Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for detecting network intrusion risks of vehicles

A network intrusion, vehicle technology, applied in the field of detection of vehicle network intrusion risk

Active Publication Date: 2021-08-17
BEIJING BANGCLE TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And due to the value and mobility of the car itself, the invasion will bring greater losses and risks than personal computers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for detecting network intrusion risks of vehicles
  • A method and device for detecting network intrusion risks of vehicles
  • A method and device for detecting network intrusion risks of vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings and examples. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0048] Those skilled in the art understand that in the embodiments of the present invention, the sequence numbers of the following steps do not mean the order of execution, and the order of execution of each step should be determined by its function and internal logic, and should not be used in the present invention. The implementation of the examples constitutes no limitation.

[0049] In addition, terms such as "first" and "second" in the present invention are only used to distinguish different steps, devices or modules, etc., and neither represent any specific technical meaning nor an inevitable logical sequence among them.

[0050] The present invention provides a method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and device for detecting network intrusion risks of vehicles, which relate to the field of network security. The method includes: detecting a first abnormal event in the IVI system of the vehicle; detecting a second abnormal event on the CAN bus of the vehicle; analyzing the occurrence time of the first abnormal event and the second abnormal event Correlation between the occurrence times of ; and determining the risk of the vehicle being hacked according to the correlation. The method detects the abnormal events of the IVI system and the CAN bus respectively, and compares the correlation of the occurrence time of the two abnormal events. The higher the correlation, the higher the risk of the vehicle being invaded, thus proposing a A simple and easy way to determine the risk of a vehicle being hacked.

Description

technical field [0001] The present application relates to the field of network security, in particular to a method and device for detecting network intrusion risks of vehicles. Background technique [0002] With the development of vehicle intelligence, especially the development of Internet vehicles, the programmable and remote control of vehicle components has become a new trend, and more and more appear in the market. While this trend of intelligence and Internetization brings convenience to users, it also brings new intrusion opportunities to hackers. And due to the value and mobility of the car itself, the invasion will bring greater losses and risks than personal computers. How to judge whether the vehicle has been hacked, how to avoid the intrusion, and how to deal with the intrusion are the problems that need to be solved urgently. [0003] IVI (In-Vehicle Infotainment, in-vehicle infotainment system) system is an in-vehicle integrated information processing system ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/40
CPCH04L12/40H04L63/1425H04L63/1433H04L63/145H04L2012/40215
Inventor 阚志刚彭建芬卢佐华陈彪
Owner BEIJING BANGCLE TECH CO LTD