Detecting attacks to internal vehicle networks through Hamming distance