TW202224382A - Verfahren zum ueberwachen eines datenverkehrs zwischen steuergeraeten eines kraftfahrzeugs sowie entsprechend ausgestattetes kraftfahrzeug - Google Patents

Verfahren zum ueberwachen eines datenverkehrs zwischen steuergeraeten eines kraftfahrzeugs sowie entsprechend ausgestattetes kraftfahrzeug Download PDF

Info

Publication number
TW202224382A
TW202224382A TW110139050A TW110139050A TW202224382A TW 202224382 A TW202224382 A TW 202224382A TW 110139050 A TW110139050 A TW 110139050A TW 110139050 A TW110139050 A TW 110139050A TW 202224382 A TW202224382 A TW 202224382A
Authority
TW
Taiwan
Prior art keywords
data
packet
network
associative memory
counter
Prior art date
Application number
TW110139050A
Other languages
Chinese (zh)
Other versions
TWI807454B (en
Inventor
亞歷山德魯 斯蒂雷休
科斯托 帕特拉斯庫
卡斯登 施密特
伯恩哈德 斯坦格爾
塞皮略 何塞 安東尼奧 穆尼奧斯
Original Assignee
德商奧迪股份有限公司
奧地利商Tt科技汽車公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 德商奧迪股份有限公司, 奧地利商Tt科技汽車公司 filed Critical 德商奧迪股份有限公司
Publication of TW202224382A publication Critical patent/TW202224382A/en
Application granted granted Critical
Publication of TWI807454B publication Critical patent/TWI807454B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40267Bus for use in transportation systems
    • H04L2012/40273Bus for use in transportation systems the transportation system being a vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/44Star or tree networks
    • H04L2012/445Star or tree networks with switching in a hub, e.g. ETHERNET switch

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Medicines That Contain Protein Lipid Enzymes And Other Medicines (AREA)
  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
  • Acyclic And Carbocyclic Compounds In Medicinal Compositions (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for monitoring data traffic between control devices (12, 13) of a motor vehicle (10), wherein at least one data pattern (23) of a packet type to be monitored and/or detected and/or data content is stored in a content addressable memory (22) such that by means of the content addressable memory (22), an assigned hit signal (27) is generated in response to input data (25) which contains the relevant data pattern (23), and a network processor (21) reads detection data (31) from received data packages (18) at predetermined monitoring positions (31) and therefrom forms input data (25) for the content addressable memory (22) and by inputting the input data (25) into the content addressable memory (22), checks whether a hit signal (27) is produced, and a microprocessor (29) detects, by means of a predetermined comparison routine (32) and on the basis of transmission plan data (33) which describe a correct transmission scheme of the control devices (12, 13), whether the hit signals (27) deviate from the transmission scheme.

Description

用於監測機動車輛的控制單元間的資料流量之方法以及經適當裝備之機動車輛Method for monitoring data flow between control units of a motor vehicle and suitably equipped motor vehicle

本發明係有關於一種用於監測機動車輛的控制單元間的資料流量之方法以及一種經適當裝備之機動車輛。該監測係在切換裝置中實施,該切換裝置在資料網的若干網路支路間傳輸資料封包。需要檢查資料封包或其至少部分是否涉及預設之非期望資料流量,例如其可能為駭客攻擊的組成部分或者由機動車輛之經惡意操縱或損壞之控制單元引起,而不至造成轉發的顯著延遲或潛時。The present invention relates to a method for monitoring data flow between control units of a motor vehicle and to a suitably equipped motor vehicle. The monitoring is carried out in a switching device which transmits data packets between several network branches of the data network. It is necessary to check whether the data packets or at least parts thereof involve predetermined undesired data traffic, for example, which may be part of a hacking attack or caused by a maliciously manipulated or damaged control unit of a motor vehicle, without causing significant forwarding Delay or dive time.

在機動車輛中,此類控制單元可透過資料網路(Datennetzwerk)或資料網(Datennetz)而彼此耦合,以便交換資料封包,從而例如實現包括多個控制單元的車輛功能。針對此種資料網的例子是以太網。此種資料網的網路支路可透過切換裝置(亦可簡稱「Switch」或資料分配器)而聯接。為此,每個網路支路可連接在切換裝置的一相應之端口上。此種端口可指網路支路之網線的物理接頭以及用於發送及接收資料封包的電路。若在某個端口上有資料封包自連接之網路支路到達,則測定必須將此資料封包轉發至哪個其他網路支路或哪些其他網路支路。隨後在切換裝置內部,藉由某個電路將此資料封包轉發或發送至相應的目標端口,該電路在此稱為切換電路。透過按上述方式切換式轉發資料封包,便能使得網路支路間保持邏輯分離,從而實現防火牆功能。In motor vehicles, such control units can be coupled to one another via a data network (Datannetzwerk) or data network (Datannetz) in order to exchange data packets, for example to implement vehicle functions comprising a plurality of control units. An example for such a data network is Ethernet. The network branches of such a data network can be connected through a switching device (also referred to as "Switch" or a data distributor). For this purpose, each network branch can be connected to a corresponding port of the switching device. Such a port can refer to the physical connector of the network cable of the network branch and the circuit used to send and receive data packets. If a data packet arrives on a port from a connected network branch, it is determined to which other network branch or other network branches the data packet must be forwarded. Then, within the switching device, the data packet is forwarded or sent to the corresponding target port by a circuit, which is referred to as a switching circuit herein. By switching the forwarding of data packets in the above-mentioned manner, the network branches can be kept logically separated, thereby realizing the firewall function.

為了測定需要將接收到的資料封包轉發至何處,即在切換電路內部導引至哪個目標端口,可使用所謂之相聯記憶體。此種相聯記憶體的另一名稱為CAM過濾器(CAM – content addressable memory,內容可定址記憶體),如TCAM(ternary content addressable memory,三態內容可定址記憶體)。藉由相聯記憶體便能在此種切換電路中進行所謂之切換或選路。但在相聯記憶體中,作為輸入資料只能將有限數目之位元或位元組自相應接收到的資料封包輸入,以便獲得描述該至少一個待使用目標端口的目標端口資料。In order to determine where the received data packets need to be forwarded, ie to which destination port is directed inside the switching circuit, a so-called associative memory can be used. Another name for this type of associative memory is a CAM filter (CAM – content addressable memory), such as TCAM (ternary content addressable memory, ternary content addressable memory). So-called switching or routing can be performed in such switching circuits by associative memory. In associative memory, however, only a limited number of bits or bytes can be input as input data from the corresponding received data packets in order to obtain target port data describing the at least one to-be-used target port.

在分析控制單元的資料流量以探測其中某個控制單元中之惡意操縱及/或探測額外連接至資料網的非授權設備時,可能需要費力地分析網路中傳輸之資料封包。但此舉不應在資料封包之傳輸過程中引起額外的潛時或等待時間,否則,機動車輛中與資料封包相關的相應功能(如控制倒車攝影機)可能受到影響。另一方面,為了進行詳細分析而輸出或複製資料封包會引起較大的資料量,使得在機動車輛中無法以合理的成本提供所需的計算能力。When analyzing the data traffic of the control units to detect malicious manipulation in one of the control units and/or to detect additional unauthorized devices connected to the data network, it may be necessary to laboriously analyze the data packets transmitted in the network. However, this should not cause additional latency or waiting time during the transmission of the data packets, otherwise, the corresponding functions in the motor vehicle related to the data packets (such as controlling the backup camera) may be affected. On the other hand, exporting or duplicating data packets for detailed analysis results in a large amount of data, making it impossible to provide the required computing power at a reasonable cost in a motor vehicle.

US 8 582 428 B1披露過,在採用相聯記憶體TCAM的路由器中可藉由計數器來為某種封包類型之資料封包計數。可為資料封包額外配設時間戳,以便對資料流量進行分析。時間戳亦用來測量通信鏈路的時效。US 8 582 428 B1 discloses that data packets of a certain packet type can be counted by a counter in a router using an associative memory TCAM. Additional timestamps can be assigned to data packets for analysis of data traffic. Timestamps are also used to measure the age of communication links.

WO 2019 / 116973 A1披露過,透過以下方式來識別出機動車輛中的非授權資料流量:控制單元每秒產生多於初設的資料。因此,控制單元之僅會引起數個在機動車輛中造成損害之資料封包的惡意操縱,無法被識別。WO 2019/116973 A1 discloses that unauthorized data traffic in a motor vehicle is identified by the following way: the control unit generates more data per second than is initially set. Thus, malicious manipulation of the control unit, which only causes a few data packets that cause damage in the motor vehicle, cannot be identified.

WO 2006 / 069041 A2和US 2007 / 022474 A1披露過,在以下情況下總是刪除防火牆中的資料封包:單位時間內某個特定發送者之特定類型之資料封包的數目高於閾值。但此方法僅能阻止基於大量產生資料封包的所謂之拒絕服務型攻擊。WO 2006/069041 A2 and US 2007/022474 A1 disclose that data packets in the firewall are always deleted if the number of data packets of a specific type from a specific sender per unit time is above a threshold. But this method can only prevent so-called denial-of-service attacks based on mass-producing data packets.

US 2020 / 304532 A1披露過,藉由TCAM相聯記憶體來分析機動車輛中的資料流量,以探測設備中的過大資料通信量。為防止微處理器在分析異常資料封包時過載,藉由第一規則來預過濾所有資料封包,唯有根據第一規則異常的資料封包方被轉發給微處理器以便應用第二規則。US 2020/304532 A1 disclosed that the data traffic in motor vehicles is analyzed by TCAM associative memory to detect excessive data traffic in equipment. In order to prevent the microprocessor from being overloaded when analyzing abnormal data packets, all data packets are pre-filtered by the first rule, and only abnormal data packets according to the first rule are forwarded to the microprocessor for applying the second rule.

