Detection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase
Volume 11, Issue 1, Page No 25–32, 2026
Adv. Sci. Technol. Eng. Syst. J. 11(1), 25–32 (2026);
DOI: 10.25046/aj110103
Keywords: Control system security, Ethernet, IDS, SOME/IP, SOME/IP-IDS, Spoofing attack
Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes a method for detecting attacks in which an attacker spoofs a server during service discovery using a packet switch in a network employing SOME/IP. In addition, a mitigation method is proposed to discard malicious messages. The proposed method addresses the limitations of conventional encryption-based approaches by reducing both processing and communication loads. It also improves anomaly detection rate and detection timing, which have been identified as shortcomings in intrusion detection systems proposed in previous studies. In this study, we evaluated the method using a dataset consisting of 36 attack patterns that combined attack types, attack initiation timing, and message categories. Real-world evaluations demonstrated that the proposed method detected all server spoofing attempts. Further analysis of processing time and memory resource usage confirmed its feasibility for in-vehicle system.
- AUTOSAR, “Specification of SOME/IP Transformer,” Requirement Specification AUTOSAR FO R22-11, 2022.
- AUTOSAR, “SOME/IP Service Discovery Protocol Specification,” Requirement Specification AUTOSAR FO R22-11, 2022.
- M. Cakir, T. Hackel, S. Reider, P. Meyer, F. Korf, T. C. Schmidt, “A QoS Aware Approach to Service-Oriented Communication in Future Automotive Networks,” 2019 IEEE Vehicular Networking Conference (VNC), 1-8, 2019, doi:10.1109/VNC48660.2019.9062794.
- J. R. Seyler, T. Streichert, M. Glass, N. Navet, J. Teich, “Formal analysis of the startup delay of SOME/IP service discovery,” 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 49-54, 2015, doi:10.7873/DATE.2015.0469.
- D. Zelle, T. Lauser, T. Kern, C. Krauss, “Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods,” 16th International Conference on Availability, Reliability and Security (ARES ’21), Article 8, 1-20, 2021, doi:10.1145/3465481.3465748.
- M. Iorio, M. Reineri, F. Risso, R. Sisto, F. Valenza, “Securing SOME/IP for In-Vehicle Service Protection,” in IEEE Transactions on Vehicular Technology, 69(11), 13450-13466, 2020, doi:10.1109/TVT.2020.3028880.
- T. Koyama, M. Tanaka, A. Miyajima, S. Ukai, T. Sugashima, M. Egawa, “SOME/IP Intrusion Detection System Using Real-Time and Retroactive Anomaly Detection,” 2022 IEEE 95th Vehicular Technology Conference, 1-7, 2022, doi:10.1109/VTC2022-Spring54318.2022.9860928.
- Bayerische Motoren Werke Aktiengesellschaft, “vsomeip,” GitHub, https://github.com/COVESA/vsomeip, 2023.
- K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, “Experimental Security Analysis of a Modern Automobile,” 2010 IEEE Symposium on Security and Privacy, 447-462, May 2010, doi:10.1109/SP.2010.34.
- C. Valasek, C. Miller, “Advanced CAN Injection Techniques for Vehicle Networks,” Black Hat USA 2016, Aug. 2016.
- Cho, Kyong-Tak, Shin, Kang G., “Error Handling of In-vehicle Networks Makes Them Vulnerable,” 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS2016), 1044-1055, Oct. 2016, doi:10.1145/2976749.2978302.
- K. Iehira, H. Inoue, K. Ishida, “Spoofing attack using bus-off attacks against a specific ECU of the CAN bus,” 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), 1-4, Jan. 2018, doi:10.1109/CCNC.2018.8319180.
- K. Iehira, H. Inoue, K. Ishida, “Feasibility assessment of denial-of-service attacks by analyzing SOME/IP-SD state transition models,” 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC), 1732-1738, Jul. 2024, doi:10.1109/COMPSAC61105.2024.00273.
- AUTOSAR, “Specification of Secure Onboard Communication Protocol,” Requirement Specification AUTOSAR FO R22-11, 2022.
- SF.Lokman, A.T. Othman, MH. Abu-Bakar, “Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review,” EURASIP Journal on Wireless Communications and Networking 2019, 1-17, Jul. 2019, doi:10.1186/s13638-019-1484-3.
- R. Kurachi, Y. Matsubara, H. Takada, N. Adachi, Y. Miyashita, S. Horihata, “CaCAN-centralized authentication system in CAN (controller area network),”14th Int. Conf. on Embedded Security in Cars (ESCAR 2014), 1-10, Apr. 2014.
-
STmicro, “Data brief of SR6P7C8, SR6P7C4,” Microcontroller Specification, 2022.
- Arm, “Cortex-R52+,” Arm, https://developer.arm.com/Processors/Cortex-R52%20Plus, Aug. 2025 (Date of Access).
- Sékou Togola, Sountongnoma Martial Anicet Kiemde, Ahmed Dooguy Kora, "Real Time and Post-Processing Flight Inspection by Drone: A Review", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 3, pp. 92–99, 2021. doi: 10.25046/aj060310
- Essamudin Ali Ebrahim, Nourhan Ahmed Maged, Naser Abdel-Rahim, Fahmy Bendary, "Open Energy Distribution System-Based on Photo-voltaic with Interconnected- Modified DC-Nanogrids", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 982–988, 2021. doi: 10.25046/aj0601108
- Mandlenkosi Shezi, Abejide Ade-Ibijola, "Deaf Chat: A Speech-to-Text Communication Aid for Hearing Deficiency", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 826–833, 2020. doi: 10.25046/aj0505100
- Ihsan Mizher Baht, Petre Marian Nicolae, Ileana Diana, Nameer Baht, "Analysis of Green Building Effect on Micro grid Based on Potential Energy Savings and BIM", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 30–35, 2020. doi: 10.25046/aj050604
- Anouar Bachar, Noureddine El Makhfi, Omar EL Bannay, "Machine Learning for Network Intrusion Detection Based on SVM Binary Classification Model", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 638–644, 2020. doi: 10.25046/aj050476
- Amal Hadri, Khalid Chougdali, Raja Touahni, "Improved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 3, pp. 249–258, 2020. doi: 10.25046/aj050332
- Cheng Chuko, Fang-Lin Chao, Hsin-Yu Tsai, "Design of Interactive Aids for Children’s Teeth Cleaning Habits", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 494–499, 2020. doi: 10.25046/aj050263
- Asmae Bengag, Amina Bengag, Omar Moussaoui, "Attacks Classification and a Novel IDS for Detecting Jamming Attack in WBAN", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 80–86, 2020. doi: 10.25046/aj050210
- Woochun Jun, "Development of Teaching Aids Selection Standards in Maker Education", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 5, pp. 139–142, 2019. doi: 10.25046/aj040518
- Aashir Waleed, Umar Siddique Virk, Muhammad Tanveer Riaz, Shaikh Bilal Mehmood, Saeed Ahmad, Muhammad Rameez Javed, Ali Raza, "Effectiveness and Comparison of Digital Substations Over Conventional Substations", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 4, pp. 431–439, 2019. doi: 10.25046/aj040452
- Faizan Dastgeer, Hassan Erteza Gelani, Faisal Ali, Zahir Javed Paracha, "Enhancing the Energy/Power Efficiency of a DC Distribution Grid for Residential Buildings via Modular Architecture of DC/DC Solid State Transformers", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 5, pp. 288–297, 2018. doi: 10.25046/aj030534
- Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker, "Intrusion detection in cloud computing based attack patterns and risk assessment", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 3, pp. 479–484, 2017. doi: 10.25046/aj020361
- Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid, "Principal Component Analysis Application on Flavonoids Characterization", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 3, pp. 435–440, 2017. doi: 10.25046/aj020356
- Niaz Ahmed, Kashif Ahmed, "Chemical and Different Nutritional Characteristics of Brown Seaweed Lipids", Advances in Science, Technology and Engineering Systems Journal, vol. 1, no. 1, pp. 23–25, 2016. doi: 10.25046/aj010104