Recent automotive systems are increasingly complex and networked using various protocols like CAN, LIN, MOST,
FlexRay, etc. The introduction of these technologies adds to the vulnerability of the vehicle security and gives more
opportunities for hackers and thieves to implement various malpractices for their own benefit or to inflict harm. Advancements
in vehicular communication technologies have given rise to the possibility of various network-based attacks. This project focuses
on the Controller Area Network (CAN) protocol and how its vulnerabilities can be exploited to perform malicious attacks like
Denial of Service (DoS) attack on an in-vehicle network prototype. A prototype reverse parking assist system has been used as
the system under test, throughout this paper. Here, we have also introduced a countermeasure for the DoS attack which shuts
off the adversary node from the CAN bus, so that the ideal functioning of the network will resume.