Attack detection method and device for vehicle network, detector and storage medium

A vehicle network and attack detection technology, applied in the field of data security, can solve problems such as insufficient comprehensiveness, and achieve the effect of fast and convenient detection, direct and convenient detection

Active Publication Date: 2020-07-03
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although this method can realize the detection of the vehicle network, it is not comprehensive enough. For example, an attacker imitates a normal data packet and injects the imitated data packet into the vehicle network. Using the above detection method will identify the imitated data packet is normal, so this attack cannot be detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device for vehicle network, detector and storage medium
  • Attack detection method and device for vehicle network, detector and storage medium
  • Attack detection method and device for vehicle network, detector and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0044] In this embodiment, multiple buses of the vehicle can form a vehicle network, and the vehicle network can realize data interaction between various components of the vehicle itself, such as ECU (Electronic Control Unit, electronic control unit), MCU (MicrocontrollerUnit, micro control unit), etc. Alternatively, the vehicle network may be an external network in which the vehicle's communicator interacts with other vehicle's communicators or with the cloud.

[0045] see figure 1 , the embodiment of the present application provides a detector 10, which can be deployed in the vehicle network of the vehicle, so as to detect whether the vehicle network is under attack to test.

[0046] Specifically, the detector 10 may include: a plurality of bus transceivers 11, a plurality of bus controllers 12 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack detection method and device for a vehicle network, a detector and a storage medium. When a data packet is collected, whether the data packet is transmitted by a plurality of buses or not can be analyzed by determining that the plurality of buses need to be transmitted. And if the data packet is not the data packet injected by the attacker, it is indicated that thedata packet is the data packet injected by the attacker, and it is indicated that the vehicle network is subjected to the interception type attack, so that the vehicle network can be detected to be subjected to the interception type attack under the condition that the data packet injected by the attacker simulates normal data.

Description

technical field [0001] The present application relates to the technical field of data security, in particular, to an attack detection method, device, detector and storage medium for a vehicle network. Background technique [0002] With the development of vehicles towards intelligence, human-vehicle interaction, vehicle-vehicle interaction, and vehicle-cloud interaction have been gradually applied to practice, making the vehicle network gradually transform from a relatively private network to an open network. Therefore, it is necessary to detect this open network to ensure security. [0003] For the detection of the vehicle network, the current detection method is to deploy a white list for the vehicle network. The white list records the ID (Identity Document, ID card identification number) of the data packet that needs to be transmitted on the bus of the vehicle network. List analysis Whether the ID of the actually collected data packet is a data packet in the white list ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/40
CPCH04L63/145H04L12/40006H04L2012/40273
Inventor 崔圳范雪俭
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products