CN111314386A - Intrusion detection method and device for intelligent networked automobile - Google Patents

Intrusion detection method and device for intelligent networked automobile Download PDF

Info

Publication number
CN111314386A
CN111314386A CN202010208722.1A CN202010208722A CN111314386A CN 111314386 A CN111314386 A CN 111314386A CN 202010208722 A CN202010208722 A CN 202010208722A CN 111314386 A CN111314386 A CN 111314386A
Authority
CN
China
Prior art keywords
communication request
role
request message
intrusion detection
source address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010208722.1A
Other languages
Chinese (zh)
Other versions
CN111314386B (en
Inventor
修佳鹏
杨正球
王开宇
刘辰
王安生
刘楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202010208722.1A priority Critical patent/CN111314386B/en
Publication of CN111314386A publication Critical patent/CN111314386A/en
Application granted granted Critical
Publication of CN111314386B publication Critical patent/CN111314386B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides an intrusion detection method and device for an intelligent networked automobile, wherein the method comprises the following steps: receiving a communication request message of an external communication request body; identifying a role of the communication request subject; and determining whether the operation corresponding to the communication request message is matched with the operation authority corresponding to the identified role or not based on the preset operation authority information of a plurality of roles in a plurality of action domains, and sending the indication information corresponding to the communication request to the corresponding electronic control unit under the condition of matching so as to perform corresponding control by the electronic control unit. According to the intrusion detection method provided by the embodiment of the invention, by introducing the intrusion detection gateway equipment, the role of the main body to be requested to access and the scope authority of the main body are flexibly configured, and the efficiency and the accuracy of intrusion detection of the intelligent networked automobile can be improved.