US 2017 / 118 041 A1披露過一種防火牆運算器,其藉由多個分佈式TCAM相聯記憶體來過濾資料封包,並將某些資料封包發送給CPU。結合防火牆規則ACL(存取控制清單)便能在防火牆運算器中計數哪項規則被應用了多少次。US 2017/118 041 A1 discloses a firewall operator that filters data packets through a plurality of distributed TCAM associative memories, and sends some data packets to the CPU. Combined with firewall rule ACLs (Access Control Lists) it is possible to count which rule is applied how many times in Firewall Calculator.

本發明之目的在於,在機動車輛中識別控制單元或額外連接之設備的異常資料流量。The object of the invention is to detect abnormal data traffic of control units or additionally connected devices in motor vehicles.

本發明用以達成上述目的之解決方案為獨立項之主題。本發明的有利實施方式參閱附屬項、下文中之描述以及附圖。The solution of the present invention to achieve the above-mentioned objects is the subject of an independent item. Advantageous embodiments of the invention refer to the appendix, the description below and the drawings.

本文提供一種用於監測機動車輛的控制單元間的資料流量之方法,其中將待監測及/或待探測封包類型以及/或者資料內容的至少一個資料模式儲存在相聯記憶體(如TCAM)中,使得該相聯記憶體作為對包含相應資料模式之輸入資料的反應而產生經分配的命中信號,並且相應地,網路處理器自接收到的資料封包在預設監測位置上讀出探測資料,並且從中形成用於該相聯記憶體的輸入資料,並且透過將該些輸入資料輸入該相聯記憶體來檢查是否產生命中信號,並且微處理器結合描述該些控制單元之常規發送方案的發送規劃資料,藉由預設匹配例程來識別出該些分析資料是否不同於該發送方案。隨後可啟動防禦例程。資料模式可為位元模式或位元組模式。Provided herein is a method for monitoring data traffic between control units of a motor vehicle, wherein at least one data pattern of packet types to be monitored and/or probed and/or data content is stored in an associative memory (eg TCAM) , so that the associative memory generates an assigned hit signal in response to the input data containing the corresponding data pattern, and accordingly, the network processor reads the probe data at the preset monitoring position from the received data packet , and form input data for the associative memory from it, and check whether a hit signal is generated by inputting these input data into the associative memory, and the microprocessor combines the description of the conventional transmission scheme of the control units. Send planning data, identify whether the analysis data is different from the sending plan by a preset matching routine. A defense routine can then be initiated. The data pattern can be either a bit pattern or a byte pattern.

本發明係有描述一種用於監測機動車輛的控制單元間的資料流量之方法。根據該方法,該些控制單元透過資料網而連接,在該資料網中,切換裝置將若干用於接收及發送資料封包的物理端口透過切換電路或資料分配器而聯接。在該方法中,透過該些端口中的一個接收到的每個資料封包皆透過網路處理器藉由相聯記憶體而被分配若干目標端口資料,並且根據自該些(整體存在之)端口所測定的目標端口資料,將至少一個端口選為目標端口,並且透過該切換電路將該接收到的資料封包或其至少一部分導引至該至少一個目標端口。The present invention describes a method for monitoring data flow between control units of a motor vehicle. According to the method, the control units are connected through a data network in which the switching device connects a number of physical ports for receiving and sending data packets through switching circuits or data distributors. In this method, each data packet received through one of the ports is assigned target port data through the network processor through associative memory, and according to the ports from the (entirely existing) ports According to the determined target port data, at least one port is selected as the target port, and the received data packet or at least a part thereof is directed to the at least one target port through the switching circuit.

亦即,該切換裝置按習知方式在內部具有切換電路,其用於可選地將接收到的資料封包自某個端口傳輸給至少一個目標端口,從而在網路支路之間傳輸資料封包(進行切換或選路)。為此,每個端口皆可具有收發電路,以便接收及/或發送資料封包。此處所提及之相聯記憶體可實施為或提供為CAM(content addressable memory,內容可定址記憶體),特別是TCAM(ternary content addressable memory,三態內容可定址記憶體)。目標端口資料按習知方式係源於相應連接至端口的控制單元或設備。That is, the switching device has a switching circuit inside in a conventional manner, which is used to selectively transmit the received data packets from a certain port to at least one destination port, thereby transmitting the data packets between the network branches (to switch or route). To this end, each port may have a transceiver circuit to receive and/or transmit data packets. The associative memory referred to here may be implemented or provided as CAM (content addressable memory), in particular TCAM (ternary content addressable memory). Target port data originates from the corresponding control unit or device connected to the port in a conventional manner.

本發明為了達成上述目的而提出,將待監測及/或待探測封包類型以及/或者資料內容的至少一個資料模式儲存在相聯記憶體中,使得該相聯記憶體作為對包含相應資料模式之輸入資料的反應而產生經分配的命中信號。相應地,網路處理器自該些接收到的資料封包不僅讀出用於測定該至少一個目標端口的資料,而且在資料封包的預設監測位置上(即在預定位元位置或位元組位置上)讀出探測資料並將其歸納成更多用於相聯記憶體的輸入資料,隨後透過將該些輸入資料輸入該相聯記憶體來檢查是否產生命中信號。由此,相聯記憶體亦用來探測預設封包類型的資料封包及/或具有預設資料內容的資料封包。其中,透過預定此等監測位置(即位元位置或位元組位置)來規定應在資料封包中的何處,即在哪個地點上,將資料封包中的位元或位元組作為用來形成用於相聯記憶體之輸入資料的探測資料而讀出。在此情形下,此等用於相聯記憶體之輸入資料並非用來找到目標端口,而是供相聯記憶體來產生命中信號,此點表明已識別出了對應的資料模式。此種命中信號例如可由旗標組成,該旗標表明相聯記憶體已在輸入資料中識別出了相應的資料模式。In order to achieve the above object, the present invention proposes to store at least one data pattern of the packet type and/or data content to be monitored and/or detected in the associative memory, so that the associative memory is used as a pair of data patterns containing the corresponding data pattern. The response to the input data produces an assigned hit signal. Accordingly, the network processor reads not only the data for determining the at least one target port from the received data packets, but also at a predetermined monitoring position of the data packet (ie, at a predetermined bit position or byte group). position) read the probe data and summarize it into more input data for the associative memory, and then check whether a hit signal is generated by feeding these input data into the associative memory. Thus, the associative memory is also used to detect data packets of a predetermined packet type and/or data packets with a predetermined data content. Among them, by predetermining these monitoring positions (ie, bit positions or byte positions), it is specified where in the data packet, that is, at which position, the bits or bytes in the data packet are used to form The probe data for the input data of the associative memory is read. In this case, the input data for the associative memory is not used to find the target port, but for the associative memory to generate a hit signal, which indicates that the corresponding data pattern has been identified. Such a hit signal may, for example, consist of a flag indicating that the associative memory has identified a corresponding data pattern in the input data.

此外還提供至少一個計數器,透過其相應之計數器值來給出關於至少一個預設資料模式而多少次產生了命中信號。將相應之計數器值及用來使得計數器值最後一次增大的該最後一個資料封包作為分析資料提供在讀出記憶體中,微處理器透過資料介面來讀出該些最新分析資料。如此便能計數:多少次識別或探測到了至少一種預設資料模式,其產生某個資料封包之特定監測位置的監測資料。亦可將計數器應用於多個不同的命中信號,即應用於多個不同的資料模式,其中將單獨一個計數器與該相聯記憶體的多個記錄項耦合。在分析資料中存在關於哪個資料封包最終使得計數器值增大的資訊,其中額外地亦將計數器值一併儲存在讀出記憶體中之分析資料中。其視需要可被微處理器主動地讀出。亦即,讀出記憶體中之分析資料可隨每次計數器變化而更新。可針對每個計數器設有單獨的儲存空間,亦可針對多個或所有計數器之分析資料設有共同的儲存空間。In addition, at least one counter is provided, with its corresponding counter value indicating how many times a hit signal has been generated with respect to the at least one predetermined data pattern. The corresponding counter value and the last data packet used to increase the counter value for the last time are provided in the read memory as analysis data, and the microprocessor reads out the latest analysis data through the data interface. In this way, it is possible to count how many times at least one predetermined data pattern was identified or detected, which resulted in monitoring data for a particular monitoring location of a data packet. Counters can also be applied to multiple different hits, ie to multiple different data patterns, where a single counter is coupled to multiple entries of the associative memory. In the analysis data there is information about which data packet finally increased the counter value, wherein the counter value is additionally also stored in the analysis data in the read-out memory. It can be actively read by the microprocessor as required. That is, the analysis data in the read-out memory can be updated every time the counter changes. A separate storage space may be provided for each counter, or a common storage space may be provided for the analysis data of multiple or all counters.

機動車輛中的特點在於,至少一部分資料流量係由遵循固定程式化發送方案的控制單元產生。唯有一定已知比例的資料流量是動態的,例如為用於娛樂電子設備之控制單元的資料流量。該比例亦可為零。在分析資料不同於發送方案的情況下,結合描述控制單元之常規發送方案的發送規劃資料,微處理器便能藉由預設匹配例程來識別出此種情形,從而觸發預設之防禦例程。It is characteristic in motor vehicles that at least a part of the data flow is generated by a control unit following a fixed programmed transmission scheme. Only a certain known proportion of the data traffic is dynamic, eg the data traffic of a control unit for entertainment electronics. The ratio can also be zero. In the case where the analysis data is different from the transmission scheme, combined with the transmission planning data describing the conventional transmission scheme of the control unit, the microprocessor can identify such a situation through the preset matching routine, thereby triggering the preset defense case Procedure.

