Attack detection device

An attack detection and detection part technology, applied in the field of attack detection devices, can solve the problem of inability to insert error frames, and achieve the effect of improving security and preventing camouflage attacks

Inactive Publication Date: 2018-01-02
MITSUBISHI ELECTRIC CORP
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, recently, a countermeasure against Matsumoto et al. is known, which can perform a short-circuit attack in which a short circuit occurs on the CAN and an error frame cannot be inserted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection device
  • Attack detection device
  • Attack detection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0046]In this embodiment, first, the outline of CAN and the details of a short-circuit attack will be described, and then the configuration and operation of the attack detection device according to this embodiment will be described.

[0047]

[0048] figure 2 It is a figure which shows the bus structure of CAN.

[0049] The CAN bus is a linear structure using two signal lines CAN_H and CAN_L, with 120Ω as the end at both ends. In addition, a plurality of nodes of node 1 to node n are respectively connected to the CAN bus line via CAN transceivers. These nodes are able to have equal access to the bus in a multi-master manner. In CAN, serial communication is carried out by using the differential voltage of CAN_H and CAN_L to transmit signals.

[0050] image 3 It is a diagram showing the signal level of high-speed CAN.

[0051] Such as image 3 As shown, the state in which the potential difference between CAN_H and CAN_L is large is called dominant, and a logical value ...

Embodiment approach 2

[0104] In Embodiment 1, a case where a short-circuit attack is detected by monitoring the potential difference between two CAN lines is described. Next, an embodiment in which a short-circuit attack is detected by monitoring the impedance between two CAN lines will be described.

[0105] Figure 10 It is a figure which shows an example of the structure of the countermeasure node 2 which performs impedance monitoring.

[0106] exist Figure 10 in, instead of Figure 9 The AD converter 9 is provided with an impedance monitor 11 . other structures with Figure 9 same.

[0107] In this embodiment, the impedance between two CAN lines is measured by the impedance monitor 11 .

[0108] Figure 11 It is a diagram showing a configuration example of the impedance monitor 11 .

[0109] exist Figure 11 Among them, the impedance monitor 11 has a resistor 12 and an AD converter 13 . In addition, the impedance monitor 11 is not limited to any circuit or element as long as it can me...

Embodiment approach 3

[0113] In Embodiment 2, the case where a short-circuit attack is detected by monitoring the impedance between two CAN lines is described. Next, an embodiment in which a short-circuit attack is detected by monitoring the current between two CAN lines will be described.

[0114] Figure 12 It is a diagram showing a configuration example when current monitoring is performed.

[0115] In this embodiment, unlike the case of monitoring the potential difference or impedance, it is not implemented inside the countermeasure node 2, but is implemented on the power supply circuit of the system using CAN, or on the power line or power cable connecting the power supply circuit and CAN. . This is because even if the current flowing in a specific node connected to CAN is monitored, the entire current flowing between the two power supplies (3.5V and 1.5V) of CAN is not monitored.

[0116] exist Figure 12 Among them, a current monitor 14 is inserted in series between the power supply of CA...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention pertains to an attack detection device that detects attacks on a communication network between devices and improves information security on the communication network. The attackdetection device is provided with a CAN (Controller Area Network) that transmits signals to a plurality of nodes via differential voltage between two signal lines and a short circuit detection unit that monitors the signals transmitted on the two signal lines in the CAN and detects short circuits between the two signal lines on the basis of changes in the signals that show characteristics of a short circuit attack by an unauthorized node.

Description

technical field [0001] The invention relates to an attack detection device for detecting an attack on a communication network between devices to improve the information security of the communication network. Background technique [0002] CAN (Controller Area Network: Controller Area Network) is widely known as a communication network between devices. Initially, CAN was developed as a communication technology between in-vehicle devices, and then it was standardized as ISO 11898 and ISO 11519. Currently, CAN is used in a wide range of fields, such as industrial equipment and medical equipment, in addition to in-vehicle networks. CAN is divided into high-speed CAN and low-speed CAN according to the communication speed. The protocols of the two are common, but the maximum communication speed and the physical layer are different. Hereinafter, background art will be described on the premise of high-speed CAN. [0003] As shown in Non-Patent Document 1, CAN has fewer signal line...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): B60R16/023H04L12/28H04L12/40
CPCG01R31/52H04L12/40H04L2012/40215B60R16/023G01R31/3004H04L12/28H04L63/1416H04L67/12
Inventor 佐伯稔菅原健
Owner MITSUBISHI ELECTRIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products