting attacks, covering 9 Ethernet-based attack scenarios. Extensive experiments on STEIA9 (9 attack scenarios) show MDHP-Net outperforms 3 baselines, confirming attack feasibility and detection efficacy.
Problem

Research questions and friction points this paper is trying to address.

Detects time-exciting cyberattacks in vehicle networks
Analyzes dynamic, low-knowledge threat characteristics
Proposes GPU-optimized detection for multi-ECU systems
Innovation

Methods, ideas, or system contributions that make the work stand out.

MDHP-Net detects time-exciting IVN threats
GPU-optimized MDHP-GDS solver enhances detection
STEIA9 dataset covers 9 Ethernet attack scenarios
🔎 Similar Papers
No similar papers found.