Vehicle-mounted network flow anomaly detection defense method and defense system based on information entropy

A vehicle network and traffic anomaly technology, which is applied in the field of vehicle network traffic anomaly detection and defense methods and defense systems

Inactive Publication Date: 2020-10-23
上海工业控制安全创新科技有限公司 +1
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, before the mass production of autonomous driving, its safety issues have attracted much attention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle-mounted network flow anomaly detection defense method and defense system based on information entropy
  • Vehicle-mounted network flow anomaly detection defense method and defense system based on information entropy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] The CAN bus message and vehicle Ethernet traffic are collected separately through a fixed-size sliding window, the information entropy is calculated for the traffic data in the window, and the calculated entropy value is compared with the preset threshold to detect whether there is an abnormality. Raise an alert if an anomaly occurs, as described below:

[0033] Step 1: Set the sliding window, the setting rules are as follows:

[0034] Step 1.1: Set the maximum tolerable delay maxTime for anomaly detection, and calculate the flow rate v, then the size range of the sliding window is Set a sliding window with a larger capacity as much as possible within this range, and the fixed window size is W;

[0035] Step 1.2: Set the window sliding distance to W / 2.

[0036] Step 2: Set the threshold, the specific steps are as follows:

[0037] Step 2.1: For CAN messages, calculate the information entropy CANEntropy in the window under normal traffic multiple times 1 , CAN Entro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vehicle-mounted network flow anomaly detection defense method based on information entropy. The method comprises the following steps: 1, setting a sliding window; 2, setting athreshold value; 3, collecting and processing flow; 4, when the window is full, calculating the information entropy in the sliding window; and 5, detecting the flow of the CAN bus and the vehicle-mounted Ethernet by using a threshold value. According to the method, the influence of the abnormal flow on the information entropy is utilized, the information entropy in the sliding window is calculated in real time and compared with the preset threshold value, so that whether abnormality occurs or not is detected, and a safety protection scheme for effectively detecting the injection attack of theautomatic driving vehicle-mounted network is realized.

Description

technical field [0001] The invention relates to the technical field of intrusion detection, in particular to an information entropy-based vehicle network flow abnormality detection and defense method and defense system. Background technique [0002] In recent years, with the support of new technologies such as big data, edge computing, and machine learning, the transportation industry is developing rapidly towards intelligent transportation, and is about to usher in the era of autonomous driving. However, before the mass production of autonomous driving, its safety issues have attracted much attention. Because self-driving cars need to exchange information in real time with devices inside and outside the car through networking to provide self-driving services, and networking expands the communication surface of cars, which provides attackers with more interfaces to attack cars. Once the car is attacked, the consequences are very serious, even endangering the lives of passen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/40
CPCH04L63/1425H04L63/1466H04L67/12H04L12/40H04L2012/40215H04L2012/40273H04W4/48H04L43/0894
Inventor 刘虹卢苇蒲戈光
Owner 上海工业控制安全创新科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products