CN115941333A - Tbox-based Internet of vehicles information safety protection system and method - Google Patents

Tbox-based Internet of vehicles information safety protection system and method Download PDF

Info

Publication number
CN115941333A
CN115941333A CN202211582025.8A CN202211582025A CN115941333A CN 115941333 A CN115941333 A CN 115941333A CN 202211582025 A CN202211582025 A CN 202211582025A CN 115941333 A CN115941333 A CN 115941333A
Authority
CN
China
Prior art keywords
vehicle
information
security
tbox
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211582025.8A
Other languages
Chinese (zh)
Inventor
鲁筱洁
王川宿
许佩玲
张星
王文祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chery Automobile Co Ltd
Original Assignee
Chery Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chery Automobile Co Ltd filed Critical Chery Automobile Co Ltd
Priority to CN202211582025.8A priority Critical patent/CN115941333A/en
Publication of CN115941333A publication Critical patent/CN115941333A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a Tbox-based Internet of vehicles information safety protection system and a method, wherein a vehicle-mounted Tbox acquires environmental information and log information of vehicle parts; the vehicle-mounted Tbox carries out intrusion detection on the acquired information, and uploads the log information to the cloud server when a security event is detected; the cloud server analyzes and filters the data format of the log information, performs format normalization processing on the sensitive data information, and stores the normalized data; the method comprises the steps of utilizing safety rules in a predefined safety rule base to carry out association, analysis and matching on stored data to generate an analysis result; and the cloud server displays the analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result. Abnormal data detected by the vehicle end are uploaded, and strategy rules are issued and updated on a cloud server safety operation platform, so that the safety of the vehicle end is guaranteed to the greatest extent.

Description

Tbox-based Internet of vehicles information safety protection system and method
Technical Field
The invention relates to the technical field of automobile electronic wireless communication and information safety, in particular to a Tbox-based Internet of vehicles information safety protection system and method.
Background
The statements in this section merely provide background information related to the present disclosure and may not constitute prior art.
With the continuous development of automobile electronization, an instrument panel, a central control screen and a vehicle-mounted information entertainment system terminal face upgrading and integration, and the development of the current processor technology provides a hardware basis for the integration of a full liquid crystal instrument, a vehicle-mounted information entertainment system, a vehicle networking module, an HD and the like, but the integration of various hardware in a vehicle inevitably causes the continuous expansion of the scale of an operating system and software, the stability and the safety of the whole message communication system are threatened, and the communication problem among a plurality of operating systems becomes more important.
In recent years, the number of information security events of the internet of vehicles is increasing. The malicious attacks on vehicle networking related enterprises such as global vehicle enterprises, information service providers and the like reach more than 280 thousands of times, and the information safety hazard is more severe. According to statistics of the Upstream report, the number of internet of vehicles information security attack events reported in an open mode is increased continuously, and meanwhile, attack types also show diversified development trends.
Disclosure of Invention
In order to overcome the defects of the prior art and improve the stability and the safety of the Internet of vehicles message communication system, the invention provides a Tbox-based Internet of vehicles information safety protection system and a method; the abnormal data detected by the vehicle end is uploaded, the message data of communication is encrypted and decrypted, and strategy rules are issued and updated on a cloud server safety operation platform, so that the safety of the vehicle end is guaranteed to the greatest extent.
In a first aspect, the invention provides a Tbox-based Internet of vehicles information security protection system;
tbox-based Internet of vehicles information safety protection system includes: each vehicle end carries a vehicle-mounted Tbox, and each vehicle-mounted Tbox is communicated with the cloud server;
the vehicle-mounted Tbox acquires environmental information and log information of vehicle parts;
carrying out intrusion detection on the acquired information by the vehicle-mounted Tbox, and uploading log information to the cloud server by the vehicle-mounted Tbox when a security event is detected;
the cloud server analyzes and filters the data format of the log information, performs format normalization processing on the sensitive data information, and stores the normalized data; the method comprises the steps of utilizing safety rules in a predefined safety rule base to carry out correlation, analysis and matching on stored data to generate an analysis result;
and the cloud server displays the analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result.
In a second aspect, the invention provides a Tbox-based information security protection method for the Internet of vehicles;
the Tbox-based Internet of vehicles information safety protection method comprises the following steps:
the vehicle-mounted Tbox acquires environmental information and log information of vehicle parts;
carrying out intrusion detection on the acquired information by the vehicle-mounted Tbox, and uploading log information to the cloud server by the vehicle-mounted Tbox when a security event is detected;
the cloud server analyzes and filters the data format of the log information, performs format normalization processing on the sensitive data information, and stores the normalized data; the method comprises the steps of utilizing safety rules in a predefined safety rule base to carry out correlation, analysis and matching on stored data to generate an analysis result;
and the cloud server displays the analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result.
Compared with the prior art, the invention has the beneficial effects that:
1. the attack and risk item borne by the vehicle end can be effectively monitored and identified, the log is transmitted to the cloud server, and the cloud server makes an emergency response and returns the emergency response to the vehicle end to form closed-loop management;
2. the cloud server monitors log data transmitted by the vehicle end in real time, identifies risk items, classifies and grades safety events, and adopts different strategy management and solution measures; the vulnerability database connected with the cloud server can be synchronously updated in real time, so that the latest security event can be identified and security management is carried out;
3. the operation and maintenance of the follow-up cloud server tend to be intelligent, the whole set of security management strategy has a standardized implementation process, the cloud server can be compatible with various vehicle type frameworks, various parts and various operating systems, and the platform vehicle type is supported, so that the security events can be identified more rapidly, corresponding solutions can be made, and the security of the intelligent internet-connected vehicle is ensured.
4. The probe deployed at the vehicle end is perfectly linked with the cloud server, the purpose of hearing the sound and distinguishing the shape of the probe is achieved by utilizing a continuously innovative big data safety technology, a closed-loop management system integrating monitoring, early warning, reporting, disposal and feedback is established, and the probe becomes a weapon which resists the most sharp network threat.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
FIG. 1 is a flow chart of a Tbox information security management design policy system;
FIG. 2 is a rule generation tool.
Detailed Description
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, and it should be understood that the terms "comprises" and "comprising", and any variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The embodiments and features of the embodiments of the present invention may be combined with each other without conflict.
All data are obtained according to the embodiment and are legally applied on the data on the basis of compliance with laws and regulations and user consent.
Interpretation of terms:
vehicle-mounted Tbox: a telematics box; and a vehicle-mounted information communication module.
Example one
The embodiment provides a Tbox-based Internet of vehicles information safety protection system;
tbox-based Internet of vehicles information safety protection system includes: each vehicle end is provided with a vehicle-mounted Tbox, and each vehicle-mounted Tbox is communicated with the cloud server;
the vehicle-mounted Tbox acquires environmental information and log information of vehicle parts;
the vehicle-mounted Tbox carries out intrusion detection on the acquired information, and uploads the log information to the cloud server when a security event is detected;
the cloud server analyzes and filters the data format of the log information, performs format normalization processing on the sensitive data information, and stores the normalized data; the method comprises the steps of utilizing safety rules in a predefined safety rule base to carry out association, analysis and matching on stored data to generate an analysis result;
and the cloud server displays the analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result.
Further, the vehicle-mounted Tbox collects environmental information and log information of vehicle parts;
the environment information specifically includes: a hardware environment, a software environment, a running environment, an operating system, and middleware;
the hardware environment comprises: information communication module components; the software environment comprises: version 5G TOBX: linux 4.14.206; TBOX version 4G: linux3.18; the operation environment adopts a public cloud server; the operating system adopts CentOS7.9; the middleware, comprising: mysql5.7, redis5.0, kafka2.8.1, elasticisearch7.6.2, mongoDB 4.4.13, cloud load balancing service.
Further, the vehicle-mounted Tbox performs intrusion detection on the acquired information, and when a security event is detected, the vehicle-mounted Tbox uploads log information to a cloud server;
the tool adopted by the intrusion detection is specifically as follows: intrusion Detection and Prevention System IDPS (Intrusion Detection and Prevention System).
It should be appreciated that an intrusion detection and prevention system is a network security device that monitors network transmissions in real time, alerts when suspicious transmissions are found, or takes proactive steps.
Wherein the security event comprises: system security events, communication security events, application security events, data security events, and business security events.
Wherein, the system security event comprises: mandatory access control, system user creation, logout, deletion, authority control and system loophole;
a communication security event comprising: filtering firewalls, stateful firewalls, scanning probe (Scan), denial of access (Dos), spoofing (Spoofing), malformed messages, password blasting, trojan implantation, exploits;
applying security events, including: installing an unauthorized application program, authorizing the unauthorized application program, tampering data of the authorized application program, uninstalling the authorized application program, tampering signature of the application program and controlling the authority of the application program;
a data security event comprising: certificate tampering, counterfeiting, illegal key reading, application key data tampering, illegal access, log information tampering and illegal access;
a traffic security event comprising: the method comprises the following steps of FOTA firmware label checking failure, FOTA firmware transmission failure, FOTA firmware flash failure, SOTA application complete package label checking failure, incremental package transmission failure, incremental package installation failure, OBD diagnosis Tester identity verification failure, OBD diagnosis seed probing, remote diagnosis remote identity verification failure and remote diagnosis seed probing.
Further, the cloud server performs data format analysis and filtering on the log information, and specifically includes:
collecting related information of the Internet of vehicles for classification and evaluation, wherein the information comprises internal and external network safety information; identifying whether the reported information is reliable and complete, and evaluating; if the evaluation result is invalid information, closing; if the evaluation result is a safety event, triggering a safety event emergency response process; if the evaluation result is risk information, triggering a risk evaluation process; and if the evaluation result is the vulnerability information, triggering the vulnerability management process.
Further, format normalization processing is performed on the sensitive data information, wherein the sensitive data refers to log information acquired by an intrusion detection and prevention system; normalization processing, comprising: and uniformly reporting to the cloud server.
Further, the associating, analyzing and matching the stored data by using the security rules in the predefined security rule base to generate an analysis result specifically includes:
the system comprises a security rule base, a security rule base and a security rule base, wherein the security rule base is used for storing security events acquired by an intrusion detection and defense system through the siog;
wherein, the safety rule includes: firewall rules, network intrusion detection rules and host intrusion detection rules;
the firewall rules receive and forward firewall rule requests from the slave nodes to the background, and forward firewall rules returned by the background to the slave nodes;
the network intrusion detection rule receives and forwards a network intrusion detection rule request from a slave node to a background, and forwards the network intrusion detection rule returned by the background to the slave node;
and the host intrusion detection rule receives and forwards a host intrusion detection rule request from the slave node to the background, and forwards the host intrusion detection rule returned by the background to the slave node.
The step of correlating, analyzing and matching the stored data refers to the step of matching the level and analyzing the source of the security event by contrasting a network security event library after the security event of the vehicle is collected by the selog of the intrusion detection and defense system, and then taking corresponding emergency response measures according to the level of the security event and the source of the security threat.
Further, the cloud server displays an analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of safety protection equipment of the vehicle terminal is achieved according to the analysis result;
the safety protection equipment refers to a software development kit of an intrusion detection and prevention system;
the linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result, namely that the intrusion detection and defense system IDPS detects the detection scanning type attacks, and an event is generated when the corresponding attacks are detected.
The IDPS reports the events to a controller management node NodeManager deployed in each part for event aggregation in the controller;
then, reporting the event to a vehicle management node Vehiclemanager deployed in TBOX by a controller management node NodeManager deployed in each part for vehicle event aggregation;
finally, reporting the event to a vehicle safety operation center of a cloud server by a vehicle management node vehicle manager deployed in the TBOX;
a vehicle safety operation center of the cloud server analyzes the safety event and identifies the risk level and the risk source; and collecting emergency response measures and transmitting the emergency response measures to a vehicle end for linkage response to form closed-loop management.
Further, the cloud server is further configured to: and judging whether the current security rule needs to be updated or not based on the vulnerability data in the log information, and if so, configuring a new security rule in the cloud server.
Further, the onboard Tbox polls and pulls the latest security rule from the cloud server, and stores the latest security rule into its own memory.
Further, the generation process of the new security rule comprises:
the host factory client sends a communication matrix to an IDPS provider client of the intrusion detection and defense system;
the method comprises the steps that an initial security rule is generated by an IDPS supplier client of an intrusion detection and defense system according to a communication matrix, and the initial security rule is sent to a part supplier client by the IDPS supplier client of the intrusion detection and defense system;
and updating the initial safety rule by the part supplier client, and storing the updated safety rule into a microprocessor of the cloud server.
When the intelligent internet vehicle is used, because the communication between the inside and the outside of the vehicle needs to be connected with a network and can be attacked from the outside, a probe package needs to be carried at a TBOX end to monitor the risks of parts, including environment monitoring, log monitoring and the like;
event analysis and presentation are carried out by a security operation center (situation awareness platform) of the cloud server, whether the strategy needs to be updated or not is judged by combining vulnerability information, and if the strategy needs to be updated, a new strategy is configured in policy management of the security operation center (situation awareness platform) of the cloud server;
each intrusion detection and defense system polls a cloud server security operation center (situation awareness platform), pulls updated security rules, and the master node plays a forwarding role in the security rules.
An intrusion detection and defense system IDS or IDPS is divided into five modules in total by realizing multiple dimensions from system architecture design with required functions: vessel Manager, node Manager, NIDPS, HIDS, SELOG. The five modules cooperate with each other to form a complete vehicle-end IDPS system.
Vessel Manager: and the whole vehicle management node is deployed in the TBOX and directly interacts with the VSOC. The system comprises functions of an engine class, a registration class service, a configuration class service, a rule class service, an uploading class service, a log class service, a node communication service and the like.
Node Manager: and the management node in the controller is deployed in each part, and both ICC and TBOX are deployed. And the system is responsible for managing the IDPS component, interacting with the Vehicle Manager, acquiring VSOC configuration rules, and reporting information such as security events, logs, flow and the like.
NIDPS: the method is deployed in ICC (QNX 7.0 and Android R systems) and TBOX to realize functions of firewall configuration, network intrusion detection, deep packet inspection, flow detection, bluetooth detection and the like.
4, HIDS: the system is deployed in an ICC (Android R system) to realize the functions of log monitoring, interface state monitoring, system environment monitoring, integrity detection and rootkit detection.
SELOG: the system is arranged in each part, and the function of collecting and storing the safety logs of the whole vehicle is realized. The invention is described with respect to TBOX.
As shown in fig. 1, a remote-controlled vehicle network system includes:
the vehicle TBOX end is to carry a Software Development Kit (SDK) to monitor the safety events of the Ethernet and 4G/5G network of the vehicle end;
the cloud server builds a safety operation platform, receives and analyzes the log information of the safety events of the vehicle end, issues rules to the vehicle end, and configures and updates the safety strategy to form a closed loop of information safety strategy management.
As shown in fig. 2, rule generation includes:
1. the vehicle-mounted Tbox factory releases the communication matrix/real vehicle data, and the host factory outputs the communication matrix or the real vehicle data; evaluating whether message and signal screening is needed according to IDS performance;
2. generating a rule by an IDPS supplier of the vehicle intrusion detection and defense system, binding the rule with a communication matrix, and regenerating the rule along with the change of the communication matrix;
3. the method comprises the following steps that a part supplier updates rules of parts, and the rules are stored in a microprocessor and a Memory Protection Unit (MPU); the online updating is that the rule is issued to an MPU end through HTTPS after the mass production, and the rule is pulled when the CAN IDS is restarted; offline is updated by the basic service in the diagnostic service.
Example two
The embodiment provides a Tbox-based Internet of vehicles information safety protection method;
the Tbox-based Internet of vehicles information safety protection method comprises the following steps:
the vehicle-mounted Tbox acquires environmental information and log information of vehicle parts;
the vehicle-mounted Tbox carries out intrusion detection on the acquired information, and uploads the log information to the cloud server when a security event is detected;
the cloud server analyzes and filters the data format of the log information, normalizes the format of the sensitive data information, and stores the normalized data; the method comprises the steps of utilizing safety rules in a predefined safety rule base to carry out correlation, analysis and matching on stored data to generate an analysis result;
and the cloud server displays the analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. Car networking information safety protection system based on Tbox, characterized by includes: each vehicle end is provided with a vehicle-mounted Tbox, and each vehicle-mounted Tbox is communicated with the cloud server;
the vehicle-mounted Tbox acquires environmental information and log information of vehicle parts;
the vehicle-mounted Tbox carries out intrusion detection on the acquired information, and uploads the log information to the cloud server when a security event is detected;
the cloud server analyzes and filters the data format of the log information, performs format normalization processing on the sensitive data information, and stores the normalized data; the method comprises the steps of utilizing safety rules in a predefined safety rule base to carry out correlation, analysis and matching on stored data to generate an analysis result;
and the cloud server displays the analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result.
2. The Tbox-based internet-of-vehicles information security protection system as claimed in claim 1, wherein the vehicle Tbox collects environmental information and log information of vehicle components, wherein the environmental information specifically includes: a hardware environment, a software environment, a running environment, an operating system, and middleware;
the vehicle-mounted Tbox carries out intrusion detection on the acquired information, and uploads the log information to the cloud server when a security event is detected; wherein, the instrument that intrusion detection adopted is: an intrusion detection and prevention system.
3. The Tbox-based internet of vehicles information security protection system of claim 1, wherein the security event includes: system security events, communication security events, application security events, data security events, and business security events;
wherein, the system security event comprises: mandatory access control, creation, logout, deletion, authority control and system loopholes of system users;
a communication security event comprising: filtering a firewall, a state firewall, scanning detection, access denial, cheating, malformed messages, password blasting, trojan horse implantation and vulnerability utilization;
applying security events, including: installation of an unauthorized application program, authorization of the unauthorized application program, data tampering of an authorized application program, uninstallation of the authorized application program, signature tampering of the application program, and authority control of the application program;
a data security event comprising: certificate tampering, counterfeiting, illegal key reading, application key data tampering, illegal access, log information tampering and illegal access;
a traffic security event comprising: the method comprises the following steps of FOTA firmware label checking failure, FOTA firmware transmission failure, FOTA firmware flash failure, SOTA application complete package label checking failure, incremental package transmission failure, incremental package installation failure, OBD diagnosis Tester identity verification failure, OBD diagnosis seed probing, remote diagnosis remote identity verification failure and remote diagnosis seed probing.
4. The Tbox-based car networking information security protection system as claimed in claim 1, wherein the cloud server performs data format analysis and filtering on the log information, specifically comprising:
collecting relevant information of the Internet of vehicles for classification and evaluation, wherein the information comprises internal and external network safety information; identifying whether the reported information is reliable and complete, and evaluating; if the evaluation result is invalid information, closing; if the evaluation result is a safety event, triggering a safety event emergency response process; if the evaluation result is the risk information, triggering a risk evaluation process; and if the evaluation result is the vulnerability information, triggering the vulnerability management process.
5. The Tbox-based information security system of claim 1, wherein the associating, analyzing and matching of the stored data with the security rules in the predefined security rules library to generate the analysis result includes:
the security rule base is used for storing security events acquired by the intrusion detection and defense system through the select; a security rule comprising: firewall rules, network intrusion detection rules and host intrusion detection rules;
the stored data are correlated, analyzed and matched, namely after the safety events of the vehicles are collected by the selog of the intrusion detection and defense system, matching levels and sources of the safety events are compared with a network safety event library, and corresponding emergency response measures are taken according to the levels of the safety events and the sources of the safety threats.
6. The Tbox-based Internet of vehicles information safety protection system of claim 1, wherein the cloud server displays the analysis result and issues the analysis result to the Tbox, and realizes the linkage response of the safety protection device of the vehicle terminal according to the analysis result, wherein the safety protection device is a software development kit of an intrusion detection and defense system;
the linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result, namely an IDPS detection scanning type attack of an intrusion detection and defense system, and an event is generated when the corresponding attack is detected;
the IDPS reports the events to a controller management node NodeManager deployed in each part for event aggregation in the controller;
reporting the event to a vehicle management node, namely, a controller management node, namely, a NodeManager deployed in each part, wherein the vehicle management node is deployed in a TBOX (tunnel boring machine) to carry out vehicle event aggregation;
finally, reporting the event to a vehicle safety operation center of a cloud server by a vehicle management node vehicle manager deployed in the TBOX;
a vehicle safety operation center of the cloud server analyzes the safety event and identifies the risk level and the risk source; and collecting emergency response measures and transmitting the emergency response measures to a vehicle end for linkage response to form closed-loop management.
7. The Tbox-based internet of vehicles information security system of claim 1, wherein the cloud server is further configured to: and judging whether the current security rule needs to be updated or not based on the vulnerability data in the log information, and if so, configuring a new security rule in the cloud server.
8. The Tbox-based internet of vehicles information security system as claimed in claim 1, wherein the Tbox polls and pulls the latest security rule from the cloud server and stores the latest security rule in its own memory.
9. The Tbox-based information security system of claim 7, wherein the new security rule is generated by the process comprising:
the host factory client sends a communication matrix to an IDPS provider client of an intrusion detection and defense system;
the method comprises the steps that an initial security rule is generated by an IDPS client of an intrusion detection and defense system according to a communication matrix, and the initial security rule is sent to a part supplier client by the IDPS client of the intrusion detection and defense system;
and updating the initial security rule by the part supplier client, and storing the updated security rule into a microprocessor of the cloud server.
10. Tbox-based vehicle networking information safety protection method is characterized by comprising the following steps:
the vehicle-mounted Tbox acquires environmental information and log information of vehicle parts;
carrying out intrusion detection on the acquired information by the vehicle-mounted Tbox, and uploading log information to the cloud server by the vehicle-mounted Tbox when a security event is detected;
the cloud server analyzes and filters the data format of the log information, performs format normalization processing on the sensitive data information, and stores the normalized data; the method comprises the steps of utilizing safety rules in a predefined safety rule base to carry out association, analysis and matching on stored data to generate an analysis result;
and the cloud server displays the analysis result and issues the analysis result to the vehicle-mounted Tbox, and linkage response of the safety protection equipment of the vehicle terminal is realized according to the analysis result.
CN202211582025.8A 2022-12-09 2022-12-09 Tbox-based Internet of vehicles information safety protection system and method Pending CN115941333A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211582025.8A CN115941333A (en) 2022-12-09 2022-12-09 Tbox-based Internet of vehicles information safety protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211582025.8A CN115941333A (en) 2022-12-09 2022-12-09 Tbox-based Internet of vehicles information safety protection system and method

Publications (1)

Publication Number Publication Date
CN115941333A true CN115941333A (en) 2023-04-07

Family

ID=86655317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211582025.8A Pending CN115941333A (en) 2022-12-09 2022-12-09 Tbox-based Internet of vehicles information safety protection system and method

Country Status (1)

Country Link
CN (1) CN115941333A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117425153A (en) * 2023-12-18 2024-01-19 新华三网络信息安全软件有限公司 Risk detection method and device for Internet of vehicles terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117425153A (en) * 2023-12-18 2024-01-19 新华三网络信息安全软件有限公司 Risk detection method and device for Internet of vehicles terminal
CN117425153B (en) * 2023-12-18 2024-03-26 新华三网络信息安全软件有限公司 Risk detection method and device for Internet of vehicles terminal

Similar Documents

Publication Publication Date Title
US10250619B1 (en) Overlay cyber security networked system and method
EP3741091B1 (en) Intrusion anomaly monitoring in a vehicle environment
US20190207966A1 (en) Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store
US8230507B1 (en) Modular agent for network security intrusion detection system
US10205733B1 (en) Cyber signal isolator
US7650638B1 (en) Network security monitoring system employing bi-directional communication
US20170270295A1 (en) Cyber security for physical systems
US8099782B1 (en) Event aggregation in a network
WO2019133453A1 (en) Platform and method for retroactive reclassification employing a cybersecurity-based global data store
CN106828362B (en) Safety testing method and device for automobile information
CN111726774A (en) Method, device, equipment and storage medium for defending attack
CN112783518A (en) Vehicle-mounted application containerization isolation framework system based on IPFS and implementation method
CN110365709B (en) Device for sensing unknown network attack behavior based on upstream probe
CN111343128A (en) Network safety monitoring equipment and network safety monitoring system applied to motor vehicle
KR20200130968A (en) A system and method for detecting network anomalies of connected car
WO2021145144A1 (en) Intrusion-path analyzing device and intrusion-path analyzing method
US11580229B2 (en) Computer-implemented method of security-related control or configuration of a digital system
CN115941333A (en) Tbox-based Internet of vehicles information safety protection system and method
WO2004051929A1 (en) Audit platform system for application process based on components
US20220166787A1 (en) Link anomaly detector
US20080072321A1 (en) System and method for automating network intrusion training
Möller et al. Automotive cybersecurity
CN112104608A (en) Vehicle information safety protection method, system and storage medium
CN114301796B (en) Verification method, device and system for prediction situation awareness
CN114157464B (en) Network test monitoring method and monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination