Method and device for detecting anomalies

A technology for detecting anomalies and to be detected, applied in the field of detecting anomalies, can solve problems such as inability to apply and limited application scope, and achieve the effect of preventing vehicle intrusion events, wide application scope, and improving accuracy

Active Publication Date: 2021-12-14
APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution can identify abnormal CAN messages with high reliability only when the CAN message format is known, but it cannot be applied in most scenarios where the specific format of the CAN message cannot be obtained, and its application range is limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting anomalies
  • Method and device for detecting anomalies
  • Method and device for detecting anomalies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following detailed description will be further described below with reference to the accompanying drawings and examples. It will be appreciated that the specific embodiments described herein are only used to explain the relevant invention, not the limitation of the invention. It will also be noted that only portions associated with the relevant invention are shown in the drawings for ease of description.

[0029] It should be noted that the features of the present application and the features in the embodiments in the present application can be combined with each other in the case of an unable conflict. The present application will be described in detail below with reference to the accompanying drawings.

[0030] figure 1 Illustrates an application of the present disclosure may be used, or a method for detecting an abnormality of an exemplary embodiment of the system architecture 100 of the abnormality detecting means.

[0031] like figure 1 , System architecture 100 m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a method and a device for detecting anomalies. A specific implementation of the method includes: obtaining the CAN message of the controller area network to be detected of the vehicle-mounted network to be detected; converting the CAN message to be detected into a point to be detected on the N-dimensional space; inputting the point to be detected to the vehicle-mounted network to be detected The pre-trained CAN message distribution model obtains the distribution of the points to be detected; based on the distribution of the points to be detected, the abnormal detection results of the CAN messages to be detected are generated. This embodiment converts CAN messages into points in N-dimensional space, and performs anomaly detection on CAN messages based on the distribution of points, which improves the accuracy of anomaly detection and helps to prevent the occurrence of vehicle intrusion events.

Description

Technical field [0001] Example The present application relates to computer technology field, particularly to a method and apparatus for detecting an abnormality. Background technique [0002] Vehicle network CAN (Controller Area Network, Controller Area Network) message boundary detection technology is able to detect the transmitted vehicle network does not meet the technical requirements abnormal CAN messages current models DBC document. In the wave of the Internet today, the car networking, autopilot and other technologies have emerged, bringing tremendous value. But the "hackers" continue to occur at the same time through network technology event of attacks on vehicles, but also to raise awareness of its security risk. On-board vehicle network as a last line of defense information security, information security which is very important. [0003] Currently, CAN message boundary detection technique commonly used to solve the following two schemes. First, the use of deep learning ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G05B23/02
CPCG05B2219/24065G05B23/0213
Inventor 郭青龙
Owner APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products