A method for generating vehicle network simulation data set based on intrusion attack

An in-vehicle network and simulation data technology, applied in the field of automotive information security, can solve problems such as the inability to deal with the attack category of in-vehicle network information security threats, the method of generating variable attack data with less consideration of attacks, the limited security protection capability and the scope of application, etc. Achieve the effect of enriching the data source of vehicle network intrusion detection

Active Publication Date: 2022-02-15
北京梆梆青蓝科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the complexity of the internal architecture of intelligent networked vehicles and the variability of external communication links have led to increasing difficulties in vehicle network security threat tracing and security protection. Existing security protection technologies and intrusion detection methods can only protect against one or a certain The form of attack in a specific scenario has limited security protection capabilities and scope of application for complex and changeable network communication environments
In addition, there are still many problems in the detection range and detection performance of the abnormal behavior detection of the vehicle network, and it is still unable to deal with the complex and changeable vehicle network information security threats and various types of attacks.
[0004] Aiming at the series of problems in the research of automotive intrusion detection technology, one of the main reasons is that in the construction of vehicle network abnormal behavior data, researchers rarely systematically consider the variability of attacks and complex attack data generation methods from the perspective of actual attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for generating vehicle network simulation data set based on intrusion attack
  • A method for generating vehicle network simulation data set based on intrusion attack
  • A method for generating vehicle network simulation data set based on intrusion attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in further detail below in conjunction with the embodiments given in the accompanying drawings.

[0031] refer to Figures 1 to 4B As shown, a method for generating a vehicle-mounted network simulation data set based on an intrusion attack in this embodiment. Firstly, the information security vulnerability analysis of the vehicle network is carried out. According to the existing typical vehicle information security attack cases, the influencing factors of the vehicle network information security are analyzed, and the vehicle information security threat analysis framework is established from the perspective of the attacker. Then analyze the possible attack links under different attack methods and attack paths of the vehicle network, consider different attack methods and their characteristics, and use different attack test tools, software programming control and database programming processing methods to build a variety of attack me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating a vehicle-mounted network simulation data set based on an intrusion attack, comprising the following steps: Step 1, according to five major network security attributes of confidentiality, integrity, usability, authenticity and auditability; Step 2 , analyze the characteristics and differences of vehicle network architectures and systems of different models, reverse technology and methods according to different protocols; step 3, build a real vehicle attack experiment platform through the vehicle bus test tool Vehicle Spy, and realize replay, spoofing, and flooding attack; step 4, based on the attack experiment platform in step 2, use a large amount of simulated attack data to conduct statistics and analysis of abnormal behavior; step 5, use programming languages ​​such as Java, C, Python, etc. Offline data processing to construct a simulation data set. The method for generating the vehicle network simulation data set based on the intrusion attack of the present invention can effectively realize the generation of the data set based on the intrusion attack.

Description

technical field [0001] The invention relates to the technical field of automobile information security, is applicable to the research on the safety protection of vehicle-mounted network information, and specifically relates to a method for generating a vehicle-mounted network simulation data set based on an intrusion attack. Background technique [0002] Intelligentization has promoted the continuous increase in the number of electronic control units inside the car, and the upgrade of the network has increased the interconnection between vehicle information and the outside world. The risk of information security in intelligent networked vehicles continues to increase, and vehicle information and user privacy are facing a huge security test. . Information security issues of intelligent connected vehicles will not only cause privacy leakage and property loss to users, but also cause personal injury and even cause public safety issues. [0003] As an active vehicle information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/14H04L67/12
CPCH04L63/1416H04L63/1425H04L41/14H04L67/12
Inventor 冀浩杰陈彪彭晶左政徐迟
Owner 北京梆梆青蓝科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products