Unlock instant, AI-driven research and patent intelligence for your innovation.

A CAN bus flood attack defense system and method

An attack defense system, CAN bus technology, applied in the field of information security, can solve the problems of unreachable messages, discarding, filtering out, etc., to reduce security risks, ensure security and real-time performance, and protect personal safety and vehicle safety. Effect

Active Publication Date: 2022-06-07
中科曙光(南京)计算技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can detect the injection attack of vehicle CAN, there are some deficiencies: first, the gateway plays a very important role as a bridge for inter-network communication, and this detection method uses the gateway to monitor the communication of all identifiers. Once the calculation load of the gateway exceeds the calculation capacity of the gateway, it will inevitably lead to failure of the vehicle communication network; secondly, although the legal data segment value is between the maximum value and the minimum value it saves, it is between the maximum value and the minimum value. The data value is not necessarily legal, so this method may miss some illegal attack data frames; finally, the CAN bus generates some erroneous data frames due to some reasons (such as physical interference) during actual communication, the standard CAN protocol These data frames will be dropped and will not cause failure to the overall system operation, but this detection method will mistake it for an injection attack and sound an alarm
When the traffic on the bus surges or the cycle is disordered, it is certain that the CAN bus has suffered from injection estimation, but this feature alone cannot achieve the purpose of filtering out the messages injected into the bus.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A CAN bus flood attack defense system and method
  • A CAN bus flood attack defense system and method
  • A CAN bus flood attack defense system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] as Figure 3 As shown , the set of points in the t-d space is S'= {(1,3),(2,2),(3,1)}, derived from reasoning 1 as shown Figure 4 The set of curves in the θ-r space shown, with three curves intersecting at a point Derived from inference 2, the straight-line equation in t-d space that passes through three points is

Embodiment 2

[0070] as Figure 3 As shown , the set of points in the t-d space is S'= {(1,3),(2,2),(3,1)}, derived from reasoning 1 as shown Figure 4 The set of curves in the θ-r space shown, taking the center point coordinate p (0.25π, 2.5) with the largest accumulator value, takes the accuracy of 0.1π which can be obtained by inference 2, and the approximately fitted line in t-d space is l':0.73t +0.68d=2.5.

[0071] According to the fitted straight line, it is easy to identify the point that deviates from the straight line, which is the coordinate of the normal communication message point, and the normal communication message is output to the ECU of the automobile electronic control unit.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CAN bus flood attack defense system. The system includes a detection module and a filter module. The detection module is used to detect whether the CAN bus is attacked and obtain the number of malicious attack messages; the filter module uses Identify and output normal communication packets from the sequence of packets containing attack packets. The invention also provides a method based on the system. The invention solves the problem that there is no filtering strategy for malicious attack messages at present, can detect and filter data in real time, and improves the safety of the vehicle system.

Description

Technical field [0001] The present invention belongs to the field of information security technology, relates to an on-board defense system and method, in particular to a CAN bus flood attack defense system and method. Background [0002] Modern cars rely on electronic control unit ECUs (electronic control units) to control many subsystems, which communicate via bus connections. Developed by BOSCH in the early 1980s, the automotive CAN (Controller Area Network) bus is a serial bus that uses the voltage difference between the two wires of a twisted pair cable for serial communication at speeds up to 1MB / s, and has become the standard protocol for modern automotive buses. Each ECUs connected to the CAN bus transmit data by setting the voltage difference between the two twisted pairs as a signal, while other ECUs on the CAN bus receive data by detecting the voltage difference. Since the ECU directly controls most of the sensors and execution modules of the car, interference and dece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/12H04L12/40
CPCH04L63/1416H04L63/1441H04L63/1458H04L67/12H04L12/40H04L2012/40215H04L2012/40273
Inventor 王海荣
Owner 中科曙光(南京)计算技术有限公司