亦即,本發明基於以下認識:在非惡意操縱的機動車輛中,即在沒有任何控制單元不同於發送方案,並且沒有任何額外設備連接至資料網並產生額外資料流量的情況下,僅會產生根據匹配例程符合發送方案的分析資料,如發送規劃資料所描述的發送方案,該些發送規劃資料例如可由機動車輛的製造商給出。匹配例程可要求與此等發送規劃資料完全一致,亦可允許最終分析資料的計數器值及/或資料內容存在公差。本文所描述之方法特別是可應用於以太網資料封包。以太網作為資料網係基於封包相關之資料流量,因而(不同於時隙相關之資料網),發送時間點及/或資料流量中之資料量可能發生變化,因為未設預留時隙。透過計數器值便能識別出是否針對某個資料模式的資料封包數目超過閾值,此點與準確的發送時間點無關。在分析資料中亦包含會觸發閾值之覆寫的資料封包,如此便能推斷出發送器,即識別出被惡意操縱或損壞之控制單元,或者能夠識別出所使用的發送器地址不屬於機動車輛之供貨商方的控制單元,而是屬於額外連接至資料網的設備。防禦例程或防禦措施例如可指在機動車輛中實施之功能限制,例如減小功能範圍或斷開功能,如斷開媒體播放及/或通話功能及/或國際網路連接。具體視用來識別與發送方案之偏差的TCAM記錄項或資料封包而定地,可限制或關斷機動車輛的另一功能。That is, the invention is based on the recognition that in a non-maliciously manipulated motor vehicle, i.e. without any control unit different from the transmission scheme, and without any additional equipment connected to the data network and generating additional data traffic, only According to the matching routine, the analysis data of the transmission scheme, such as the transmission scheme described by the transmission planning data, can be specified by the manufacturer of the motor vehicle, for example. Matching routines may require complete agreement with these transmit planning data, and may also allow for tolerances in the counter values and/or data content of the final analysis data. The methods described herein are particularly applicable to Ethernet data packets. Ethernet as a data network is based on packet-related data traffic, so (unlike time-slot-related data networks), the time of transmission and/or the amount of data in the data traffic may change because no reserved time slots are set. The counter value can identify whether the number of data packets for a certain data pattern exceeds the threshold, which has nothing to do with the exact time of sending. The analysis data also includes data packets that trigger an overwrite of the threshold, so that it is possible to infer the transmitter, i.e. to identify a maliciously manipulated or damaged control unit, or to identify that the address of the transmitter used does not belong to the motor vehicle. The control unit on the supplier side, but is an additional device connected to the data network. Defensive routines or defensive measures may for example refer to functional limitations implemented in the motor vehicle, such as reducing the functional scope or disconnecting functions, such as disconnecting media playback and/or calling functions and/or international network connections. Depending on the TCAM entries or data packets used to identify deviations from the transmission scheme, another function of the motor vehicle can be restricted or disabled.

該相應之計數器(Counter)及/或相聯記憶體(TCAM)可分別為網路處理器的部分,或者該相應之計數器及/或相聯記憶體可被提供在該網路處理器外部。The corresponding counter (Counter) and/or associative memory (TCAM) may be part of the network processor, respectively, or the corresponding counter and/or associative memory may be provided external to the network processor.

本發明亦包括提供更多優點的實施方式。The present invention also includes embodiments that provide further advantages.

根據一種實施方式,針對每個計數器,除了該計數器值以外還儲存該計數器值之最後一次增大的時間戳,並將其作為該讀出記憶體中之分析資料的部分而提供。亦即,讀出記憶體中之分析資料包含計數器值、其時間戳及最終接收到的相關資料封包。亦即,此處所用之計數器值表明分析資料中所含的資料封包何時到達,並且觸發命中信號。實踐表明,此點在結合控制單元之發送方案的情況下實現了非常靈敏的故障識別及惡意操縱識別。如此,藉由匹配例程來檢查分析資料的微處理器亦能接收至少一個車輛組件及/或控制單元的活動信號,並且結合時間戳來檢查該資料封包是否基於車輛組件及/或控制單元之該表明的活動而被發送,以及檢查儘管其處於發送方案範圍以外,但該活動所觸發之資料封包受到承認,因而仍被歸類為允許之舉,從而毋需觸發防禦例程。例如可透過CAN滙流排來接收該活動信號。特別重要之處在於,微處理器不得因此而過載,較佳在微處理器中可自行決定該資料封包是否確實自讀出記憶體/在資料介面上獲得,或者是否應被下一資料封包覆寫,因為微處理器當前不具有進行即時處理的可用資源。在微處理器中可保持概覽,因為就每個資料封包而言,其序數(計數器)及/或時間戳係可用。由此,本申請主題針對微處理器提供一種監測工具,其能防止微處理器過載,並且在「可疑」或用相聯記憶體選出之資料封包中仍能提供詳細的認識(該資料封包本身同樣在資料介面上被提供)。較佳地,該些資料封包僅在一個資料介面上被提供,以便微處理器總是能夠自行決定在具備相應計算能力的情況下是否調取資料封包。在微處理器在該資料介面上接受資料封包的情況下,透過計數器值及時間戳來向微處理器表明存在哪個資料封包及/或該資料封包已有多久。According to one embodiment, for each counter, a timestamp of the last increment of the counter value is stored in addition to the counter value and provided as part of the analysis data in the read memory. That is, the analysis data in the read-out memory includes the counter value, its time stamp and the related data packet finally received. That is, the counter value used here indicates when a data packet contained in the analysis data arrives and triggers a hit signal. Practice has shown that this point achieves very sensitive fault identification and malicious manipulation identification in combination with the transmission scheme of the control unit. In this way, the microprocessor checking the analysis data by means of the matching routine can also receive the activity signal of at least one vehicle component and/or the control unit and, in combination with the time stamp, check whether the data packet is based on the data of the vehicle component and/or the control unit. The indicated activity is sent and checks that although it is outside the scope of the sending scheme, the data packets triggered by the activity are acknowledged and thus classified as permissible without triggering a defense routine. The active signal can be received, for example, via a CAN bus. It is especially important that the microprocessor is not overloaded by this, preferably in the microprocessor it is up to the microprocessor to decide whether the data packet is actually obtained from the read memory/on the data interface, or whether it should be used by the next data packet Override because the microprocessor does not currently have the resources available for immediate processing. An overview can be maintained in the microprocessor because for each data packet its ordinal (counter) and/or time stamp is available. Thus, the subject matter of the present application provides a monitoring tool for microprocessors that prevents overloading the microprocessor and still provides detailed insight in "suspicious" or associative memory selected data packets (the data packets themselves also provided on the data interface). Preferably, the data packets are only provided on one data interface, so that the microprocessor can always decide whether to retrieve the data packets if the corresponding computing capability is available. In the event that the microprocessor accepts a data packet on the data interface, the counter value and the time stamp are used to indicate to the microprocessor which data packet exists and/or how long the data packet has been.

根據一種實施方式,至少一個計數器對針對至少兩個資料模式的命中信號進行計數。亦即,在至少一個計數器中對針對至少兩個不同資料模式的命中信號進行歸納。亦即,在該二資料模式中的任一個被相聯記憶體識別出的情況下,計數器總是被增量。此舉之優點在於,以下惡意操縱亦能被識別出:其試圖例如透過使用兩個不同的發送器地址及/或MAC地址(MAC-medium access control,媒體存取控制),來將經惡意操縱的資料流量分佈在多個不同的封包類型中。According to one embodiment, at least one counter counts hit signals for at least two data patterns. That is, hit signals for at least two different data patterns are summarized in at least one counter. That is, in the event that either of the two data patterns is recognized by the associative memory, the counter is always incremented. The advantage of this is that malicious manipulations that attempt to transfer malicious manipulations, eg by using two different sender addresses and/or MAC addresses (MAC-medium access control), are also identified. The data traffic is distributed among a number of different packet types.

根據一種實施方式,透過該網路處理器及/或該微處理器,在符合某個特定復位條件的情況下,將該至少一個計數器的相應計數器值復位。換言之,並非在機動車輛啟動起便對某種資料模式之所有資料封包的絕對數目進行計數,而是亦可規定計數間隔。可能的計數間隔為時間單位,亦即,可設置復位條件,使得在某個時間段期滿後,例如在一秒或十秒或一分鐘後將相應的計數器復位。可針對每個資料模式設置自有的復位條件。另一復位條件可與信號相關,從而將某個換擋操作或機動車輛之組件(如倒車攝影機或媒體播放設備)中的行動,用於分配給該組件之資料模式的計數器,復位。According to one embodiment, the corresponding counter value of the at least one counter is reset by the network processor and/or the microprocessor, when a certain reset condition is met. In other words, instead of counting the absolute number of all data packets of a certain data mode when the motor vehicle is started, the counting interval can also be specified. The possible counting intervals are time units, ie reset conditions can be set such that after the expiration of a certain time period, eg after one second or ten seconds or one minute, the corresponding counter is reset. It is possible to set its own reset conditions for each data mode. Another reset condition may be associated with a signal to reset the counter for a data pattern assigned to a certain gear shift operation or action in a component of a motor vehicle (eg, a reversing camera or media playback device).

根據一種實施方式,提供用於不同監測位置的多個位置資料集(即相應地給出位元位置及/或位元組位置的資料集)並且由該網路處理器結合該資料封包(標題資料及/或有效資料)來測定該些相應之資料封包的封包特性,並且根據該封包特性來自該些位置資料集選出一個位置資料集,從而產生交替的監測位置,並且在該所選位置資料集所給出之監測位置上讀出該些探測資料。換言之,針對不同的封包特性來規定讀取哪些位元或位元組,即在資料封包內的哪些位置(監測位置)上讀取用於探測資料的資料內容,進而從中形成用於該相聯記憶體的輸入資料。從而產生以下優點:能夠根據封包特性來檢查不同的監測位置。如此便能在標題資料及/或有效資料上識別出資料封包所具有的封包特性。因而以下實施方式係有利。According to one embodiment, multiple location data sets (ie data sets giving bit positions and/or byte positions, respectively) are provided for different monitoring locations and the data packets (header) are combined by the network processor. data and/or valid data) to determine the packet characteristics of the corresponding data packets, and select a position data set from the position data sets according to the packet characteristics, thereby generating alternate monitoring positions, and at the selected position data Read out the detection data at the monitoring position given by the set. In other words, which bits or groups of bytes are read for different packet characteristics, that is, at which positions (monitoring positions) in the data packet the data content for the detection data is read, and then the data content for the association is formed therefrom. Memory input data. This results in the advantage that different monitoring positions can be checked according to the packet characteristics. In this way, the packet characteristic of the data packet can be identified on the header data and/or the valid data. Therefore, the following embodiments are advantageous.

根據一種實施方式,該封包特性給出協議類型(TCP或UDP)及/或封包類型(通信的初次封包、後續封包)及/或資料內容(發送器地址、接收器地址)。協議類型例如可被區分為TCP(transport control protocol,傳輸控制協議)與UDP(user datagram protocol,用戶資料報協議),以便針對機動車輛中之資料流量例如僅列出兩種可能的協議。封包類型例如可按其係指通信的初次封包還是通信的後續封包來區分。在此例如可評價所謂之SYN旗標。較佳亦可使用例如形式為發送器地址及/或接收器地址的資料內容來形成用於相聯記憶體的輸入資料。如此例如便能識別出非註冊的發送器地址。According to one embodiment, the packet properties give the protocol type (TCP or UDP) and/or the packet type (initial packet of the communication, subsequent packets) and/or the data content (sender address, receiver address). The protocol types can be distinguished, for example, between TCP (transport control protocol, transmission control protocol) and UDP (user datagram protocol, user datagram protocol), so that for example only two possible protocols are listed for data traffic in motor vehicles. Packet types can be distinguished, for example, by whether they refer to the initial packet of the communication or the subsequent packets of the communication. Here, for example, the so-called SYN flag can be evaluated. The input data for the associative memory may also preferably be formed using data content, eg in the form of sender addresses and/or receiver addresses. In this way, for example, non-registered sender addresses can be identified.

根據一種實施方式,該些監測位置描述該資料封包之不相交資料欄位。亦即,為了形成用於相聯記憶體的輸入資料而讀出探測資料毋需包括資料封包中之位元或位元組的連續序列,而是透過規定不相交資料欄位,亦可讀取某些位元或位元組,在其間存在並非該些探測資料之部分的更多位元或位元組。從而有利於靈活地對資料封包進行分析。According to one embodiment, the monitoring locations describe disjoint data fields of the data packet. That is, reading probe data in order to form input data for associative memory need not include a contiguous sequence of bits or bytes in a data packet, but can also be read by specifying disjoint data fields. Certain bits or groups of bytes have more bits or groups of bytes in between that are not part of the probe data. Therefore, it is beneficial to analyze the data packets flexibly.

根據一種實施方式,根據該資料封包之探測資料來形成該些輸入資料包括:藉由移位運算來再排列該些探測資料及/或藉由至少一個組合規則來將其組合在一起。如此便能透過使用移位運算及/或組合規則來實施預處理。組合規則例如可包括邏輯運算,如AND(邏輯「與」)或OR(邏輯「或」)。如此便能對探測資料之位元或位元組進行歸納或壓縮,以便例如獲得規定之格式。此外,透過移位運算及/或組合規則,便能在資料網中實施探測非期望資料流量之第一步驟。例如可檢查探測資料中的兩個預設位元是否具有預設邏輯組合(例如兩個被設置或者兩個被刪除)。如此便能用單獨一個位元來表示此種情形,該位元可為輸入資料的組成部分,而非該些初始位元。According to one embodiment, forming the input data from the probe data of the data packet includes rearranging the probe data by a shift operation and/or combining them together by at least one combining rule. This enables preprocessing to be performed using shift operations and/or combining rules. Combination rules may include, for example, logical operations such as AND (logical "and") or OR (logical "or"). In this way, the bits or groups of bytes of the probe data can be summarized or compressed, eg to obtain a prescribed format. In addition, the first step of detecting undesired data traffic can be implemented in the data network through shift operations and/or combination rules. For example, it can be checked whether two predetermined bits in the probe data have a predetermined logical combination (eg, two are set or two are deleted). This can be represented by a single bit, which can be part of the input data, rather than the original bits.

本發明亦有提供一種用於機動車輛的資料網之監測裝置或切換裝置,其中該切換裝置具有網路處理器及相聯記憶體及計算單元,它們被配置成實施本發明之方法的一種實施方式。該相聯記憶體可按前述方式為CAM,特別是TCAM。該相聯記憶體可整合在該網路處理器中或者設置在獨立的儲存元件中。該網路處理器可指就切換裝置而言已知的網路處理器類型,其增添了前述方法步驟。用於以前述方式處理分析資料的計算單元可指所謂之CPU(central processing unit,中央處理單元)或微控制器或者統稱微處理器,其中該計算單元與該網路處理器及/或該相聯記憶體可透過相應之資料介面而耦合。該網路處理器及該計算單元可分別為資料處理裝置或處理器裝置,其分別具有至少一個微處理器及/或至少一個微控制器及/或至少一個FPGA(Field Programmable Gate Array,場可程式化閘陣列)及/或至少一個DSP(Digital Signal Processor,數位信號處理器)。該計算單元可被設計成可自由程式化。此外可提供程式編碼,該程式編碼被配置成在執行過程中實施本發明之方法的一種實施方式的方法步驟。該程式編碼可被儲存在至少一個可與計算單元及/或網路處理器耦合的資料記憶體中。The present invention also provides a monitoring device or switching device for a data network of a motor vehicle, wherein the switching device has a network processor and associated memory and computing unit configured to carry out an implementation of the method of the invention Way. The associative memory can be a CAM, in particular a TCAM, in the aforementioned manner. The associative memory can be integrated in the network processor or provided in a separate storage element. The network processor may refer to the type of network processor known in the context of switching devices, which adds the aforementioned method steps. The computing unit used to process the analysis data in the aforementioned manner may refer to a so-called CPU (central processing unit, central processing unit) or a microcontroller or a microprocessor in general, wherein the computing unit and the network processor and/or the phase Link memories can be coupled through corresponding data interfaces. The network processor and the computing unit can be a data processing device or a processor device, respectively, which have at least one microprocessor and/or at least one microcontroller and/or at least one FPGA (Field Programmable Gate Array, Field Programmable Gate Array, respectively). Programmable gate array) and/or at least one DSP (Digital Signal Processor). The computing unit can be designed to be freely programmable. In addition, program code may be provided that is configured to implement, during execution, the method steps of an embodiment of the method of the present invention. The programming code can be stored in at least one data memory that can be coupled to a computing unit and/or a network processor.

本發明亦有關於一種具有資料網之機動車輛,在該資料網中,多個網路支路透過本發明之監測裝置的一種實施方式而聯接。本發明之機動車輛較佳構建為汽車,特別是構建為乘用車或載重汽車,或者構建為客車或機車。The invention also relates to a motor vehicle having a data network in which network branches are connected by an embodiment of the monitoring device of the invention. The motor vehicle of the invention is preferably designed as a motor vehicle, in particular as a passenger car or a truck, or as a passenger car or a locomotive.

本發明亦將本文所描述之實施方式之特徵的組合包括在內。亦即,在本文所描述之多個實施方式並非彼此排斥的情況下,本發明亦將具有此等實施方式之特徵的組合的實施方案包括在內。The present invention also includes combinations of features of the embodiments described herein. That is, to the extent that the various embodiments described herein are not mutually exclusive, the invention also includes embodiments having combinations of the features of such embodiments.

下文將予描述之實施例係本發明之較佳實施方式。在此等實施例中,該些實施方式之所描述的組件係本發明之彼此獨立的個別特徵,其以彼此獨立的方式對本發明加以改進。因此,該揭露內容亦將該些實施方式之特徵的不同於所示組合的內容包括在內。此外,所描述之實施方式亦可透過其他前述發明特徵而加以補充。The examples to be described below are preferred embodiments of the present invention. In these examples, the described components of the embodiments are individual features of the invention that are independent of each other, which improve the invention in a way that is independent of each other. Accordingly, this disclosure also includes combinations of features of these embodiments that differ from those shown. Furthermore, the described embodiments may also be supplemented by other aforementioned inventive features.

附圖中相同的元件符號表示功能相同的元件。Identical reference numerals in the figures denote functionally identical elements.

圖1示出機動車輛10,其可為汽車,如乘用車或載重汽車。機動車輛10中可提供有資料網11,其例如可為以太網。透過資料網11可將控制單元12、13彼此耦合以進行資料通信或資料交換。為了將資料網11的多個網路支路14彼此連接,可提供有切換裝置15。每個網路支路14的相應網線可按習知方式連接至切換裝置15的相應端口16、17。圖1示範性示出控制單元12如何將資料封包18發送給控制單元13。在此過程中,切換裝置15可在連接有控制單元12之網路支路14的端口16上接收資料封包18,並且自切換裝置15的多個端口(更多端口未予繪示)選出連接有控制單元13之網路支路14的端口17,使得在該網路支路14中並且特別是僅在該網路支路14中可轉發資料封包18。一般而言,資料封包18可透過切換裝置15特別是僅被轉發給設有控制單元13的網路支路,資料封包18按習知方式例如透過所謂之IP地址及/或MAC地址而被定址到該控制單元。FIG. 1 shows a motor vehicle 10, which may be an automobile, such as a passenger car or a truck. A data network 11 may be provided in the motor vehicle 10, which may be Ethernet, for example. The control units 12 and 13 can be coupled to each other through the data network 11 for data communication or data exchange. In order to connect a plurality of network branches 14 of the data network 11 to each other, switching means 15 may be provided. The corresponding network cable of each network branch 14 may be connected to the corresponding ports 16, 17 of the switching device 15 in a known manner. FIG. 1 shows by way of example how the control unit 12 sends the data packets 18 to the control unit 13 . During this process, the switching device 15 can receive the data packet 18 on the port 16 connected to the network branch 14 of the control unit 12, and select a connection from a plurality of ports (more ports are not shown) of the switching device 15 There is a port 17 of the network branch 14 of the control unit 13 so that the data packets 18 can be forwarded in this network branch 14 and in particular only in this network branch 14 . In general, the data packets 18 can be forwarded by the switching device 15 in particular only to the network branch provided with the control unit 13, the data packets 18 being addressed in a known manner, for example by means of so-called IP addresses and/or MAC addresses to the control unit.

為了在切換裝置15中將接收到的資料封包18轉發給正確的端口17,即目標端口19,在切換裝置15中可設有切換電路20(亦稱Switch-Engine,切換引擎),其可採用習知結構。切換電路20可被網路處理器21控制。為了測定在切換電路20中哪個目標端口19係針對接收到的資料封包18而設,可設有相聯記憶體22,特別是TCAM。在相聯記憶體22中,每個相應之資料模式23可分配有輸出資料24。例如可由網路處理器21在接收到之資料封包18的預設選擇位置上自資料封包18讀出資料或其資料內容,並合併成可傳送給相聯記憶體22的輸入資料25。若輸入資料25包含該些資料模式23中的一個,則相聯記憶體22可將對應的輸出資料24作為目標端口資料26輸出。藉由目標端口資料26,網路處理器21例如就能設定或選出切換電路20中的對應目標端口19。In order to forward the received data packets 18 to the correct port 17, that is, the target port 19 in the switching device 15, a switching circuit 20 (also known as a Switch-Engine) may be provided in the switching device 15, which can use learned structure. The switching circuit 20 may be controlled by the network processor 21 . In order to determine which target port 19 in the switching circuit 20 is intended for a received data packet 18, an associative memory 22, in particular a TCAM, may be provided. In associative memory 22, each corresponding data pattern 23 may be assigned output data 24. For example, the network processor 21 can read data or its data content from the data packet 18 at a preset selected position of the received data packet 18 and combine it into the input data 25 which can be transmitted to the associative memory 22 . If the input data 25 includes one of the data patterns 23 , the associative memory 22 can output the corresponding output data 24 as the target port data 26 . With the target port data 26 , the network processor 21 can, for example, set or select the corresponding target port 19 in the switching circuit 20 .

該相聯記憶體可整合在該網路處理器中或者不同於該網路處理器。相聯記憶體22可與切換電路20連接,使得目標端口資料26可直接地、即不採用網路處理器21地,被切換電路20評價從而選出目標端口19,The associative memory may be integrated in the network processor or separate from the network processor. The associative memory 22 can be connected to the switching circuit 20 so that the target port data 26 can be evaluated by the switching circuit 20 directly, ie without the use of the network processor 21, to select the target port 19,

在機動車輛10中,亦可藉由切換電路15來實現IDS(針對軟體錯誤及/或惡意軟體的侵入探測系統),亦即,可識別出是否在資料網11中有一個控制單元12、13(此處僅示範性示出兩個控制單元)被惡意操縱或被資料病毒侵入,以及/或者是否有非授權設備連接在資料網11上並透過切換裝置15發送至少一個資料封包。In the motor vehicle 10 , an IDS (Intrusion Detection System for Software Errors and/or Malware) can also be implemented by means of the switching circuit 15 , ie it can be detected whether there is a control unit 12 , 13 in the data network 11 . (Here, only two control units are shown by way of example) maliciously manipulated or invaded by a data virus, and/or whether an unauthorized device is connected to the data network 11 and sends at least one data packet through the switching device 15 .

在切換裝置15中亦可利用相聯記憶體22來實現此點,毋需使其具有附加功能。The associative memory 22 can also be used in the switching device 15 to achieve this without having to provide it with additional functionality.

為此,網路處理器21可提供至少一個位置資料集28,在該位置資料集中可相應地給出監測位置,接收到之資料封包18中的位元或至少一個位元組可給出用來讀出接收到之資料封包18之資料或資料內容的位元位置或位元組位置。從而產生讀出之探測資料31。此等探測資料31可用來產生用於監測資料網11的輸入資料25。此前,可將至少一個運算31'應用於探測資料31,以形成用於相聯記憶體22的輸入資料25,但亦可將探測資料31直接作為輸入資料25而提供。可將輸入資料25饋入相聯記憶體22,從而就至少一個資料模式23進行檢查。若其中一個資料模式23適用,則透過相聯記憶體22將對應的輸出資料24輸出。在此情形下,此等輸出資料24係指命中信號27'的命中資料27,其可被分配給一個對應的資料模式23並顯示為命中信號。For this purpose, the network processor 21 can provide at least one location data set 28, in which the monitoring location can be given correspondingly, and a bit or at least one byte in the received data packet 18 can be given a useful to read the bit position or byte position of the data or data content of the received data packet 18. Thereby, the read probe data 31 is produced. These probe data 31 may be used to generate input data 25 for monitoring data network 11 . Previously, at least one operation 31 ′ could be applied to the probe data 31 to form the input data 25 for the associative memory 22 , but the probe data 31 could also be provided directly as the input data 25 . The input data 25 may be fed into the associative memory 22 to be checked for at least one data pattern 23 . If one of the data patterns 23 is applicable, the corresponding output data 24 is output through the associative memory 22 . In this case, the output data 24 refer to the hit data 27 of the hit signal 27', which can be assigned to a corresponding data pattern 23 and displayed as a hit signal.

每當用於監測資料網的輸入資料25觸發相聯記憶體22中的命中信號,則可更新由計數器C及時間戳T構成的一個相應之元組CT。針對每個命中信號或其組合皆可提供一個元組CT,圖1中示範性地示出七個計數器C0至C6及配屬之用於時間戳T0至T6的記憶體,其中數目例如係可選。透過微處理器29,便可針對各元組CT,即計數器C與時間戳T的相應組合,自讀出記憶體30中讀出計數器C及時間戳T的相應值以及資料封包18之至少一個同樣儲存在讀出記憶體30中的部分,其用於或引起計數器C相對於時間戳或時間戳T之時間點的用於觸發信號或命中信號的最後一次增量。為此,可將相應元組CT之最後一個資料封包18一併儲存在讀出記憶體30中。Whenever input data 25 for monitoring the data network triggers a hit signal in associative memory 22, a corresponding tuple CT consisting of counter C and timestamp T may be updated. One tuple CT can be provided for each hit signal or a combination thereof. FIG. 1 shows by way of example seven counters C0 to C6 and the associated memory for the time stamps T0 to T6, wherein the number may be, for example, select. Through the microprocessor 29, for each tuple CT, that is, the corresponding combination of the counter C and the time stamp T, the corresponding values of the counter C and the time stamp T and at least one of the data packets 18 can be read from the read memory 30 The portion also stored in the read memory 30 which is used for or causes the last increment of the counter C with respect to the time stamp or the point in time of the time stamp T for the trigger or hit signal. For this purpose, the last data packet 18 of the corresponding tuple CT can be stored in the read memory 30 together.

隨後,可透過微處理器29藉由匹配例程32來檢查:一定數目之命中信號,如相應計數器C0至C6中針對相應資料模式23而儲存的命中信號,以及對應於相應時間戳T0至T6的描述常規的或針對控制單元12、13,而程式化的資料流量(在資料網11之非惡意操縱狀態下)的發送規劃資料33,是否符合一致性標準34。若不符合一致性標準34,則源於讀出記憶體30的分析資料30'與發送規劃資料33間產生偏差,如此便可由微處理器29來觸發或啟動防禦例程35。例如可限制機動車輛的功能範圍以及/或者向機動車輛使用者發送信號,以告知其必須在車間中檢查機動車輛10。The matching routine 32 can then be used by the microprocessor 29 to check: a certain number of hit signals, such as those stored for the respective data patterns 23 in the respective counters C0 to C6, and corresponding to the respective time stamps T0 to T6 The description of whether conventional or programmatic data traffic (in a non-malicious state of manipulation of the data network 11 ) sending planning data 33 to the control units 12 , 13 , complies with the conformance criteria 34 . If the consistency criterion 34 is not met, there is a discrepancy between the analysis data 30 ′ from the read memory 30 and the transmission planning data 33 , so that the defense routine 35 can be triggered or activated by the microprocessor 29 . For example, the functional range of the motor vehicle can be limited and/or the user of the motor vehicle can be signaled that the motor vehicle 10 must be checked in the workshop.

圖2示出在相聯記憶體22中資料模式23可被設為相應的記錄項TCAM_0至TCAM_2^N-1,其中2^N-1意味著,2的冪為總記錄項數目。N例如可為0至10的整數。若用相聯記憶體22來過濾輸入資料25,則可能出現其中一個資料模式23與輸入資料25一致,從而產生作為命中資料27的相應命中信號27'。可將每個資料模式23分配給其中一個計數器C,其透過相應之命中信號27'而增量,使得計數器讀數或計數器值C-0至C_2^N-1而增量。此外,可針對最終觸發命中信號27'的最後一個接收到的資料封包18,將接收到之或該命中信號27'的相應時間戳T儲存為時間值T_0至T_2^N-1。如圖2所示,兩個記錄項36的資料模式23亦可被同一計數器C_1(示範性)評價。從而在資料網11中識別出惡意操縱資料流量之分佈於多個資料模式23的惡意操縱。2 shows that the data mode 23 in the associative memory 22 can be set to the corresponding entries TCAM_0 to TCAM_2^N-1, where 2^N-1 means that a power of 2 is the total number of entries. N may be an integer of 0 to 10, for example. If associative memory 22 is used to filter input data 25, it is possible that one of the data patterns 23 coincides with input data 25, resulting in a corresponding hit signal 27' as hit data 27. Each data pattern 23 can be assigned to one of the counters C, which is incremented by the corresponding hit signal 27', such that the counter readings or counter values C-0 to C_2^N-1 are incremented. Furthermore, for the last received data packet 18 that finally triggered the hit signal 27', the corresponding timestamp T of the reception or the hit signal 27' may be stored as time values T_0 to T_2^N-1. As shown in FIG. 2, the data patterns 23 of the two entries 36 can also be evaluated by the same counter C_1 (exemplary). Thereby, malicious manipulation of malicious manipulation of data traffic distributed over a plurality of data patterns 23 is identified in the data network 11 .

圖3示出,在讀出記憶體30中可僅針對該最終觸發的命中信號27'而自相聯記憶體22將對應資料封包18及計數器C的計數器值及時間戳T儲存下來,並由微處理器29將其作為分析資料30'進行讀出。如此,僅需單獨一個讀出記憶體30來輸入分析資料30',在此情形下,微處理器29可依次地在每個命中信號27'中讀出分析資料30'之經更新的內容。FIG. 3 shows that, in the read memory 30, the counter value and the time stamp T corresponding to the data packet 18 and the counter C can be stored in the read memory 30 from the associative memory 22 only for the hit signal 27' that is finally triggered, and are stored by the associative memory 22. The microprocessor 29 reads this out as analysis data 30'. In this way, only a single read memory 30 is required to input the analysis data 30', in this case, the microprocessor 29 can sequentially read the updated content of the analysis data 30' in each hit signal 27'.

為了分析資料流量,較佳可具有時間資訊及/或統計學評價,以便識別出與機動車輛10之控制單元的發送方案的偏差。此種偏差表明可能存在對機動車輛10及/或其資料網11的惡意操縱或攻擊。用上述方法便能提高探測效率,其中在相聯記憶體22中,識別出用於產生關於與控制單元12、12之發送方案可能存在偏差的命中信號27'的附加資料模式23。本發明的主要理念在於,對切換裝置15的既有相聯記憶體22進行擴展,而不必對相聯記憶體22本身進行重新構建或研發。為此而將相聯記憶體,特別是TCAM過濾器與至少一個計數器及對應之用於時間戳的暫存器組合在一起。此點意味著,不僅將基於TCAM的硬體用來探測或選出目標端口,而且將基於TCAM的硬體用來產生關於資料流量的統計學資料。在TCAM過濾器產生命中的情形下,即識別出資料模式並產生對應之命中信號的情形下,對應計數器之計數器值可被增量,該事件的時間戳可被儲存在時間戳的對應暫存器中。由計數器值與時間戳構成的元組可被微處理器作為計算節點讀出,從而實施所謂之原子存取(排他存取或電腦的一個時鐘循環內的存取)。亦可針對過濾器規則進行擴展,使得資料封包本身,即例如以太網訊框,同樣作為分析資料的部分,即與由計數器值與時間戳構成之元組一起,被提供或者被傳輸給微處理器。亦可將引起探測的資料模式23及/或表明哪個計數器值與哪個命中信號相關聯或組合的資訊,一併作為分析資料的部分而提供。For the analysis of the data flow, preferably temporal information and/or statistical evaluation can be provided in order to identify deviations from the transmission scheme of the control unit of the motor vehicle 10 . Such deviations indicate a possible malicious manipulation or attack on the motor vehicle 10 and/or its data network 11 . The detection efficiency can be improved by the method described above, wherein in the associative memory 22, additional data patterns 23 for generating hit signals 27' which may deviate from the transmission scheme of the control units 12, 12 are identified. The main idea of the present invention is to expand the existing associative memory 22 of the switching device 15 without rebuilding or developing the associative memory 22 itself. For this purpose, an associative memory, in particular a TCAM filter, is combined with at least one counter and a corresponding scratchpad for time stamping. This point means that not only TCAM based hardware is used to detect or select target ports, but also TCAM based hardware is used to generate statistics about data traffic. In the event that the TCAM filter generates a hit, that is, a data pattern is identified and a corresponding hit signal is generated, the counter value of the corresponding counter can be incremented, and the timestamp of the event can be stored in the corresponding temporary storage of the timestamp. in the device. The tuple consisting of the counter value and the timestamp can be read out by the microprocessor as a computing node to implement so-called atomic accesses (exclusive accesses or accesses within one clock cycle of the computer). The filter rules can also be extended so that the data packets themselves, i.e. Ethernet frames for example, are also provided or transmitted to the microprocessor as part of the parsed data, i.e. together with tuples of counter values and timestamps device. The data pattern 23 that caused the probe and/or information indicating which counter value is associated or combined with which hit signal may also be provided as part of the analysis data.

透過規定或控制資料模式或者用於TCAM的一般性過濾規則,便能以針對特定機動車輛最佳化或經調整的方式來規定資料模式,從而將針對非惡意操縱資料網11的發送方案考慮在內。透過讀出記憶體來將資料封包及計數器值及時間戳傳輸給微處理器,如此便能事後就資料網之可能存在的惡意操縱進行分析或檢查,而不必遵循資料網的傳輸速度,亦即,資料封包在某個最大潛時範圍內重新離開切換裝置。透過時間戳仍能保持分析精度,因為操作的時間點係已知。By specifying or controlling data patterns or general filtering rules for TCAM, data patterns can be specified in a way that is optimized or adjusted for a particular motor vehicle, so that transmission schemes for non-malicious manipulation of the data network 11 are taken into account. Inside. The data packets and counter values and timestamps are transmitted to the microprocessor by reading the memory, so that the possible malicious manipulation of the data network can be analyzed or checked afterwards without having to follow the transmission speed of the data network, that is, , the data packet leaves the switching device again within a certain maximum latency range. Analytical accuracy is still maintained through timestamps because the point in time of the operation is known.

由此,本發明透過提供一組計數器與用於時間戳的暫存器而實現,從而減小切換裝置中的附加成本。在TCAM過濾器規則觸發命中信號,即識別出輸入資料25中之資料模式23的情形下,若多個資料模式適用,則可對該些資料模式進行優先排序,使得唯有一個命中信號27'引起相應計數器值的增大。透過上述方式便可將一個計數器分配給多個不同的過濾器規則或命中信號27'。用該微處理器可使得資料分析硬體進行工作,其中可透過所謂之原子存取(一個時鐘循環內的存取)或藉由陰影緩衝器來讀出由計數器值與時間戳構成之元組。如此便能防止計數器值與時間戳之相關性出現偏差。Thus, the present invention is realized by providing a set of counters and registers for time stamps, thereby reducing the additional cost in the switching device. In the event that a TCAM filter rule triggers a hit signal, ie, a data pattern 23 in the input data 25 is identified, if multiple data patterns are applicable, the data patterns can be prioritized so that there is only one hit signal 27' Causes the corresponding counter value to increase. In this way, one counter can be assigned to a plurality of different filter rules or hit signals 27'. The microprocessor enables the data analysis hardware to work, in which tuples consisting of counter values and timestamps can be read out through so-called atomic accesses (accesses within one clock cycle) or through shadow buffers . This prevents deviations in the correlation between the counter value and the timestamp.

該匹配例程可基於機器學習之方法,如人工神經網路之方法或深度學習法,如此便能對以下情形進行補償:控制單元可能視情況改變其發送方案。The matching routine may be based on machine learning methods, such as artificial neural network methods or deep learning methods, so as to compensate for situations in which the control unit may change its transmission scheme as appropriate.

整體而言揭露了如何透過TCAM及切換裝置中的靜態計數器來提供針對IDS的資訊。In general, it is disclosed how to provide information for IDS through static counters in TCAM and switching devices.

綜上所述,本發明特別是涉及以下態樣:In summary, the present invention particularly relates to the following aspects:

1. 一種用於監測機動車輛(10)的控制單元(12,13)間的資料流量之方法,其中該些控制單元(12,13)透過資料網(11)而連接,該資料網具有切換裝置(15),在該切換裝置中,若干用於接收及發送資料封包(18)的物理端口(16,17)透過切換電路(20)而聯接,並且在該方法中,透過該些端口(16,17)中的一個接收到的每個資料封包(18)皆透過網路處理器(21)藉由相聯記憶體(22)而被分配若干目標端口資料(26),並且根據該些目標端口資料(26),將該些端口(16,17)中的至少一個選為相應的目標端口(19),並且透過該切換電路(20)將該接收到的資料封包(18)導引至該至少一個目標端口(19), 其特徵在於, 將待監測及/或待探測封包類型以及/或者待探測資料內容的至少一個預設資料模式(23)儲存在該相聯記憶體(22)中,使得在輸入資料(25)包含該相應之資料模式(23)的情況下,該相聯記憶體(22)作為對該些輸入資料(25)的反應而產生經分配的命中信號(27),並且 該網路處理器(21)自該接收到的資料封包(18)在該資料封包(18)的預設監測位置上讀出探測資料(31),並且自該些探測資料(31)形成用於該相聯記憶體(22)的輸入資料(25),並且透過將該些輸入資料(25)輸入該相聯記憶體(22)來檢查是否產生命中信號(27),並且 提供至少一個計數器(C),在該計數器中,透過相應之計數器值來給出關於至少一個預設資料模式(23)而多少次產生了命中信號(27), 並且將使得該計數器值最終增大的該相應之計數器值及該最後一個資料封包(18)提供為讀出記憶體(30)中的分析資料(30'),並且 微處理器(29)透過資料介面來讀出相應最新的分析資料(30')並且結合描述該些控制單元(12,13)之常規發送方案的發送規劃資料(33),藉由預設匹配例程(32)來識別出該些分析資料(30')不同於該發送方案,並且在此情形下觸發預設之防禦例程(35)。 1. A method for monitoring data flow between control units (12, 13) of a motor vehicle (10), wherein the control units (12, 13) are connected via a data network (11) having switching A device (15) in which a number of physical ports (16, 17) for receiving and sending data packets (18) are connected through a switching circuit (20), and in the method, through the ports ( Each data packet (18) received by one of 16, 17) is assigned a number of destination port data (26) through the network processor (21) through the associative memory (22), and according to these target port data (26), select at least one of the ports (16, 17) as the corresponding target port (19), and direct the received data packet (18) through the switching circuit (20) to the at least one destination port (19), It is characterized in that, Store in the associative memory (22) at least one preset data pattern (23) of the packet type to be monitored and/or to be detected and/or the content of the data to be detected, so that the input data (25) contains the corresponding In the case of the data mode (23), the associative memory (22) generates an assigned hit signal (27) in response to the input data (25), and The network processor (21) reads out probe data (31) from the received data packet (18) at a preset monitoring position of the data packet (18), and forms a function from the probe data (31). input data (25) to the associative memory (22), and checking whether a hit signal (27) is generated by inputting the input data (25) into the associative memory (22), and providing at least one counter (C) in which the number of times a hit signal (27) has been generated with respect to at least one preset data pattern (23) is given by means of a corresponding counter value, and providing the corresponding counter value and the last data packet (18) causing the final increment of the counter value as analysis data (30') in the read memory (30), and The microprocessor (29) reads out the corresponding latest analysis data (30') through the data interface and combines with the transmission planning data (33) describing the conventional transmission scheme of the control units (12, 13), by default matching Routine (32) to recognize that the analysis data (30') are different from the transmission scheme, and in this case trigger the default defense routine (35).

2. 如態樣1之方法,其中針對該至少一個計數器(C)中的每個,除了該計數器值以外還儲存該計數器值之最後一次增大的時間戳(T),並將其作為該讀出記憶體(30)中之分析資料(30')的部分而提供。2. The method of aspect 1, wherein for each of the at least one counter (C), a timestamp (T) of the last increment of the counter value is stored in addition to the counter value and used as the Provided by reading the portion of the analysis data (30') in the memory (30).

3. 如前述態樣中任一項之方法,其中至少一個計數器(C)對針對至少兩個資料模式的命中信號(27)進行計數。3. The method of any of the preceding aspects, wherein at least one counter (C) counts hit signals (27) for at least two data patterns.

4. 如前述態樣中任一項之方法,其中透過該網路處理器(21)及/或該微處理器(29),在符合某個特定復位條件的情況下,將該至少一個計數器(C)的相應計數器值復位。4. The method of any one of the preceding aspects, wherein by means of the network processor (21) and/or the microprocessor (29), the at least one counter is The corresponding counter value of (C) is reset.

5. 如前述態樣中任一項之方法,其中提供用於不同監測位置的多個資料集,並且 由該網路處理器(21)結合該資料封包(18)來測定該些相應之資料封包(18)的封包特性,並且 根據該封包特性來自該些資料集選出一個資料集,並且在該所選資料集(28)所給出之監測位置上讀出該些探測資料(31)。 5. The method of any of the preceding aspects, wherein multiple data sets for different monitoring locations are provided, and Determining the packet characteristics of the corresponding data packets (18) by the network processor (21) in conjunction with the data packets (18), and A data set is selected from the data sets according to the packet characteristics, and the probe data (31) are read at the monitoring positions given by the selected data set (28).

6. 如態樣5之方法,其中該封包特性給出協議類型及/或封包類型及/或資料內容。6. The method of aspect 5, wherein the packet characteristic gives the protocol type and/or the packet type and/or the data content.

7. 如前述態樣中任一項之方法,其中該些監測位置描述該資料封包(18)之不相交資料欄位。7. The method of any preceding aspect, wherein the monitoring locations describe disjoint data fields of the data packet (18).

8. 如前述態樣中任一項之方法,其中形成該些輸入資料(25)包括:藉由移位運算來再排列該些探測資料(31)及/或藉由至少一個組合規則來將其組合在一起。8. The method of any one of the preceding aspects, wherein forming the input data (25) comprises: rearranging the probe data (31) by shift operations and/or by at least one combination rule its combined together.

9. 一種用於機動車輛(10)的資料網(11)之切換裝置(15),其中該切換裝置(15)具有網路處理器(21)及相聯記憶體(22)及微處理器(29),它們共同被配置成實施如前述態樣中任一項之方法。9. A switching device (15) for a data network (11) of a motor vehicle (10), wherein the switching device (15) has a network processor (21) and an associated memory (22) and a microprocessor (29), which are collectively configured to implement the method of any of the preceding aspects.

10. 一種具有資料網(11)之機動車輛(10),在該資料網中,多個網路支路透過如態樣9之切換裝置(15)而聯接。10. A motor vehicle (10) having a data network (11) in which a plurality of network branches are connected through a switching device (15) as in aspect 9.

10:機動車輛 11:資料網 12:控制單元 13:控制單元 14:網路支路 15:切換裝置 16:端口 17:端口 18:資料封包 19:目標端口 20:切換電路 21:網路處理器 22:相聯記憶體 23:資料模式 24:輸出資料 25:輸入資料 26:目標端口資料 27,27':命中信號,命中資料 28:資料集 29:微處理器 30:讀出記憶體 30':分析資料 31:探測資料 31':運算 32:匹配例程 33:發送規劃資料 34:一致性標準 35:防禦例程 36:記錄項 C:計數器 T:時間戳 10: Motor Vehicles 11: Data Network 12: Control unit 13: Control unit 14: Network branch 15: Switching device 16: port 17: port 18: Data packet 19: target port 20: Switching circuit 21: Network Processor 22: Associative memory 23: Data Mode 24: Output data 25: Enter information 26: Target port information 27, 27': hit signal, hit data 28: Datasets 29: Microprocessor 30: read memory 30': Analysis data 31: Detection data 31': operation 32: Matching routines 33: Send planning information 34: Conformance Standards 35: Defense Routines 36: Record Item C: counter T: timestamp

下面對本發明的實施例進行描述。圖中: [圖1]為本發明之機動車輛的示意性實施方式; [圖2]為將命中信號發送給計數器的TCAM之簡圖;及 [圖3]為用來將TCAM與微處理器耦合在一起的讀出記憶體之示意圖。 Embodiments of the present invention are described below. In the picture: [Fig. 1] is a schematic embodiment of the motor vehicle of the present invention; [FIG. 2] is a schematic diagram of the TCAM sending the hit signal to the counter; and [FIG. 3] is a schematic diagram of a read memory used to couple the TCAM and the microprocessor.

10:機動車輛 10: Motor Vehicles

11:資料網 11: Data Network

12:控制單元 12: Control unit

13:控制單元 13: Control unit

14:網路支路 14: Network branch

15:切換裝置 15: Switching device

16:端口 16: port

17:端口 17: port

18:資料封包 18: Data packet

19:目標端口 19: target port

20:切換電路 20: Switching circuit

21:網路處理器 21: Network Processor

22:相聯記憶體 22: Associative memory

23:資料模式 23: Data Mode

24:輸出資料 24: Output data

25:輸入資料 25: Enter information

26:目標端口資料 26: Target port information

27:命中信號 27: Hit Signal

28:資料集 28: Datasets

29:微處理器 29: Microprocessor

30:讀出記憶體 30: read memory

30':分析資料 30': Analysis data

31:探測資料 31: Detection data

31':運算 31': operation

32:匹配例程 32: Matching routines

33:發送規劃資料 33: Send planning information

34:一致性標準 34: Conformance Standards

35:防禦例程 35: Defense Routines

C:計數器 C: counter

T:時間戳 T: timestamp

Claims (9)

一種用於監測機動車輛(10)的控制單元(12,13)間的資料流量之方法,其中該些控制單元(12,13)透過資料網(11)而連接,該資料網具有切換裝置(15),在該切換裝置中,若干用於接收及發送資料封包(18)的物理端口(16,17)透過切換電路(20)而聯接,並且在該方法中,透過該些端口(16,17)中的一個接收到的每個資料封包(18)皆透過網路處理器(21)藉由相聯記憶體(22)而被分配若干目標端口資料(26),並且根據該些目標端口資料(26),將該些端口(16,17)中的至少一個選為相應的目標端口(19),並且透過該切換電路(20)將該接收到的資料封包(18)導引至該至少一個目標端口(19),其中 將待監測及/或待探測封包類型以及/或者待探測資料內容的至少一個預設資料模式(23)儲存在該相聯記憶體(22)中,使得在輸入資料(25)包含該相應之資料模式(23)的情況下,該相聯記憶體(22)作為對該些輸入資料(25)的反應而產生經分配的命中信號(27),並且 該網路處理器(21)自該接收到的資料封包(18)在該資料封包(18)的預設監測位置上讀出探測資料(31),並且自該些探測資料(31)形成用於該相聯記憶體(22)的輸入資料(25),並且透過將該些輸入資料(25)輸入該相聯記憶體(22)來檢查是否產生命中信號(27), 其特徵在於, 提供至少一個計數器(C),在該計數器中,透過相應之計數器值來給出關於至少一個預設資料模式(23)而多少次產生了命中信號(27),並且針對該至少一個計數器(C)中的每個,除了該計數器值以外還儲存該計數器值之最後一次增大的時間戳(T),並且 並且將使得該計數器值最終增大的該相應之計數器值及該最後一個資料封包(18),以及該時間戳(T),提供為讀出記憶體(30)中的分析資料(30'),並且 微處理器(29)透過資料介面來讀出相應最新的分析資料(30'),並且結合描述該些控制單元(12,13)之常規發送方案的發送規劃資料(33),藉由預設匹配例程(32)來識別出該些分析資料(30')不同於該發送方案,並且在此情形下觸發預設之防禦例程(35)。 A method for monitoring data flow between control units (12, 13) of a motor vehicle (10), wherein the control units (12, 13) are connected via a data network (11) having switching means ( 15), in the switching device, a number of physical ports (16, 17) for receiving and sending data packets (18) are connected through a switching circuit (20), and in the method, through the ports (16, 17) Each data packet (18) received by one of 17) is assigned a number of destination port data (26) through the network processor (21) through the associative memory (22), and according to the destination ports data (26), select at least one of the ports (16, 17) as the corresponding target port (19), and direct the received data packet (18) to the corresponding target port (19) through the switching circuit (20) At least one destination port (19), where Store in the associative memory (22) at least one preset data pattern (23) of the packet type to be monitored and/or to be detected and/or the content of the data to be detected, so that the input data (25) contains the corresponding In the case of the data mode (23), the associative memory (22) generates an assigned hit signal (27) in response to the input data (25), and The network processor (21) reads out probe data (31) from the received data packet (18) at a preset monitoring position of the data packet (18), and forms a function from the probe data (31). input data (25) in the associative memory (22), and check whether a hit signal (27) is generated by inputting these input data (25) into the associative memory (22), It is characterized in that, at least one counter (C) is provided in which it is given, by means of the corresponding counter value, how many times a hit signal (27) has been generated with respect to at least one preset data pattern (23), and for which at least one counter (C ) each of which stores, in addition to the counter value, the timestamp (T) of the last increment of the counter value, and And the corresponding counter value and the last data packet ( 18 ) that will eventually increase the counter value, as well as the timestamp (T), are provided as analysis data ( 30 ′) in the read memory ( 30 ) ,and The microprocessor (29) reads out the corresponding latest analysis data (30') through the data interface, and combines with the transmission planning data (33) describing the conventional transmission scheme of the control units (12, 13), by default A matching routine (32) recognizes that the analysis data (30') differ from the sending scheme, and in this case triggers a preset defense routine (35). 如請求項1之方法,其中至少一個計數器(C)對針對至少兩個資料模式的命中信號(27)進行計數。The method of claim 1, wherein at least one counter (C) counts hit signals (27) for at least two data patterns. 如前述請求項中任一項之方法,其中透過該網路處理器(21)及/或該微處理器(29),在符合某個特定復位條件的情況下,將該至少一個計數器(C)的相應計數器值復位。The method of any one of the preceding claims, wherein the at least one counter (C ) is reset to the corresponding counter value. 如前述請求項中任一項之方法,其中提供用於不同監測位置的多個資料集,並且 由該網路處理器(21)結合該資料封包(18)來測定該些相應之資料封包(18)的封包特性,並且 根據該封包特性來自該些資料集選出一個資料集,並且在該所選資料集(28)所給出之監測位置上讀出該些探測資料(31)。 The method of any of the preceding claims, wherein a plurality of data sets for different monitoring locations are provided, and Determining the packet characteristics of the corresponding data packets (18) by the network processor (21) in conjunction with the data packets (18), and A data set is selected from the data sets according to the packet characteristics, and the probe data (31) are read at the monitoring positions given by the selected data set (28). 如請求項4之方法,其中該封包特性給出協議類型及/或封包類型及/或資料內容。The method of claim 4, wherein the packet characteristic gives the protocol type and/or the packet type and/or the data content. 如前述請求項中任一項之方法,其中該些監測位置描述該資料封包(18)之不相交資料欄位。The method of any preceding claim, wherein the monitoring locations describe disjoint data fields of the data packet (18). 如前述請求項中任一項之方法,其中形成該些輸入資料(25)包括:藉由移位運算來再排列該些探測資料(31)及/或藉由至少一個組合規則來將其組合在一起。The method of any one of the preceding claims, wherein forming the input data (25) comprises: rearranging the probe data (31) by shifting operations and/or combining them by at least one combining rule together. 一種用於機動車輛(10)的資料網(11)之切換裝置(15),其中該切換裝置(15)具有網路處理器(21)及相聯記憶體(22)及微處理器(29),它們共同被配置成實施如前述請求項中任一項之方法。A switching device (15) for a data network (11) of a motor vehicle (10), wherein the switching device (15) has a network processor (21) and an associated memory (22) and a microprocessor (29) ), which are collectively configured to implement the method of any of the preceding claims. 一種具有資料網(11)之機動車輛(10),在該資料網中,多個網路支路透過如請求項8之切換裝置(15)而聯接。A motor vehicle (10) having a data network (11) in which a plurality of network branches are connected through a switching device (15) as claimed in claim 8.
TW110139050A 2020-10-28 2021-10-21 Verfahren zum ueberwachen eines datenverkehrs zwischen steuergeraeten eines kraftfahrzeugs sowie entsprechend ausgestattetes kraftfahrzeug TWI807454B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102020128285.0 2020-10-28
DE102020128285.0A DE102020128285A1 (en) 2020-10-28 2020-10-28 Method for monitoring data traffic between control units of a motor vehicle and a motor vehicle equipped accordingly

Publications (2)

Publication Number Publication Date
TW202224382A true TW202224382A (en) 2022-06-16
TWI807454B TWI807454B (en) 2023-07-01

Family

ID=78372035

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110139050A TWI807454B (en) 2020-10-28 2021-10-21 Verfahren zum ueberwachen eines datenverkehrs zwischen steuergeraeten eines kraftfahrzeugs sowie entsprechend ausgestattetes kraftfahrzeug

Country Status (3)

Country Link
DE (1) DE102020128285A1 (en)
TW (1) TWI807454B (en)
WO (1) WO2022090065A1 (en)

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6871265B1 (en) * 2002-02-20 2005-03-22 Cisco Technology, Inc. Method and apparatus for maintaining netflow statistics using an associative memory to identify and maintain netflows
WO2006069041A2 (en) 2004-12-21 2006-06-29 Mistletoe Technologies, Inc. Network interface and firewall device
US20070022474A1 (en) 2005-07-21 2007-01-25 Mistletoe Technologies, Inc. Portable firewall
US8054744B1 (en) 2007-10-25 2011-11-08 Marvell International Ltd. Methods and apparatus for flow classification and flow measurement
US9998434B2 (en) * 2015-01-26 2018-06-12 Listat Ltd. Secure dynamic communication network and protocol
DE112016004860T5 (en) 2015-10-21 2018-07-26 Arris International Ip Ltd. Distributed rule deployment in an extended bridge
EP3442192B1 (en) * 2017-08-08 2022-01-05 Robert Bosch GmbH Method for monitoring traffic between network members in a network
US20190137622A1 (en) * 2017-11-09 2019-05-09 Brennan Lopez-Hinojosa Method and System for Gauging External Object Movement and Conditions for Connected and Autonomous Vehicle Safety
WO2019116973A1 (en) 2017-12-15 2019-06-20 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Fraud detection device, in-vehicle network system, and fraud detection method
US11595289B2 (en) * 2019-03-29 2023-02-28 Barefoot Networks, Inc. Network testing using a programmable packet engine

Also Published As

Publication number Publication date
DE102020128285A1 (en) 2022-04-28
WO2022090065A1 (en) 2022-05-05
CN115380510A (en) 2022-11-22
TWI807454B (en) 2023-07-01

Similar Documents

Publication Publication Date Title
US10284594B2 (en) Detecting and preventing flooding attacks in a network environment
US7356599B2 (en) Method and apparatus for data normalization
US7051369B1 (en) System for monitoring network for cracker attack
US7808897B1 (en) Fast network security utilizing intrusion prevention systems
US7401145B2 (en) In-line mode network intrusion detect and prevent system and method thereof
US7672293B2 (en) Hardware throttling of network traffic sent to a processor based on new address rates
US7623450B2 (en) Methods and apparatus for improving security while transmitting a data packet
EP1908219A2 (en) Active packet content analyzer for communications network
CN109657463B (en) Method and device for defending message flooding attack
Laraba et al. Mitigating TCP protocol misuse with programmable data planes
TW202224382A (en) Verfahren zum ueberwachen eines datenverkehrs zwischen steuergeraeten eines kraftfahrzeugs sowie entsprechend ausgestattetes kraftfahrzeug
CN113765849A (en) Abnormal network traffic detection method and device
US7421737B1 (en) Evasion detection
CN115380510B (en) Method for monitoring data flow between controllers of motor vehicle and motor vehicle equipped therewith
US20230262071A1 (en) Method for monitoring data traffic between control devices of a motor vehicle and vehicle equipped accordingly
TW202226779A (en) Verfahren zum ueberwachen eines datennetzwerks in einem kraftfahrzeug sowie switchvorrichtung und kraftfahrzeug
CN115280724A (en) Method for handling data anomalies, in particular in a motor vehicle
CN115398429A (en) Method for handling data anomalies, in particular in a motor vehicle
KR101678309B1 (en) Intrusion detection apparatus and method
WO2005069578A1 (en) Method and apparatus for network intrusion detection system
EP4170978A1 (en) Method for monitoring data traffic between control devices of a motor vehicle and corresponding motor vehicle
JP2023519910A (en) Methods for handling data anomalies, especially in automobiles