Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol.
Hwejae LeeHyosun LeeSaehee JunHuy Kang KimPublished in: CoRR (2024)
Keyphrases
- comprehensive analysis
- attack scenarios
- attack graphs
- intrusion detection system
- attack detection
- attack graph
- alert correlation
- transport protocol
- intrusion detection
- multistage
- end to end
- real time
- rate control
- mac protocol
- congestion control
- computer networks
- anomaly detection
- rate adaptation
- video streaming
- network security
- security vulnerabilities
- network traffic
- video coding