Description

Intrusion detection method and device for intelligent networked automobile
Technical Field
The invention relates to the field of intelligent networked automobiles, in particular to an intrusion detection method and device of an intelligent networked automobile.
Background
Along with the development and popularization of intelligent networked automobiles, the intellectualization and networking of the automobiles bring great convenience to the life of people. However, the intellectualization and networking bring information security problems. The intelligent networked automobile needs to perform data interaction with external remote Service providers (TSPs), background Service providers such as automobile manufacturers, other intelligent networked automobiles, road side facilities, mobile intelligent terminals and the like. As shown in fig. 1, in the interaction process, the important core components such as a T _ box (telematics box), a bluetooth module, and an On Board Unit (OBU) in the automobile are mainly used to interact with the outside. These components are connected to a central gateway inside the vehicle, and communicate with an Electronic Control Unit (ECU) inside the vehicle through a can (controller area network) bus. In the communication process, transmission of network data packets and CAN bus message packets is involved, and hackers may perform intrusion access attacks on in-vehicle components, so that intrusion detection needs to be performed on intelligent networked automobiles.
Intrusion detection is the use of computer technology to identify potential and ongoing intrusions in the system for timely warning. At present, an abnormal detection-based method is mostly adopted for intrusion detection of intelligent networked automobiles. The method comprises the steps of observing and analyzing normal main body behaviors, extracting profile features of the normal behaviors from the main body behaviors, and comparing data with the profile features to judge whether abnormal access occurs or not. Analyzing the whole process, based on the method of abnormal detection, firstly, a complete available normal feature library is needed, then, the features are analyzed from the data to be used as input data, and finally, the input data is compared and judged with the feature library. Although the method is feasible in process, the method has the following limitations aiming at the real-time and complex multi-communication scene of the intelligent networked automobile:
(1) and (4) collecting the data set. The data is the basis and the quality of a model or algorithm cannot be evaluated without sufficiently accurate data. Because the intelligent networked automobile is in a development stage, currently, in academic circles and industrial circles, no reliable data set aiming at the intrusion detection of the intelligent networked automobile exists. Meanwhile, the production specifications of each manufacturer of the intelligent networked automobile are different, so that a unified data set does not exist to serve as a training set for the model. Therefore, the problem of collection of data sets is one of the problems based on anomaly detection methods.
(2) And (4) selecting and extracting features. The method for intelligent networking automobile attack is various and has strong concealment. An instruction with an attack behavior can be disguised that a normal instruction is hidden in a network data packet and cannot be satisfied. The accuracy of the feature selection and extraction work for anomalies often determines the accuracy of the model.
(3) Real-time performance of the calculation. The data acquisition and feature selection, the intermediate processing process requiring data transmission, dimension reduction and feature engineering, and the model calculation process all require the consumption of a large amount of calculation resources and time. At present, the calculation force of a vehicle-mounted end is not enough to support such a large calculation amount, and the cooperation of a cloud end is needed. Therefore, in terms of real-time performance, the method cannot sufficiently cope with the characteristics of real-time interaction of the networked automobiles.
Therefore, the current intrusion detection method based on abnormal detection is not enough to be suitable for the detection of the intrusion of the intelligent networked automobile with complex conditions and high real-time requirement. How to provide a technology capable of rapidly and accurately identifying potential intrusion in an intelligent networked automobile is an urgent problem to be solved.
Disclosure of Invention
In view of the above, the present invention provides an intrusion detection method and apparatus for an intelligent networked automobile, so as to quickly and accurately identify a potential intrusion, thereby eliminating or improving one or more defects in the prior art.
The technical scheme of the invention is as follows:
according to an aspect of the present invention, an intrusion detection method for an intelligent networked automobile is provided, the method comprising the following steps:
receiving a communication request message of an external communication request body;
identifying a role of the communication request subject;
and determining whether the operation corresponding to the communication request message is matched with the operation authority corresponding to the identified role or not based on the preset operation authority information of a plurality of roles in a plurality of action domains, and sending the indication information corresponding to the communication request to the corresponding electronic control unit under the condition of matching so as to perform corresponding control by the electronic control unit.
Optionally, the plurality of roles includes one or more of the following roles: TSP of an automobile manufacturer, intelligent decision TSP, information service TSP, a mobile terminal, a road side unit RSU and other vehicle OBUs; or, the plurality of roles are a plurality of roles divided based on a communication subject;
the plurality of scopes includes one or more of: a power domain, a chassis domain, a vehicle body domain and an information domain; or the plurality of scopes comprise a plurality of scopes which are obtained by grouping according to the safety access control requirements of the electronic control units, and each group corresponds to one scope;
the operation authority information of the roles in the scope comprises: the operation authority information of each role on each component in each action domain;
the operation authority comprises an access operation to each access content in each scope, and the access operation comprises: unreadable and unwritable, readable only, writeable only, or both.
Optionally, in a case that it is determined that the operation corresponding to the communication request message does not match the operation authority corresponding to the identified role, the communication request message is rejected.
Optionally, the identifying a role of a communication request subject includes: analyzing a source address of the communication request message, and determining whether the source address is in a source address blacklist; rejecting the communication request message if it is determined that the source address is in a source address blacklist; in an instance in which it is determined that the source address is not in a source address blacklist, identifying a role for the communication request subject based on a source of the communication request message.
Optionally, the method further comprises: and sending a notice warning to an automobile central control display screen of the intelligent networked automobile and/or a TSP platform of an automobile manufacturer while rejecting the communication request message.
