Research Article

Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix

Figure 18

Legitimate ID transfer vs. ID transfer in the presence of DoS attack. (a) Legitimate ID transfer matrix. (b) ID transfer matrix for DoS attack occurred.
(a)
(b)