IOV intrusion attack detection method and system based on artificial intelligence behaviour analysis

An intrusion attack and artificial intelligence technology, applied in the network field, can solve problems such as the inability to judge the legality of data, the inability to identify and analyze the plaintext of Internet of Vehicles data, etc., and achieve the effect of protecting personal and property safety and preventing intrusion attacks of Internet of Vehicles

Active Publication Date: 2018-04-20
EVERSEC BEIJING TECH +1
View PDF7 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Hidden dangers of network security exist in all components of the Internet of Vehicles architecture. The network security protection of the Internet of Vehicles needs to be implemented through multiple layers of the cloud pipe end. Since the data of the Internet of Vehicles is usually transmitted in an encrypted manner, it is generally impossible to identify and analyze it on the pipe side of the mobile network The plaintext of the Internet of Vehicles data, the traditional intrusion detection method cannot judge the legality of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IOV intrusion attack detection method and system based on artificial intelligence behaviour analysis
  • IOV intrusion attack detection method and system based on artificial intelligence behaviour analysis
  • IOV intrusion attack detection method and system based on artificial intelligence behaviour analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Apparently, the described embodiments are preferred implementation modes for implementing the present invention, and the description is for the purpose of illustrating the general principle of the present invention, and is not intended to limit the scope of the present invention. The scope of protection of the present invention should be defined by the claims. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts belong to the protection of the present invention. range.

[0033] refer to figure 1 As shown, a method for detecting intrusion attacks of the Internet of Vehicles based on artificial intelligence behavior analysis disclosed in the embodiment of the present invention includes the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of networks, and discloses an IOV intrusion attack detection method and system based on artificial intelligence behaviour analysis. The method comprises the steps of: obtaining network access flow data, and reducing flow according to a communication protocol to obtain a network access ticket log; filtering the ticket log at least according to one or more characteristics in an APN, a number segment and an IOV APP; extracting access parameter characteristics and access behaviour characteristics by utilizing known IOV normal access data and abnormal intrusion attack data, and training by using an artificial intelligence classifier model; and, for real-time IOV access data, extracting access parameter characteristics and access behaviour characteristics, judging whether an intrusion attack occurs or not by using the trained classifier model, and correspondingly processing an intrusion attack behaviour. By means of the method and the system disclosed by the invention, whether an IOV vehicle is intruded by an external behaviour or not can be accurately judged.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a method and system for intrusion attack detection of Internet of Vehicles based on artificial intelligence behavior analysis. Background technique [0002] According to the "Intelligent Networked Vehicle Information Security White Paper" released by the China Association of Automotive Engineers in 2017, the penetration rate of China's intelligent driving passenger vehicles has reached 15% in 2015, and this figure is expected to reach 50% in 2019. Intelligent networked vehicles generally communicate through the mobile network through the vehicle sensor network, the vehicle intelligent terminal, the cloud TSP, and the owner's mobile APP, and the communication data is transmitted through the public network, so it also gives hackers an opportunity. Infiltration, intrusion, and attack to achieve illegal purposes. [0003] Hidden dangers of network security exist in all comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1425H04L67/12
Inventor 陈乔何文杰任翔梁彧金红杨满智刘长永
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products