Optionally, identifying a role of the communication request subject based on a source of the communication request message includes: in the case that the communication request message originates from the on-board host box, comparing the source address of the communication request message with the source address of at least one pre-stored remote service provider, and determining the role of the communication request subject as a matching remote service provider role if there is a matching result; under the condition that the communication request message is from a Bluetooth module, if the communication request message passes the authentication pairing success, determining that the role of the communication request main body is a mobile terminal role; if the pairing is unsuccessful, the vehicle can not communicate with the inside of the intelligent networking vehicle; and under the condition that the communication request message is from an on-board unit (OBU), determining that the role of the communication request main body is a drive test unit (RSU) role or the OBU role of other vehicles based on a short-range communication protocol corresponding to the communication request message.
Optionally, identifying a role of the communication request subject based on a source of the communication request message, further comprising: and if the matching result does not exist, rejecting the communication request message, and adding the source address of the message into the source address blacklist.
Optionally, the method is performed by an intrusion detection gateway, and the method further includes: and the electronic control unit executes the execution result after the corresponding operation based on the identified operation authority corresponding to the main body, sends the execution result to the relevant communication assembly through the CAN bus, and sends the execution result to the outside through the relevant communication assembly.
According to another aspect of the present invention, there is also provided an intrusion detection device for an intelligent networked automobile, the device including a processor and a memory, the memory having stored therein computer instructions, the processor being configured to execute the computer instructions stored in the memory, and the device implementing the steps of the method when the computer instructions are executed by the processor.
Optionally, the apparatus is an intrusion detection gateway interposed between the central gateway and the external communication device interface.
The intrusion detection method and the intrusion detection device for the intelligent networked automobile, provided by the embodiment of the invention, can prevent a potential illegal request from entering the intelligent networked automobile by identifying the communication request main body and automatically matching with the operation authority corresponding to the identified role based on the access control strategy.
Furthermore, by presetting the operation authority information of a plurality of roles in a plurality of action domains, the method can adapt to complex communication scenes and variable market demands.
It will be appreciated by those skilled in the art that the objects and advantages that can be achieved with the present invention are not limited to the specific details set forth above, and that these and other objects that can be achieved with the present invention will be more clearly understood from the detailed description that follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
fig. 1 is an ecological architecture diagram of an intelligent networked automobile.
Fig. 2 is a schematic flow chart of an intrusion detection method for an intelligent networked automobile according to an embodiment of the present invention.
Fig. 3 is a schematic diagram illustrating intrusion detection implemented by an intrusion detection gateway according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the following embodiments and accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
It should be noted that, in order to avoid obscuring the present invention with unnecessary details, only the structures and/or processing steps closely related to the scheme according to the present invention are shown in the drawings, and other details not so relevant to the present invention are omitted.
It should be emphasized that the term "comprises/comprising" when used herein, is taken to specify the presence of stated features, elements, steps or components, but does not preclude the presence or addition of one or more other features, elements, steps or components.
It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict.
In the intelligent networking automobile architecture, a central gateway is connected with different in-vehicle buses and external communication equipment and is responsible for data transmission and protocol conversion between the different buses and the communication equipment. In the embodiment of the invention, in order to quickly identify potential information security threats of an intelligent networked automobile in the process of communicating with an external entity, an intrusion detection method and corresponding intrusion detection gateway equipment are introduced, and the intrusion detection gateway equipment is arranged in the automobile and is arranged between a central gateway and an external communication equipment interface (as shown in figure 3) to be used as a unique entrance for accessing and managing resource objects so as to realize the uniform management of all the external communication interfaces. In the embodiment of the invention, the intrusion detection gateway provides access interfaces for various resource objects (such as a CAN bus, an ECU, a vehicle-mounted infotainment system IVI, a vehicle-mounted automatic diagnosis system OBD, an over-the-air OTA, an application program APP, an operating system OS and the like) in the networked automobile, and the resource objects execute basic read-write operation through the gateway interfaces.
The embodiment of the invention can effectively identify the role of the request main body by using the intrusion detection gateway through the preset role and the corresponding operation authority, and prevent the potential illegal request from entering the intelligent networked automobile.
The intrusion detection method provided by the embodiment of the invention is an intrusion detection method based on an authority access control mechanism, the adopted authority access control mechanism is a mechanism for controlling whether a user can enter the system and what objects can be operated after entering the system, and the authority access control mechanism is made into a link for discriminating and protecting potential intrusion in the intrusion detection method.
Fig. 2 is a schematic flow chart illustrating an intrusion detection method for an intelligent networked automobile according to an embodiment of the present invention. As shown in fig. 2, the method comprises the steps of:
step S110, a communication request message of an external communication request body is received.
When the intelligent networked automobile receives a communication request message from an external device (a communication request main body), a receiving end of the message forwards the request to the intrusion detection gateway, and thus the intrusion detection gateway receives the communication request message from the external communication request main body. The communication request message may carry identification information of the external communication request subject, such as address information and/or device identification, and the message may also carry requested operation content, such as an operation instruction (e.g., read-write request) for a specific scope component of the automobile.
The external device may be a road side device RSU, a mobile intelligent terminal, an OBU of another vehicle, or a TSP platform, wherein the TSP platform may include: a TSP from an automobile manufacturer, a smart decision TSP, or an information service TSP, etc., but the present invention is not limited thereto, and may be a device attempting an illegal intrusion.
Step S120, the role of the communication request subject is identified.
In this step, the intrusion detection gateway may identify whether the communication request subject is a legitimate role based on the source address and the like of the external communication request subject.
In one embodiment, the step of identifying the role of the body of the communication request may comprise:
the intrusion detection gateway parses the source address of the communication request message to determine if the source address is in a source address blacklist (or gateway blacklist). The source address blacklist is a pre-stored list that can be updated in real time. If the source address is in the source address blacklist, the role of the communication request main body is considered as an illegal role, so that the communication request message is rejected, and an alarm is sent to an automobile central control display screen of the intelligent networked automobile. Meanwhile, an alarm can be sent to the TSP platform of the automobile manufacturer. If the source address is not in the blacklist of source addresses, the source address is preliminarily identified as a legal role, and the role of the communication request main body is further identified based on the source of the communication request message. The following is an example of identifying the role of the body of a communication request based on the source of the message.
(1) In the case where the communication request message originates from the in-vehicle host box, the source address of the communication request message is compared with the source address of at least one TSP prestored, and in the case where there is a matching result, the role of the communication request subject is determined to be the matching TSP role.
More specifically, depending on the origin of the request forwarding, if the request message originates from the on-board host box, this request message is considered to be from a trusted remote service provider TSP. The remote service providers TSP may be classified into 3 categories, which are: the system comprises an automobile manufacturer TSP, an intelligent decision TSP and an information service TSP.
All source addresses of these three types of trusted TSPs may be built in advance in the intrusion detection gateway. The source end address can be further identified by comparing the main body of the request message, and if the source address of the main body TSP for identifying the request communication is the same as the built-in source address, the main body TSP is preliminarily considered to be a legal role. If the source address of the TSP is identified to be different from the built-in source address, the TSP is identified to be an illegal role, the request is directly rejected, and information such as the source address, the time stamp and the like of the request message is recorded in a gateway blacklist.
(2) Under the condition that the communication request message is from the Bluetooth module, if the authentication pairing is successful, determining that the role of the communication request main body is the role of the intelligent mobile terminal; if the pairing is unsuccessful, the vehicle can not communicate with the inside of the intelligent networking vehicle.
More specifically, if the request message originates from a bluetooth module, it may be determined whether the bluetooth is paired bluetooth. If the Bluetooth module is paired for the first time, the Bluetooth module needs to be authenticated in a secret key mode, and if the Bluetooth module passes the authentication, the role of the main body for sending the request message is considered as the intelligent mobile terminal; if the verification is not passed, the communication with the inside of the intelligent network automobile can not be carried out, and at the moment, the Bluetooth information can be recorded in a gateway blacklist. If the pairing is not the first pairing and is successful, the role of the main sending body of the request message is considered as the intelligent mobile terminal; and identifying that the role is illegal aiming at the Bluetooth module which is not paired for the first time and is unsuccessfully paired, and at the moment, the Bluetooth module cannot communicate with the inside of the intelligent networking automobile, but the Bluetooth information can be recorded in a gateway blacklist. Whether the communication request main body is in a legal role can be judged subsequently based on the source address of the Bluetooth module. The manner of performing the role recognition based on the request message from the bluetooth module is merely an example, and the present invention is not limited thereto.
(3) If the request message is from the vehicle-mounted unit OBU, the OBU carries out short-range communication with the road side unit RSU and the OBUs of other vehicles, so that the type of the request message can be judged according to the existing short-range communication protocol in the market, and the main body role of the request message is judged to be the road side unit RSU role or the OBU roles of other vehicles.
The role identifying step S120 corresponds to a role granting step of determining whether or not a specific legitimate role is assigned to the communication request subject based on the source of the message.
And step S130, after the legal role is identified, determining whether the operation corresponding to the communication request message is matched with the operation authority corresponding to the identified role based on the operation authority information of the preset roles in the action domains, and sending indication information corresponding to the communication request to the corresponding electronic control unit under the condition of matching so as to perform corresponding control by the electronic control unit.
In an embodiment of the present invention, since role and operation authority need to be matched, operation authority information (also referred to as a role authorization table) of a plurality of roles in a plurality of action domains may be stored in advance in the intrusion detection gateway. As an example, before step S110, a default role and authority configuration may be completed on The TSP platform of The auto manufacturer to obtain a role authorization table, and The role authorization table may be issued to The intrusion detection gateway by an ota (over The air) method.
Therefore, when the intelligent networked automobile receives an external connection request, the intelligent networked automobile can sequentially complete the identification of the role of the communication request main body at the intelligent networked automobile end through the intrusion detection gateway, and the matching of the corresponding authority of the role is realized based on the role authorization list.
An example of a role authorization list is shown in table 1 below.
Table 1 role authorization table example:
Figure BDA0002422083230000071
Figure BDA0002422083230000081
Figure BDA0002422083230000091
the operational rights of different roles to different scopes of the vehicle are shown in table 1 above. The roles shown include: TSP of automobile manufacturers, intelligent decision TSP, information service TSP, mobile terminals, road side units RSU and other vehicle OBU. In the actual design, the roles can be further subdivided according to specific communication bodies, so that more detailed role authority distribution and intrusion behavior detection are achieved. The plurality of scopes can include: the system comprises a power domain, a chassis domain, a vehicle body domain and an information domain, wherein different action domains correspond to different vehicle interior parts. This division of scopes is merely an example, and other ways of division are possible. For example, during actual design, different ECUs or others may be further grouped according to the control requirement of security access, and authority is allocated on the groups, and each group is used as a scope unit, so as to achieve more detailed role authority allocation and intrusion behavior detection; the operation authority information of the roles in the scope can include: and each role is used for operating authority information of each component in each action domain. The operation right is used for the access operation of each access content in each scope, and the access operation can comprise: unreadable and unwritable, readable only, writeable only, or both. As in table 1 above, "N" represents: unreadable, unwritable; "R" represents: is only readable; "W" represents: (ii) writable only; "RW" means: both readable and writable. Reading and writing are general descriptions of resource access modes, and access operation permissions of access contents of different domains can be further refined according to control contents of messages in actual design so as to achieve more accurate role permission allocation and intrusion behavior detection. The roles and rights in table 1 above are merely examples, but the present invention is not limited thereto.
The role authorization list can be dynamically expanded and updated according to different requirements, and the in-vehicle intrusion detection gateway is updated and upgraded through an OTA mechanism.
After the intrusion detection gateway completes the identification (or called distribution) of the role of the request subject, the scope of the request message and the operation authority corresponding to the scope of the request message are analyzed, whether the analyzed scope of the request message and the operation authority of the analyzed scope of the request message are matched with the operation authority of the corresponding role to each scope in the role authorization table is determined, and indication information corresponding to the communication request is sent to the corresponding electronic control unit under the condition of matching, so that the electronic control unit performs corresponding control.
That is, the intrusion detection gateway compares the role authorization table, verifies the operation authority in the message, and determines whether to send the instruction to the corresponding ECU. If the request sent by the role does not accord with the operation authority corresponding to the role in the role authorization, the request is determined to be an illegal request of a legal role, the request is rejected, and an alarm is sent to an automobile central control display screen of the intelligent networked automobile; and if the request sent by the role accords with the operation authority corresponding to the role in the role authorization, sending the instruction to the corresponding ECU, and executing the authority operation. And after the corresponding ECU completes the corresponding authority operation, the execution result is sent to the intrusion detection gateway through the CAN bus, and the intrusion detection gateway sends the execution result to the outside through the communication interface for feedback.
This step S130 is an authority matching step, and may also be understood as a step of performing authority grant based on the role and the role grant list. And based on the authority granted to the identified role by the role authorization table, determining whether the authority in the message conforms to the granted authority, thereby judging whether to reject the request message.
It can be seen that the identification of the illegal intrusion by the present invention is mainly based on the following two aspects:
(1) it is determined whether the role is illegal. For a request of a legal subject, the role identification, or role grant, is performed according to the request source, the request source address and other role authorization rules. And if the request does not accord with the granting rule, determining the request as an illegal role and rejecting the request.
(2) It is determined whether the authority of the legitimate role is illegitimate. For a legal role passing through the role authorization rule, if the operation authority in the request sent by the role does not conform to the authority in the authorization table corresponding to the role, the request is determined to be an illegal request of the legal role, and the request is rejected.
Once the intrusion detection gateway detects one of the two illegal intrusion behaviors, the intrusion detection gateway sends an alarm to an automobile central control display screen of the intelligent networked automobile and can send an alarm to a TSP platform of an automobile manufacturer.
As can be seen from the above, the intrusion detection gateway provided in the embodiment of the present invention can perform role identification (or called grant) on an external communication entity, and the operation authority identification (or called grant) of the scope is based on the RBAC policy, that is, authorization is performed by comparing an authorization table issued by a cloud, and the scope and the read-write authority of the role are determined. And determining whether the scope of the main body of the current communication is within the access range of the role corresponding to the main body by analyzing the content of the current communication. Thereby determining whether to execute the instruction of the current communication. If any link in the process is inconsistent with the normal authorization process, the potential attack behavior is determined to appear, the request is refused, and the alarm is given in the vehicle central control information screen.
The intrusion detection method of the present invention is exemplified as follows:
for example, some components of some brands of intelligent networked automobiles can be upgraded through firmware Over The Air (OTA), so that the expansion capability of the vehicle functions is greatly improved. The security of the firmware upgrade cloud platform has a very important impact on vehicle security. The automobile manufacturer may configure permission allocation tables that allow the firmware upgrade cloud platform to have permission to write firmware information to the domain or group where the component to be firmware upgraded is located.
When firmware upgrading is performed through the firmware upgrading cloud platform, the following steps are performed:
(1) the firmware upgrade message of the platform arrives at the vehicle end and is received by the in-vehicle T-Box.
(2) The T-Box forwards the received message to the intrusion detection gateway.
(3) And after receiving the request, the intrusion detection gateway analyzes the source address of the network request and compares whether the address is in the blacklist. If so, rejecting the request. If not, the following steps are continued.
(4) The request comes from a firmware upgrading cloud platform, a trusted TSP source address list built in an intrusion detection gateway is compared, if the source address of the request contains the source address of the request, the request is granted to the role of an information service provider, or the request is identified as the information service provider.
(5) The role has the scope and corresponding operating rights listed in authorization table 1.
(6) And the intrusion detection gateway analyzes the request, and if the request is requested, firmware upgrading is carried out. Comparing the role authorization table, if the table allows the operation, the intrusion detection gateway sends a firmware upgrading instruction to the related component.
The intrusion detection method and the intrusion detection gateway ECU device provided by the embodiment of the invention can effectively identify the role of the communication request main body and the corresponding authority thereof and prevent a potential illegal request from entering the intelligent internet automobile based on the preset role and the operation authority list of the role in the action domain. The intrusion detection method only needs to add a new ECU (intrusion detection gateway) at the vehicle end, intrusion detection is calculated at the vehicle end, the calculated amount is small, the logic of the operation is simple, and the method can adapt to the real-time characteristic of the intelligent networked vehicle.
In addition, the authorization model of the access control strategy of the intrusion detection gateway provided by the embodiment of the invention is updated by the way of issuing by the OTA of the car manufacturer TSP. The mode is flexible in configuration, can adapt to complex communication scenes and changeable market demands, does not need hardware updating on the automobile ECU level, and can realize updating only on the software level.
Correspondingly, the embodiment of the invention also provides an intrusion detection device of the intelligent networked automobile, wherein the intrusion detection device is an intrusion detection gateway, the device comprises a processor and a memory, computer instructions are stored in the memory, the processor is used for executing the computer instructions stored in the memory, and when the computer instructions are executed by the processor, the device realizes the steps of the method.
Software implementing embodiments of the present invention may be disposed in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of tangible storage medium known in the art.
Accordingly, the present disclosure also relates to a storage medium as above, on which a computer program code may be stored, which when executed may implement various embodiments of the method of the present invention.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Features that are described and/or illustrated with respect to one embodiment may be used in the same way or in a similar way in one or more other embodiments and/or in combination with or instead of the features of the other embodiments in the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes may be made to the embodiment of the present invention by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An intrusion detection method of an intelligent networked automobile is characterized by comprising the following steps:
receiving a communication request message of an external communication request body;
identifying a role of the communication request subject;
and determining whether the operation corresponding to the communication request message is matched with the operation authority corresponding to the identified role or not based on the preset operation authority information of a plurality of roles in a plurality of action domains, and sending the indication information corresponding to the communication request to the corresponding electronic control unit under the condition of matching so as to perform corresponding control by the electronic control unit.
2. The method of claim 1,
the plurality of roles includes one or more of the following roles: a remote service provider TSP, an intelligent decision TSP, an information service TSP, a mobile terminal, a road side unit RSU and other vehicle OBUs of an automobile manufacturer; or, the plurality of roles are a plurality of roles divided based on a communication subject;
the plurality of scopes includes one or more of: a power domain, a chassis domain, a vehicle body domain and an information domain; or the plurality of scopes comprise a plurality of scopes which are obtained by grouping according to the safety access control requirements of the electronic control units, and each group corresponds to one scope;
the operation authority information of the roles in the scope comprises: the operation authority information of each role on each component in each action domain;
the operation authority comprises an access operation to each access content in each scope, and the access operation comprises: unreadable and unwritable, readable only, writeable only, or both.
3. The method of claim 1,
and rejecting the communication request message under the condition that the operation corresponding to the communication request message is determined not to be matched with the operation authority corresponding to the identified role.
4. The method of claim 1, wherein the identifying a communication request subject role comprises:
analyzing a source address of the communication request message, and determining whether the source address is in a source address blacklist;
rejecting the communication request message if it is determined that the source address is in a source address blacklist;
in an instance in which it is determined that the source address is not in a source address blacklist, identifying a role for the communication request subject based on a source of the communication request message.
5. The method of claim 3 or 4, further comprising:
and sending a notice warning to an automobile central control display screen of the intelligent networked automobile and/or a TSP platform of an automobile manufacturer while rejecting the communication request message.
6. The method of claim 4, wherein identifying the role of the communication request subject based on the source of the communication request message comprises:
in the case that the communication request message originates from the on-board host box, comparing the source address of the communication request message with the source address of at least one pre-stored remote service provider, and determining the role of the communication request subject as a matching remote service provider role if there is a matching result;
under the condition that the communication request message is from a Bluetooth module, if the communication request message passes the authentication pairing success, determining that the role of the communication request main body is a mobile terminal role; if the pairing is unsuccessful, the vehicle can not communicate with the inside of the intelligent networking vehicle;
and under the condition that the communication request message is from an on-board unit (OBU), determining that the role of the communication request main body is a drive test unit (RSU) role or the OBU role of other vehicles based on a short-range communication protocol corresponding to the communication request message.
7. The method of claim 6, wherein identifying the role of the communication request subject based on the source of the communication request message further comprises:
and if the matching result does not exist, rejecting the communication request message, and adding the source address of the message into the source address blacklist.
8. The method of claim 1, wherein the method is performed by an intrusion detection gateway, the method further comprising:
and the electronic control unit executes the execution result after the corresponding operation based on the identified operation authority corresponding to the main body, sends the execution result to the relevant communication assembly through the CAN bus, and sends the execution result to the outside through the relevant communication assembly.
9. An intrusion detection device for an intelligent networked automobile, the device comprising a processor and a memory, wherein the memory has stored therein computer instructions, the processor being configured to execute the computer instructions stored in the memory, and wherein the device implements the steps of the method of any one of claims 1 to 8 when the computer instructions are executed by the processor.
10. The apparatus of claim 9, wherein the apparatus is an intrusion detection gateway disposed between a central gateway and an external communication device interface.
CN202010208722.1A 2020-03-23 2020-03-23 Intrusion detection method and device for intelligent networked automobile Active CN111314386B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010208722.1A CN111314386B (en) 2020-03-23 2020-03-23 Intrusion detection method and device for intelligent networked automobile

