CN111245773B - Automobile Ethernet flow monitoring method, terminal equipment and storage medium - Google Patents

Automobile Ethernet flow monitoring method, terminal equipment and storage medium Download PDF

Info

Publication number
CN111245773B
CN111245773B CN201811444582.7A CN201811444582A CN111245773B CN 111245773 B CN111245773 B CN 111245773B CN 201811444582 A CN201811444582 A CN 201811444582A CN 111245773 B CN111245773 B CN 111245773B
Authority
CN
China
Prior art keywords
chain
flow
automobile
main chain
firewall
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811444582.7A
Other languages
Chinese (zh)
Other versions
CN111245773A (en
Inventor
赵国开
王敏效
邓超
黄运峰
陈茹涛
韦昌荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yaxon Networks Co Ltd
Original Assignee
Xiamen Yaxon Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yaxon Networks Co Ltd filed Critical Xiamen Yaxon Networks Co Ltd
Priority to CN201811444582.7A priority Critical patent/CN111245773B/en
Publication of CN111245773A publication Critical patent/CN111245773A/en
Application granted granted Critical
Publication of CN111245773B publication Critical patent/CN111245773B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method for monitoring automobile Ethernet flow, a terminal device and a storage medium, wherein the method comprises the following steps: s100: dividing the network flow into a plurality of main chains according to the characteristics of the network flow, setting that each main chain comprises a plurality of secondary chains, and each secondary chain is a mutually independent chain capable of identifying the flow characteristics; s200: when network flow is received, dividing the network flow into a main chain according to the characteristics of the network flow; s300: and performing feature matching according to the secondary chain on the main chain in sequence to select and receive the network traffic meeting the matching condition of the secondary chain on the main chain consistent with the characteristics of the network traffic. The invention aims at the problem that the processing capacity of hardware on an automobile is limited, and redesigns the flow monitoring mode on an automobile gateway/firewall to make the flow monitoring mode more suitable for being used on the automobile, thereby effectively monitoring and controlling the flow with potential Ethernet security threat to make the automobile enter the network more safely.

Description

Automobile Ethernet flow monitoring method, terminal equipment and storage medium
Technical Field
The invention relates to the technical field of automobile networks, in particular to an automobile Ethernet flow monitoring method, terminal equipment and a storage medium.
Background
Networking of automobiles has been a major trend, pushing automobiles from a closed system to an interconnected open system. However, the huge security threat of the automobile after networking is always one reason for the careful networking of the automobile factories and the observation attitude. The threat defense related to the automobile Ethernet is not as mature as the threat defense related to the traditional Internet, and the attention and the used related defense technical means are all explored. Although the conventional ethernet defense technology can also be used for the purpose of reference in the car ethernet, the conventional ethernet defense technology needs to be readjusted and designed due to different application scenarios and environments. Generally, the traditional ethernet traffic monitoring has strong hardware support, and the design of the monitoring filtering rule strategy for the data traffic is relatively random, so that finer control and management are required on the automobile ethernet due to the limitation of hardware resources.
Disclosure of Invention
In view of the above problems, the present invention aims to provide a method, a terminal device and a storage medium for monitoring the ethernet traffic of an automobile, which are capable of redesigning a traffic monitoring mode on an automobile gateway/firewall to make the traffic monitoring mode more suitable for use in the automobile, so as to effectively monitor and control the potential ethernet security threat traffic to make the automobile enter the network more secure, in view of the limited processing capability of hardware on the automobile.
The specific scheme is as follows:
an automobile Ethernet flow monitoring method comprises the following steps:
s100: dividing the network flow into a plurality of main chains according to the characteristics of the network flow, setting that each main chain comprises a plurality of secondary chains, and each secondary chain is a mutually independent chain capable of identifying the flow characteristics;
s200: when network flow is received, dividing the network flow into a main chain according to the characteristics of the network flow;
s300: and performing feature matching according to the secondary chain on the main chain in sequence to delete and select the network traffic meeting the matching condition of the secondary chain on the main chain consistent with the characteristics of the network traffic for receiving.
Further, the set automobile network flow is divided into three types, namely local flow, external flow and forwarding flow, six main chains are set respectively for inflow and outflow of the three types of flow, and the main chains are respectively as follows:
a first main chain: the data flows into the automobile gateway/firewall from the local area network, and the automobile gateway/firewall is used as final target equipment;
a second main chain: the automobile gateway/firewall is sent out as a source, and equipment in a local area network is used as final target equipment;
a third main chain: the data flows into the automobile gateway/firewall from the Internet, and the automobile gateway/firewall is taken as a final target device;
a fourth main chain: the automobile gateway/firewall is sent out as a source, and equipment on the Internet is used as final target equipment;
a fifth main chain: flows from the internet into an automobile gateway/firewall and forwards the data to the final target equipment in the local area network protected by the data;
a sixth main chain: the devices in the LAN protected by the car gateway/firewall are sent out as sources and forwarded to the final target device on the Internet through the car gateway/firewall.
Further, the setting process of the secondary chain in step S100 is: all secondary chains are stored in a feature chain pool, and each main chain extracts the required feature chain from the feature chain pool according to the requirement and is hung on the main chain to serve as the secondary chain.
Further, the rule of feature matching of each secondary chain in step S300 is: judging whether the network flow meets the chain entering condition of the secondary chain, if so, entering the secondary chain, matching the rule sets on the secondary chain one by one, if so, returning to the main chain, and if not, discarding the network flow; and if the requirement of entering the chain is not met, jumping to the next secondary chain for feature matching until all secondary chains on the main chain are completely matched.
An ethernet traffic monitoring terminal device for a vehicle comprises a processor, a memory and a computer program stored in the memory and operable on the processor, wherein the processor executes the computer program to implement the steps of the method according to the embodiment of the present invention.
A computer-readable storage medium, in which a computer program is stored, wherein the computer program, when being executed by a processor, is adapted to carry out the steps of the method according to an embodiment of the present invention as described above.
By adopting the technical scheme, the traffic monitoring method on the automobile gateway/firewall is redesigned aiming at the problem that the processing capacity of hardware on the automobile is limited, so that the traffic monitoring method is more suitable for being used on the automobile, and the traffic is effectively monitored and controlled by the potential Ethernet security threat, so that the automobile is safer to access the network.
Drawings
Fig. 1 is a schematic structural diagram of a first embodiment of the present invention.
Fig. 2 is a schematic diagram illustrating a secondary chain setting process according to a first embodiment of the present invention.
Fig. 3 is a schematic flow chart according to a first embodiment of the present invention.
Detailed Description
To further illustrate the various embodiments, the invention provides the accompanying drawings. The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the embodiments. With these references, one of ordinary skill in the art will appreciate other possible embodiments and advantages of the present invention.
The invention will now be further described with reference to the accompanying drawings and detailed description.
The first embodiment is as follows:
the embodiment of the invention provides a method for monitoring the traffic of an automobile Ethernet, which uses netfilter of linux kernel and iptables basic technology of application layer to design a corresponding mechanism to comprehensively monitor the network traffic of an automobile Ethernet gateway/firewall, and comprises the following steps:
s100: as shown in fig. 1, the network traffic characteristics are divided into a plurality of main chains, which specifically include: the method comprises the following steps of setting automobile network flow into three types of local flow, external flow and forwarding flow, and setting six main chains for inflow and outflow of the three types of flow respectively, wherein the six main chains are as follows:
first backbone local in (local inflow): the data flows into the automobile gateway/firewall from the local area network, and the automobile gateway/firewall is used as final target equipment;
second backbone local out (local outflow): the automobile gateway/firewall is sent out as a source, and equipment in a local area network is used as final target equipment;
third main chain external in (external inflow): the data flows into the automobile gateway/firewall from the Internet, and the automobile gateway/firewall is taken as a final target device;
fourth main chain external out (external outflow): the automobile gateway/firewall is sent out as a source, and equipment on the Internet is used as final target equipment;
fifth backbone forward in: flows from the internet into an automobile gateway/firewall and forwards the data to the final target equipment in the local area network protected by the data;
sixth main chain forward out: the devices in the local area network protected by the automobile gateway/firewall are sent out as a source and are forwarded to the final target device on the internet through the automobile gateway/firewall.
And each main chain is set to comprise a plurality of secondary chains, each secondary chain is a mutually independent chain capable of identifying flow characteristics, and all the secondary chains are stored in the characteristic chain pool.
S200: when network traffic is received, it is divided into a main chain according to the characteristics of the network traffic.
S300: and performing feature matching according to the secondary chain on the main chain in sequence to delete the network traffic meeting the matching condition of the secondary chain on the main chain consistent with the characteristics of the network traffic.
After the network traffic is initially split based on the main chain, the split traffic is sent to the secondary chain hung on the main chain for further monitoring, as shown in fig. 3, the traffic is sequentially subjected to feature matching through the secondary chain, for example, the traffic can be quickly matched whether the traffic meets the chain entering condition of the secondary chain 1, if not, the next secondary chain is directly skipped to quickly match until all the secondary chains on the main chain are completely matched; if the requirement of entering a certain secondary chain is met, entering the secondary chain, matching the rule sets on the chains one by one, if the matching condition is met, returning to the main chain, entering the next secondary chain for feature matching until all the secondary chains on the main chain are completely matched, and if the matching condition is not met, discarding the network flow. If the traffic cannot be matched after being filtered by all the secondary chains, the default processing strategy, such as acceptance or discarding, is skipped.
All secondary chains on the main chain are from a characteristic chain pool, as shown in fig. 2, the characteristic chain pool contains chains capable of identifying flow characteristics, the chains are independent from each other, and each main chain can extract required characteristic chains from the characteristic chain pool as required and is hung on the own chain to serve as a secondary chain. Meanwhile, the main chain can also dynamically delete the unnecessary secondary chain or adjust the hanging position of a certain secondary chain in the main chain.
And if the two secondary chains of TCP and UDP have different chain entering parts, when the network flow is TCP, only the secondary chain conforming to the TCP chain entering part can be entered, but the secondary chain conforming to the UDP chain entering part cannot be entered.
The feature chains supported by the pool of feature chains are shown in table 1. These feature chains are managed using iptables custom chains and by putting rules that identify certain traffic features into the custom chains, do the corresponding actions if traffic flows through the chain and is matched by a set of rules in the feature chain, otherwise process according to the default policy of the feature chain or simply return from the feature chain.
TABLE 1
Feature chain name Monitoring flow
1 IP_MAC_BIND_CHAIN IP/MAC address binding monitoring
2 NET_SCAN_PROTECT_CHAIN Network scanning monitoring
3 CONNECTION_TRACKING_CHAIN State tracking check
4 PACKETS_INSPECT_CHAIN Packet content inspection
5 CONCURENT_LIMIT_CHAIN Concurrent connection number limitation
6 SRC_IP_CHECK_CHAIN Source IP spoofing monitoring
7 DNS_SERVER_QUERY_CHAIN DNS service request monitoring
8 DNS_SERVER_RESPONSE_CHAIN DNS service response monitoring
9 UDP_SERVICE_REQUEST_CHAIN UDP service request monitoring
10 UDP_SERVICE_RESPONSE_CHAIN UDP service response monitoring
11 TCP_SERVICE_REQUEST_CHAIN TCP service request monitoring
12 TCP_SERVICE_RESPONSE_CHAIN TCP service response monitoring
The secondary chain is illustrated below:
such as IP _ MAC _ BIND _ CHAIN secondary CHAIN, is used to detect whether the IP is bound to a particular MAC, and if the IP and MAC information of the packet is not unbound as in a white list preset in the secondary CHAIN, the packet is discarded, and if so, the packet is returned from the secondary CHAIN to the backbone. The process of other feature chain detection and processing is similar and not described in detail here.
In actual use, the 6 main chains can be hooked with the characteristic chains required by the main chains according to needs to carry out fine monitoring on the flow of the incoming flow. For example, the local in main CHAIN attaches feature CHAINs such as IP _ MAC _ BIND _ CHAIN, CONNECTION _ TRACKING _ CHAIN, CONNECTION _ LIMIT _ CHAIN, packet _ insert _ CHAIN from the feature pool as required, so as to monitor the incoming traffic in the order of the feature CHAIN attachment, such as monitoring the validity of IP and MAC of the car internal lan, monitoring the traffic state, limiting the maximum concurrent number of the traffic, checking the packet content of the traffic, etc., and if the traffic does not satisfy the matching condition in the process of entering a certain feature CHAIN, the traffic is processed (such as directly discarded) and does not continue to be monitored.
Example two:
the invention further provides an automobile ethernet flow monitoring terminal device, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the steps in the above method embodiment of the first embodiment of the invention are realized when the processor executes the computer program.
Further, as an executable scheme, the automobile ethernet flow monitoring terminal device may be a computing device such as a desktop computer, a notebook, a palm computer, and a cloud server. The automobile Ethernet flow monitoring terminal equipment can comprise, but is not limited to, a processor and a memory. It is understood by those skilled in the art that the above-mentioned constituent structure of the automotive ethernet traffic monitoring terminal device is only an example of the automotive ethernet traffic monitoring terminal device, and does not constitute a limitation on the automotive ethernet traffic monitoring terminal device, and may include more or less components than the above, or combine some components, or different components, for example, the automotive ethernet traffic monitoring terminal device may further include an input/output device, a network access device, a bus, and the like, which is not limited in this embodiment of the present invention.
Further, as an executable solution, the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, and the like. The general processor may be a microprocessor or the processor may be any conventional processor, etc., the processor is a control center of the automobile ethernet traffic monitoring terminal device, and various interfaces and lines are used to connect various parts of the whole automobile ethernet traffic monitoring terminal device.
The memory can be used for storing the computer program and/or the module, and the processor can realize various functions of the automobile Ethernet flow monitoring terminal equipment by operating or executing the computer program and/or the module stored in the memory and calling the data stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to the use of the mobile phone, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The invention also provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the above-mentioned method of an embodiment of the invention.
The integrated module/unit of the automobile Ethernet flow monitoring terminal device can be stored in a computer readable storage medium if the integrated module/unit is realized in the form of a software functional unit and is sold or used as an independent product. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments described above may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM ), random Access Memory (RAM), software distribution medium, and the like.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (4)

1. A method for monitoring the Ethernet traffic of an automobile is characterized in that: the method comprises the following steps:
s100: dividing the network flow into a plurality of main chains according to the characteristics of the network flow, setting that each main chain comprises a plurality of secondary chains, and each secondary chain is a mutually independent chain capable of identifying the flow characteristics; the method comprises the following steps of setting automobile network flow into three types of local flow, external flow and forwarding flow, and setting six main chains for inflow and outflow of the three types of flow respectively, wherein the six main chains are as follows: a first main chain: the data flows into the automobile gateway/firewall from the local area network, and the automobile gateway/firewall is used as final target equipment; a second main chain: the automobile gateway/firewall is sent out as a source, and equipment in a local area network is used as final target equipment; a third main chain: the data flows into the automobile gateway/firewall from the Internet, and the automobile gateway/firewall is taken as a final target device; a fourth main chain: the automobile gateway/firewall is sent out as a source, and equipment on the Internet is used as final target equipment; a fifth main chain: flows into the automobile gateway/firewall from the Internet and is forwarded to the final target device in the LAN protected by the automobile gateway/firewall; a sixth main chain: the device in the local area network protected by the automobile gateway/firewall is used as a source to send out, and is forwarded to the final target device on the Internet through the automobile gateway/firewall;
s200: when network flow is received, dividing the network flow into a main chain according to the characteristics of the network flow;
s300: performing feature matching in sequence according to the secondary chains on the main chain to delete and select the network traffic meeting the matching conditions of the secondary chains on the main chain consistent with the characteristics of the network traffic for receiving; the rule of feature matching of each secondary chain is as follows: judging whether the network flow meets the chain entering condition of the secondary chain, if so, entering the secondary chain, matching the rule sets on the secondary chain one by one, if so, returning to the main chain, and if not, discarding the network flow; and if the requirement of entering the chain is not met, jumping to the next secondary chain for feature matching until all secondary chains on the main chain are matched.
2. An ethernet traffic monitoring method according to claim 1, characterized in that: the setting process of the secondary chain in the step S100 is as follows: all secondary chains are stored in a characteristic chain pool, and each main chain extracts the required characteristic chain from the characteristic chain pool according to the requirement and is hung on the main chain to serve as the secondary chain.
3. The utility model provides a car ethernet flow monitor terminal equipment which characterized in that: comprising a processor, a memory and a computer program stored in said memory and running on said processor, said processor implementing the steps of the method according to any one of claims 1-2 when executing said computer program.
4. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1-2.
CN201811444582.7A 2018-11-29 2018-11-29 Automobile Ethernet flow monitoring method, terminal equipment and storage medium Active CN111245773B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811444582.7A CN111245773B (en) 2018-11-29 2018-11-29 Automobile Ethernet flow monitoring method, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811444582.7A CN111245773B (en) 2018-11-29 2018-11-29 Automobile Ethernet flow monitoring method, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111245773A CN111245773A (en) 2020-06-05
CN111245773B true CN111245773B (en) 2023-04-18

Family

ID=70875920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811444582.7A Active CN111245773B (en) 2018-11-29 2018-11-29 Automobile Ethernet flow monitoring method, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111245773B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119321A (en) * 2007-09-29 2008-02-06 杭州华三通信技术有限公司 Network flux classification processing method and apparatus
CN101789887A (en) * 2009-12-25 2010-07-28 成都市华为赛门铁克科技有限公司 Method and device for classifying network users and system for monitoring network services
CN102970190A (en) * 2012-12-10 2013-03-13 东南大学 Network traffic monitoring system
CN103560971A (en) * 2013-10-31 2014-02-05 华为技术有限公司 Network flow balancing control method and device
CN104378387A (en) * 2014-12-09 2015-02-25 浪潮电子信息产业股份有限公司 Virtual platform information security protection method
CN104506482A (en) * 2014-10-10 2015-04-08 香港理工大学 Detection method and detection device for network attack
CN106664255A (en) * 2014-04-03 2017-05-10 奥比特多媒体控股公司 Data flow control method
EP3373553A1 (en) * 2017-03-09 2018-09-12 Argus Cyber Security Ltd. System and method for providing cyber security to an in-vehicle network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9602527B2 (en) * 2015-03-19 2017-03-21 Fortinet, Inc. Security threat detection
US10462159B2 (en) * 2016-06-22 2019-10-29 Ntt Innovation Institute, Inc. Botnet detection system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119321A (en) * 2007-09-29 2008-02-06 杭州华三通信技术有限公司 Network flux classification processing method and apparatus
CN101789887A (en) * 2009-12-25 2010-07-28 成都市华为赛门铁克科技有限公司 Method and device for classifying network users and system for monitoring network services
CN102970190A (en) * 2012-12-10 2013-03-13 东南大学 Network traffic monitoring system
CN103560971A (en) * 2013-10-31 2014-02-05 华为技术有限公司 Network flow balancing control method and device
CN106664255A (en) * 2014-04-03 2017-05-10 奥比特多媒体控股公司 Data flow control method
CN104506482A (en) * 2014-10-10 2015-04-08 香港理工大学 Detection method and detection device for network attack
CN104378387A (en) * 2014-12-09 2015-02-25 浪潮电子信息产业股份有限公司 Virtual platform information security protection method
EP3373553A1 (en) * 2017-03-09 2018-09-12 Argus Cyber Security Ltd. System and method for providing cyber security to an in-vehicle network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"A method of traffic flow measuring based on vehicle infrastructure integration system";Q. Wang等;《2009 IEEE Intelligent Vehicles Symposium》;20090714;全文 *
"基于改进分簇算法的网络流量识别方法";王宇科等;《计算机工程与科学》;20111115;全文 *

Also Published As

Publication number Publication date
CN111245773A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN112073411B (en) Network security deduction method, device, equipment and storage medium
US9959751B2 (en) Filter method for adapting a computing load
CN105721461A (en) System and method using dedicated computer security services
EP3399723B1 (en) Performing upper layer inspection of a flow based on a sampling rate
US20160255012A1 (en) Method for mitigation of unauthorized data transfer over domain name service (dns)
CN108881328B (en) Data packet filtering method and device, gateway equipment and storage medium
US10581852B2 (en) Hardware implementation methods and system for secure, policy-based access control for computing devices
US11570201B2 (en) System and method for detecting and blocking malicious attacks on a network
EP2949098A1 (en) Methods, systems, and computer readable media for using policy knowledge for needs based forwarding of bearer session traffic to network nodes
CN112165460B (en) Flow detection method, device, computer equipment and storage medium
CN113709052B (en) Processing method and device of network message, electronic equipment and storage medium
CN104067558A (en) Network access apparatus having a control module and a network access module
CN110768976B (en) Message processing method, device and network equipment
WO2019033891A1 (en) Rdma-based network traffic determination method and device
CN111245773B (en) Automobile Ethernet flow monitoring method, terminal equipment and storage medium
CN111181983B (en) Endogenous access control method, endogenous access control device, computing equipment and medium
CN113395242A (en) Packet capturing method and device for application data packet and computing equipment
CN114745329B (en) Flow control method and device, storage medium and electronic device
CN109672665B (en) Access control method, device and system and computer readable storage medium
CN114024731B (en) Message processing method and device
US20210344704A1 (en) Network Defense Method and Security Detection Device
CN106357688B (en) A kind of method and apparatus for defending ICMP flood attack
CN112532610B (en) Intrusion prevention detection method and device based on TCP segmentation
US20190104110A1 (en) Method and system for controlling transmission of data packets in a network
CN113079128A (en) Information plugging method and device, computing equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant