A method and system for intrusion attack detection of Internet of Vehicles based on artificial intelligence behavior analysis

An intrusion attack and artificial intelligence technology, applied in the network field, can solve problems such as the inability to judge the legality of data, the inability to identify and analyze the plaintext data of the Internet of Vehicles, etc., and achieve the effect of protecting personal and property safety and preventing intrusion attacks of the Internet of Vehicles

Active Publication Date: 2021-05-25
EVERSEC BEIJING TECH +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Hidden dangers of network security exist in all components of the Internet of Vehicles architecture. The network security protection of the Internet of Vehicles needs to be implemented through multiple layers of the cloud pipe end. Since the data of the Internet of Vehicles is usually transmitted in an encrypted manner, it is generally impossible to identify and analyze it on the pipe side of the mobile network The plaintext of the Internet of Vehicles data, the traditional intrusion detection method cannot judge the legality of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for intrusion attack detection of Internet of Vehicles based on artificial intelligence behavior analysis
  • A method and system for intrusion attack detection of Internet of Vehicles based on artificial intelligence behavior analysis
  • A method and system for intrusion attack detection of Internet of Vehicles based on artificial intelligence behavior analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are preferred embodiments of the present invention, and the descriptions are for the purpose of illustrating the general principles of the present invention, and are not intended to limit the scope of the present invention. The protection scope of the present invention should be defined by the claims. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. range.

[0033] refer to figure 1 As shown, a method for detecting an intrusion attack of the Internet of Vehicles based on artificial intelligence behavior analysis disclosed in the embodiment of the present invention includes the following step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network technology, and discloses a vehicle network intrusion attack detection method and system based on artificial intelligence behavior analysis. The method includes: obtaining Internet traffic data, restoring the traffic according to the communication protocol, and obtaining an online bill log; at least filtering the above bill log according to one or more characteristics of APN, number segment, and Internet of Vehicles APP; using From the known normal access data and abnormal intrusion attack data of the Internet of Vehicles, extract the access parameter features and access behavior features, and use the artificial intelligence classifier model for training; extract the access parameter features and access behavior features from the real-time Internet of Vehicles access data, Use the trained classifier model to judge whether an intrusion attack has been encountered, and deal with the intrusion attack behavior accordingly. The method and system of the present invention can accurately judge whether external behaviors intrude on networked vehicles.

Description

technical field [0001] The invention relates to the field of network technology, and in particular, to a method and system for detecting intrusion attacks in the Internet of Vehicles based on artificial intelligence behavior analysis. Background technique [0002] According to the data of the "Intelligent and Connected Vehicle Information Security White Paper" released by the China Association of Automotive Engineers in 2017, the penetration rate of intelligent driving passenger vehicles in China reached 15% in 2015, and this figure is expected to reach 50% in 2019. ICVs generally communicate with on-board sensor networks, on-board smart terminals, cloud TSPs, and car owners’ mobile APPs through the mobile network, and the communication data is transmitted through the public network, which also gives hackers an opportunity. Infiltrate, invade, attack, to achieve illegal purposes. [0003] The hidden dangers of network security exist in each component of the Internet of Vehi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1425H04L67/12
Inventor 陈乔何文杰任翔梁彧金红杨满智刘长永
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products