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010208722.1A CN111314386B (en) 2020-03-23 2020-03-23 Intrusion detection method and device for intelligent networked automobile

Publications (2)

Publication Number Publication Date
CN111314386A true CN111314386A (en) 2020-06-19
CN111314386B CN111314386B (en) 2021-04-23

Family

ID=71147294

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010208722.1A Active CN111314386B (en) 2020-03-23 2020-03-23 Intrusion detection method and device for intelligent networked automobile

Country Status (1)

Country Link
CN (1) CN111314386B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465777A (en) * 2021-12-31 2022-05-10 惠州华阳通用智慧车载系统开发有限公司 TSP server access control method
CN114666214A (en) * 2021-12-21 2022-06-24 北京经纬恒润科技股份有限公司 System firewall configuration method and device for car in Internet of vehicles and T-BOX
WO2022174794A1 (en) * 2021-02-21 2022-08-25 华为技术有限公司 Communication method and communication apparatus
CN114978656A (en) * 2022-05-17 2022-08-30 北京经纬恒润科技股份有限公司 Vehicle-mounted Ethernet detection defense method and device
CN115378668A (en) * 2022-08-05 2022-11-22 刘畅 Bidirectional authority framework method and system based on scope
WO2023123995A1 (en) * 2021-12-30 2023-07-06 中国第一汽车股份有限公司 Vehicle data processing method and apparatus, and vehicle

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090006412A1 (en) * 2007-06-29 2009-01-01 Bea Systems, Inc. Method for resolving permission for role activation operators
CN101520831A (en) * 2009-03-27 2009-09-02 深圳市永达电子有限公司 Safe terminal system and terminal safety method
CN103065074A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Uniform Resource Locator (URL) authority control method based on fine granularity
CN103227837A (en) * 2013-03-01 2013-07-31 北京邮电大学 Automobile networking intelligent operation system, automobile networking intelligent operation method and intelligent operation management platform
CN107247899A (en) * 2017-05-22 2017-10-13 珠海格力电器股份有限公司 Role authority control method and device based on security engine and security chip
CN107454190A (en) * 2017-08-30 2017-12-08 北京新能源汽车股份有限公司 Network architecture of intelligent networked automobile and automobile
US20180039789A1 (en) * 2016-06-09 2018-02-08 JPS Engineering Corp. Systems and methods for cybersecurity
CN107919955A (en) * 2017-12-28 2018-04-17 北京奇虎科技有限公司 A kind of vehicle network safety certifying method, system, vehicle, device and medium
WO2018195763A1 (en) * 2017-04-25 2018-11-01 余菁 Intelligent in-vehicle system authenticating connection based on sound waves and method for connection in authentication
CN108809970A (en) * 2018-05-29 2018-11-13 华南理工大学 A kind of safety protecting method of smart home security gateway
CN109543420A (en) * 2018-09-29 2019-03-29 中国平安人寿保险股份有限公司 Authority configuring method, device, electronic equipment and storage medium based on sudo

