Search Results for author: Pablo Moriano

Found 6 papers, 1 papers with code

CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level

1 code implementation3 May 2022 Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou

As ordinary injection attacks disrupt the typical timing properties of the CAN data stream, rule-based intrusion detection systems (IDS) can easily detect them.

Intrusion Detection Time Series +1

Detecting CAN Masquerade Attacks with Signal Clustering Similarity

no code implementations7 Jan 2022 Pablo Moriano, Robert A. Bridges, Michael D. Iannacone

Specifically, we demonstrate that masquerade attacks can be detected by computing time series clustering similarity using hierarchical clustering on the vehicle's CAN signals (time series) and comparing the clustering similarity across CAN captures with and without attacks.

Clustering Time Series +1

Graph-Based Machine Learning Improves Just-in-Time Defect Prediction

no code implementations11 Oct 2021 Jonathan Bryan, Pablo Moriano

By leveraging these contribution graphs, our research shows the potential of using graph-based ML to improve Just-In-Time (JIT) defect prediction.

BIG-bench Machine Learning

Time-Based CAN Intrusion Detection Benchmark

no code implementations14 Jan 2021 Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs).

Intrusion Detection

A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

no code implementations29 Dec 2020 Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

Current public CAN IDS datasets are limited to real fabrication (simple message injection) attacks and simulated attacks often in synthetic data, which lack fidelity.

Anomaly Detection Benchmarking +2

Using Bursty Announcements for Detecting BGP Routing Anomalies

no code implementations14 May 2019 Pablo Moriano, Raquel Hill, L. Jean Camp

Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination.

Anomaly Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.