Anomaly Detection Method for Integrated Electronic System Based on Deep Packet Analysis

A technology that integrates electronic systems and deep packet analysis. It is applied in transmission systems, digital transmission systems, electrical components, etc., and can solve problems such as less consideration of safety design, low memory and low CPU frequency.

Active Publication Date: 2020-10-30
EAST CHINA NORMAL UNIV +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Integrated electronic systems are limited by hardware, power consumption, and size, and their memory and CPU frequency are very small. Most integrated electronic systems will make full use of limited hardware resources to meet the requirements of system reliability design, with little consideration for safety. sex design

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anomaly Detection Method for Integrated Electronic System Based on Deep Packet Analysis
  • Anomaly Detection Method for Integrated Electronic System Based on Deep Packet Analysis
  • Anomaly Detection Method for Integrated Electronic System Based on Deep Packet Analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The process, conditions, experimental methods, etc. for implementing the present invention, except for the content specifically mentioned below, are common knowledge and common knowledge in this field, and the present invention has no special limitation content.

[0035] The implication that relevant technical term represents among the present invention is as follows:

[0036] M represents a complete communication (message) in bus communication;

[0037] m ki Indicates the i-th word of the message of the k-th cycle;

[0038] Such as figure 1 As shown, the present invention is based on the anomaly detection method for integrated electronic systems based on deep packet analysis and includes the following four stages:

[0039] The first stage: collect bus data stage: monitor and collect bus transmission data packets;

[0040] The seco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal detection oriented to a comprehensive electronic system based on deep packet analysis. The method comprises the following steps: collecting bus data; monitoring andcollecting a bus transmission data packet; extracting periodical data packet features; extracting a feature value of content change in the collected periodic data packet; training different applications under different subsystems to generate multiple decision trees; training different applications under different subsystems to generate corresponding decision trees; detecting an abnormal data packet through code of conduct; providing the decision tree corresponding to information selection according to the periodical data packet, and predicting a legal operation of the current periodic data packet by utilizing the decision tree, if an instruction in the to-be-checked non-periodic data packet content meets a decision tree prediction result, enabling a message to pass, or regarding that thedata packet is abnormal, and performing abnormal processing. The attack between the bus controller and a subsystem can be detected, thereby effectively resisting replay attack, forgery attack, denialof service and various attacks.

Description

technical field [0001] The invention belongs to the technical field of intrusion detection, and in particular relates to a lightweight intrusion detection method capable of resisting replay attacks, fake subsystem attacks and denial-of-service attacks by in-depth packet analysis and behavior specification detection of abnormal data packets. Background technique [0002] Integrated electronic systems are usually located in physically isolated networks, and their security issues have not been taken seriously. Since the advent of the Stuxnet virus, people have gradually conducted security research on physically isolated networks. Prior to this, people focused on the realization of the functions of the integrated electronic system, and basically did not conduct safety tests on the integrated electronic system. At present, security incidents occur frequently, APT attacks are becoming more and more rampant, and the threat of backdoor programs is becoming more and more severe. Ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/028H04L63/1425H04L63/1458
Inventor 何道敬高甲豪高昀齐维孔王灏宇李明
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products