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090006412A1 (en) * 2007-06-29 2009-01-01 Bea Systems, Inc. Method for resolving permission for role activation operators
CN101520831A (en) * 2009-03-27 2009-09-02 深圳市永达电子有限公司 Safe terminal system and terminal safety method
CN103065074A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Uniform Resource Locator (URL) authority control method based on fine granularity
CN103227837A (en) * 2013-03-01 2013-07-31 北京邮电大学 Automobile networking intelligent operation system, automobile networking intelligent operation method and intelligent operation management platform
US20180039789A1 (en) * 2016-06-09 2018-02-08 JPS Engineering Corp. Systems and methods for cybersecurity
WO2018195763A1 (en) * 2017-04-25 2018-11-01 余菁 Intelligent in-vehicle system authenticating connection based on sound waves and method for connection in authentication
CN107247899A (en) * 2017-05-22 2017-10-13 珠海格力电器股份有限公司 Role authority control method and device based on security engine and security chip
CN107454190A (en) * 2017-08-30 2017-12-08 北京新能源汽车股份有限公司 Network architecture of intelligent networked automobile and automobile
CN107919955A (en) * 2017-12-28 2018-04-17 北京奇虎科技有限公司 A kind of vehicle network safety certifying method, system, vehicle, device and medium
CN108809970A (en) * 2018-05-29 2018-11-13 华南理工大学 A kind of safety protecting method of smart home security gateway
CN109543420A (en) * 2018-09-29 2019-03-29 中国平安人寿保险股份有限公司 Authority configuring method, device, electronic equipment and storage medium based on sudo

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KAIYU WANG, NAN LIU, JIAPENG XIU, AND ZHENGQIU YANG: "Research on Multi Domain Based Access Control in Intelligent Connected Vehicle", 《INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN NEW COMPUTING ENVIRONMENT》 *
王超: "基于关联规则的车载网络入侵检测研究", 《中国优秀硕士学位论文全文数据库工程科技II辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022174794A1 (en) * 2021-02-21 2022-08-25 华为技术有限公司 Communication method and communication apparatus
CN114666214A (en) * 2021-12-21 2022-06-24 北京经纬恒润科技股份有限公司 System firewall configuration method and device for car in Internet of vehicles and T-BOX
WO2023123995A1 (en) * 2021-12-30 2023-07-06 中国第一汽车股份有限公司 Vehicle data processing method and apparatus, and vehicle
CN114465777A (en) * 2021-12-31 2022-05-10 惠州华阳通用智慧车载系统开发有限公司 TSP server access control method
CN114465777B (en) * 2021-12-31 2023-06-30 惠州华阳通用智慧车载系统开发有限公司 TSP server access control method
CN114978656A (en) * 2022-05-17 2022-08-30 北京经纬恒润科技股份有限公司 Vehicle-mounted Ethernet detection defense method and device
CN114978656B (en) * 2022-05-17 2023-06-09 北京经纬恒润科技股份有限公司 Vehicle-mounted Ethernet detection defense method and device
CN115378668A (en) * 2022-08-05 2022-11-22 刘畅 Bidirectional authority framework method and system based on scope

Also Published As

Publication number Publication date
CN111314386B (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN111314386B (en) Intrusion detection method and device for intelligent networked automobile
den Hartog et al. Security and privacy for innovative automotive applications: A survey
US11363045B2 (en) Vehicle anomaly detection server, vehicle anomaly detection system, and vehicle anomaly detection method
US10798117B2 (en) Security processing method and server
Sagstetter et al. Security challenges in automotive hardware/software architecture design
US20240250976A1 (en) Security processing method and server
CN106828362B (en) Safety testing method and device for automobile information
US8788731B2 (en) Vehicle message filter
WO2014070942A1 (en) Automobile data abstraction and communication
AU2019207593B2 (en) A vehicle authentication and protection system
Zhang et al. A cyber security evaluation framework for in-vehicle electrical control units
CN112752682A (en) Method and system for improving vehicle safety
US20120330498A1 (en) Secure data store for vehicle networks
CN114745695A (en) Certificate processing method, device, equipment and storage medium
CN118400136A (en) Bus safety detection method and system based on CAN message identifier ID
CN106982213A (en) A kind of network attack defence method and relevant apparatus applied to mobile unit
WO2023048185A1 (en) Vehicle security analysis device, method, and program thereof
Bajpai et al. Towards effective identification and rating of automotive vulnerabilities
JP7259966B2 (en) Security device, setting change method, program, and storage medium
Sharma et al. Towards the prevention of car hacking: A threat to automation industry
Zachos et al. Test method for the sae j3138 automotive cyber security standard
Al Zaabi et al. An enhanced conceptual security model for autonomous vehicles
CN110519213A (en) Filter method, device, equipment and the computer readable storage medium of interior message
CN114189830B (en) Main body authority control method, equipment and storage medium based on Internet of vehicles
WO2023048187A1 (en) Vehicle security analysis device and method, and program therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant