WO2022205122A1 - 确定防护方案的方法、装置、设备及计算机可读存储介质 - Google Patents

确定防护方案的方法、装置、设备及计算机可读存储介质 Download PDF

Info

Publication number
WO2022205122A1
WO2022205122A1 PCT/CN2021/084518 CN2021084518W WO2022205122A1 WO 2022205122 A1 WO2022205122 A1 WO 2022205122A1 CN 2021084518 W CN2021084518 W CN 2021084518W WO 2022205122 A1 WO2022205122 A1 WO 2022205122A1
Authority
WO
WIPO (PCT)
Prior art keywords
protection
protection scheme
combined
scheme
cost
Prior art date
Application number
PCT/CN2021/084518
Other languages
English (en)
French (fr)
Inventor
赵付霞
冀浩杰
王云鹏
于海洋
秦洪懋
王颖会
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN202180001201.1A priority Critical patent/CN113228594B/zh
Priority to PCT/CN2021/084518 priority patent/WO2022205122A1/zh
Publication of WO2022205122A1 publication Critical patent/WO2022205122A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the present application relates to the technical field of network-connected vehicle security, and in particular, to a method, apparatus, device, and computer-readable storage medium for determining a protection scheme.
  • the attack path consists of at least one main body, and the main body can be the in-vehicle communication box (telematics box, T-Box), gateway (gateway, GW), electronic control unit (electronic control unit, ECU) and other nodes in the connected car. applications, operating systems, etc.
  • technicians provide at least one protection scheme for each possible attack path.
  • different protection schemes have different protection degrees and can meet different needs.
  • developers choose a corresponding protection scheme for each attack path based on their own experience.
  • the embodiments of the present application provide a method, apparatus, device, and computer-readable storage medium for determining a protection scheme, which can more efficiently determine a protection scheme with better overall protection cost-effectiveness, and can also reduce unnecessary cost waste.
  • the plan is as follows:
  • a method for determining a protection scheme comprising:
  • a plurality of combined protection schemes are determined, wherein the combined protection scheme is composed of an attack path protection scheme corresponding to each attack path in the multiple attack paths.
  • Determine the protection cost corresponding to each combined protection scheme and determine the corresponding risk value of each combined protection scheme.
  • each combined protection solution is composed of an attack path protection solution corresponding to each attack path in the multiple attack paths. Then, in these combined protection schemes, combined with the risk value and protection cost of the combined protection scheme, a combined protection scheme with better protection cost performance is selected. It can be seen that, in this application, instead of determining the protection scheme for each attack path individually, a combined protection scheme corresponding to multiple attack paths is determined at one time, which is more efficient. In addition, in this application, when determining the combined protection, the risk value and the protection cost are comprehensively considered, so that the finally determined combined protection scheme is cost-effective and can effectively reduce cost waste.
  • the same subject may exist for multiple attack paths, for example, the subjects included in the first attack path are A, B, and C, and the subjects included in the second attack path are A and D.
  • the protection scheme of each attack path is determined separately. For the first attack path, it is possible to select the attack path protection with better cost performance among the attack path protection schemes corresponding to the first attack path.
  • the scheme is B1 (the main protection measures of the main body B) plus C1 (the main protection measures of the main body C).
  • the second attack path it is possible to choose the protection scheme of each attack path corresponding to the second attack path, which is more cost-effective.
  • the attack path protection scheme of is D1 (subject protection measure for subject D).
  • the attack path protection solution A1 (the main protection measure of the main body A) is not the best cost-effective protection solution for either the first attack path or the second attack path.
  • A1 can protect both the first attack path and the second attack path, and its protection cost is lower than that of B1+C1+D1.
  • the protection effect of A1 is better than that of B1+C1;
  • the protection effect of A1 is better than that of D1.
  • A1 will be selected as the best cost-effective combined protection scheme.
  • choosing A1 is more cost-effective than choosing B1+C1+D1.
  • each combined protection scheme can also be divided into different information security levels, and a combined protection scheme that satisfies the protection cost-effectiveness condition is selected in each information security level. Connected cars that adapt to different information security needs. Specifically, based on the risk value corresponding to each combined protection scheme and the risk value range corresponding to each information security level, the information security level to which each combined protection scheme belongs is determined. For each information security level, based on the corresponding protection cost and risk value of each combined protection scheme belonging to the information security level, a combined protection scheme belonging to the information security level that meets the protection cost-effectiveness condition is determined.
  • the protection cost-effectiveness condition is that the protection cost-effectiveness is the highest.
  • the maximum risk value R may be equally divided into N parts to obtain N risk value ranges, and each risk value range corresponds to an information security level.
  • the lower limit of the risk value range corresponding to the i-th information security level is capped at
  • the boundary value can be divided into the risk value range corresponding to the higher information security level. The higher the information security level, the smaller the corresponding risk value.
  • the method for determining the protection cost corresponding to each combined protection scheme may be as follows:
  • the sum of the protection costs corresponding to the protection schemes of each attack path included in each combined protection scheme is calculated as the protection cost corresponding to each combined protection scheme.
  • the method for determining the risk value corresponding to each combined protection scheme may be as follows:
  • the sum of the risk values corresponding to the protection schemes of each attack path included in each combined protection scheme is calculated as the risk value corresponding to each combined protection scheme.
  • the method provided by the embodiment of the present application may be used to select a protection scheme against the attack path that threatens the security of the connected car. Specifically, based on the attack path protection scheme corresponding to each attack path of the connected vehicle, a plurality of combined protection schemes of the connected vehicle are determined. Then, the protection cost corresponding to each combined protection scheme of the connected car is determined, and the risk value corresponding to each combined protection scheme is determined. Finally, based on the protection cost and risk value corresponding to each combined protection scheme of the connected vehicle, the combined protection scheme of the connected vehicle that meets the protection cost-effectiveness conditions is determined.
  • relevant information of the determined combined protection scheme can be displayed.
  • the relevant information may include specific implementation steps of the combined protection scheme, expected protection effects, protection costs, precautions, and the like. In this way, the technicians can clearly know the relevant information of the combined protection scheme, and then the technicians can implement the combined protection scheme in the connected car based on the relevant information of the combined protection scheme to protect the attack path of the connected car.
  • an apparatus for determining a protection scheme is provided, and the apparatus is used to execute the method described in the first aspect.
  • the apparatus includes a module for performing the method described in the first aspect above.
  • a computer device comprising a processor and a memory, wherein:
  • the memory stores instructions, and the processor executes the instructions to implement the method for determining a protection scheme as described in the first aspect above.
  • a computer-readable storage medium where instructions are stored in the computer-readable storage medium, and the instructions are loaded and executed by a processor to implement the method for determining a protection scheme as described in the first aspect above .
  • a chip system in a fifth aspect, includes a processor and an interface;
  • the interface is used to obtain programs or instructions
  • the processor is configured to invoke the program or instruction to implement or support the terminal computer device to implement the method for determining a protection scheme according to the first aspect and any possible implementation manner of the first aspect.
  • a computer program product includes instructions, the instructions are loaded and executed by a processor, so as to achieve the first aspect and any one of the possible implementations of the first aspect. method described.
  • a seventh aspect provides an apparatus for determining a protection scheme, the apparatus comprising at least one processor and a communication interface for sending and/or receiving data, the at least one processor for calling at least one memory A stored computer program to cause the apparatus to implement the method as described in the first aspect and any one of the possible implementations of the first aspect.
  • a chip system in an eighth aspect, includes at least one processor, and is configured to support implementing the functions involved in the first aspect and any possible implementation manner of the first aspect, for example, receiving or Process the data and/or information involved in the above methods.
  • the system-on-a-chip further includes a memory for storing program instructions and data, the memory being located within the processor or outside the processor.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • FIG. 1 is an electronic and electrical architecture diagram of a connected vehicle provided by an embodiment of the present application
  • FIG. 2 is a schematic diagram of a node-level attack path provided by an embodiment of the present application
  • FIG. 3 is a schematic diagram of the relationship between a subject-level attack path and a node-level attack path provided by an embodiment of the present application;
  • FIG. 4 is a flowchart of a method for determining a protection scheme provided by an embodiment of the present application
  • FIG. 5 is a schematic diagram of a fragile point of a main body provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a device for determining a protection scheme provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a computer device provided by an embodiment of the present application.
  • An embodiment of the present application provides a method for determining a protection scheme, and the method may be implemented by a computer device, where the computer device may be a laptop computer (Laptop), a desktop computer, a tablet computer (pad), and the like.
  • the computer device can determine a combined protection scheme corresponding to multiple attack paths at one time, which is more efficient.
  • the risk value and the protection cost of the combined protection scheme are also comprehensively considered, so that the finally determined combined protection scheme is cost-effective and can effectively avoid cost waste.
  • FIG. 1 shows a possible electronic and electrical architecture diagram of a connected car.
  • a telematics box (T-BOX) is used to communicate with the outside world, and a gateway (GW) is used to perform protocol conversion, data exchange, and the like.
  • Parts other than T-Box and GW can include power domain, chassis domain, body domain and infotainment domain and Advanced Driver Assistance System (ADAS).
  • ADAS Advanced Driver Assistance System
  • Each domain includes a corresponding domain controller (Domain Controller, DC), a controller area network (Controller Area Network, CAN), and at least one electronic control unit (Electronic Control Unit, ECU).
  • DC Domain Controller
  • CAN Controller Area Network
  • ECU Electronic Control Unit
  • the power domain includes DC1, powertrain controller area network (Powertrain CAN, PT CAN), ECU1, ECU2, etc., where the ECU can be an engine control module (Engine Control Module, ECM), a battery management system ( Battery Management System, BMS), etc.
  • the chassis domain includes DC2, chassis controller area network (Chassis CAN, CH CAN), ECU3, ECU4, etc. Among them, ECU can be anti-lock braking system (Antilock Brake System, ABS), body electronic stability system (Electronic Stability Program) , ESP) etc.
  • the body domain includes DC3, body controller area network (Body CAN), body control module (Body Control Module, BCM) ECU5, ECU6, etc.
  • the ECU can be a tire pressure monitoring system (Tire Pressure Monitoring System, TPMS), panoramic Surveillance imaging system (Around View Monitor, AVM), etc.
  • the infotainment domain includes DC4, infotainment controller area network (information CAN, info CAN), ECU7, in-vehicle infotainment (In-Vehicle Infotainment, IVI) system, etc., where the ECU can be a combination instrument (Instrument Pack, IPK), etc. .
  • the attack path is the node-level attack path, and from the specific attacked subject in the hardware, the attack path is the subject-level attack path.
  • Each node-level attack path includes at least one node, and the node can be a hardware module in a connected car, such as T-Box, GW, DC, ECU, etc.
  • the corresponding node-level attack path can be shown in Figure 2, that is, first attack the T-Box, then attack the GW, then attack the DC in the body domain, and finally attack the control High beam ECU.
  • FIG. 3 a relationship between a possible node-level attack path and an agent-level attack path is shown.
  • a node-level attack path is shown, and the nodes included in the node-level attack path are T-Box, GW, DC1, and ECU1 in sequence, wherein the T-Box includes multiple subjects, and among the multiple subjects Subject 1 and subject 2 are attacked subjects.
  • GW includes multiple subjects.
  • subject 3 and subject 4 are attacked subjects.
  • DC1 includes multiple subjects, and subject 5 and subject 6 are attacked subjects.
  • ECU1 includes multiple subjects, among which subject 7 is the subject to be attacked.
  • Figure 3 also shows three subject-level attack paths, wherein the first subject-level attack path includes subjects in sequence: subject 2, subject 1, subject 3, subject 5, and subject 7,
  • the subjects included in the second subject-level attack path are subject 1, subject 4, subject 6, and subject 7, and the subjects included in the third subject-level attack path are subject 2, subject 3, subject 5, and subject 7 in order.
  • the number of nodes included in the attack path it can be divided into single-node attack path and multi-node attack path.
  • the single-node attack path refers to an attack path that includes only one node in the attack path, that is, an attack on the one node can generate risks.
  • a multi-node attack path refers to an attack path that includes multiple nodes in the attack path.
  • the number of ECUs in the attack path it can be divided into no ECU attack path, single ECU attack path and multi-ECU attack path.
  • an embodiment of the present application provides a method for determining a protection scheme, and the processing flow of the method may include the following steps:
  • Step 401 determining an attack path protection scheme corresponding to each attack path among the multiple attack paths of the information security attack on the connected vehicle.
  • the attack path protection scheme corresponding to an attack path consists of subject protection measures corresponding to at least one subject included in the attack path.
  • An attack path may correspond to at least one attack path protection scheme.
  • the main body protection measures can be patch codes for vulnerabilities or vulnerabilities in the main body, or hardware modules used to protect the vulnerabilities or vulnerabilities.
  • the main body 1 corresponds to two main body protection measures. When no main body protection measures are implemented, the main body 1 has four vulnerable points or loopholes. After the main body protection measures 1 are implemented on the main body 1, the main body 1 has one remaining Vulnerability points or loopholes. After the main body protection measure 2 is implemented on the main body 1, the main body 1 still has 3 vulnerable points or loopholes.
  • technicians can pre-determine k possible attack paths for connected vehicles, where k is an integer greater than 1. And for the subjects in each attack path, the technician can provide corresponding subject protection measures, and each subject can correspond to at least one subject protection measure.
  • an attack path protection scheme of the attack path consists of at most one subject protection measure corresponding to each subject included in the attack path. That is, in an attack path protection scheme of an attack path, each subject of the attack path may correspond to a subject protection measure, or may not implement a subject protection measure.
  • the number of attack path protection schemes corresponding to an attack path can be expressed by the following formula:
  • Y j is the number of attack path protection schemes corresponding to the jth attack path in the k attack paths.
  • Ni is the number of subject protection measures corresponding to the i -th subject in the j-th attack path.
  • N i +1 indicates that there are N i subject protection measures that can be selected for the i th subject, and it is also possible to choose not to implement the subject protection measures for the i th subject.
  • m is the number of subjects included in the jth attack path, and C is the permutation combination symbol.
  • Step 402 Determine a plurality of combined protection schemes based on the attack path protection schemes corresponding to each attack path respectively.
  • the combined protection scheme consists of an attack path protection scheme corresponding to each attack path in the multiple attack paths. It should be noted here that, for an attack path, the attack path protection scheme corresponding to the attack path includes not implementing the protection scheme for the attack path.
  • multiple attack path protection schemes can form a combined protection scheme, then, for k attack paths, the number of combined protection schemes can be calculated and expressed by the following formula:
  • k is the number of attack paths
  • Y j is the number of attack path protection schemes corresponding to the jth attack path in the k attack paths.
  • the first attack path protection scheme includes main body protection measures corresponding to the first subject
  • the second attack path protection scheme also includes main body protection measures corresponding to the first subject.
  • only one main body protection measure corresponding to the above-mentioned first subject in the first attack path protection scheme and one main body protection measure corresponding to the above-mentioned first subject in the second attack path protection scheme is implemented. Then, the combined protection scheme will not be adopted in the end, and the combined protection scheme can be eliminated.
  • Step 403 Determine the protection cost corresponding to each combined protection scheme, and determine the risk value corresponding to each combined protection scheme.
  • each combination protection scheme refers to each combination protection scheme in the remaining combination protection schemes after the above-mentioned elimination.
  • the protection cost of each attack path protection scheme included in the combined protection scheme may be calculated first, and then the protection costs of each attack path protection scheme are added to obtain the combined protection scheme cost of protection.
  • the protection cost of a combined protection scheme can be calculated by the following formula:
  • CS' is the protection cost of the combined protection scheme
  • k is the number of attack path protection schemes included in the combined protection scheme, that is, the number of attack paths
  • C j is the jth attack path protection scheme in the combined protection scheme cost of protection.
  • the protection cost of the j-th attack path protection scheme can be calculated by the following formula:
  • m is the number of subjects included in the j-th attack path
  • c i is the protection cost corresponding to the i-th subject. If in the j-th attack path protection scheme, subject protection measures are implemented for the i-th subject, Then ci is the protection cost generated by implementing the subject protection measure, and if in the j th attack path protection scheme, no subject protection measure is implemented for the i th subject, then ci is 0.
  • the protection cost of the main protective measures refers to the quantitative value of manpower and material resources to implement the main protective measures, which can be obtained by technical personnel according to experimental tests.
  • the risk value of each attack path protection scheme included in the combined protection scheme can be calculated first, and then the risk value of each attack path protection scheme is added to obtain the risk value of the combined protection scheme.
  • the risk value of a certain combined protection scheme can be calculated by the following formula:
  • RS' is the risk value of the combined protection scheme
  • k is the number of attack path protection schemes included in the combined protection scheme, that is, the number of attack paths
  • Rj is the jth attack path protection scheme in the combined protection scheme value at risk.
  • the risk value for the j-th attack path protection scheme can be calculated by the following formula:
  • m is the number of subjects included in the j-th attack path
  • ri is the attack probability corresponding to the i -th subject in the j-th attack path
  • I is the quantified value of the impact result of the attack path.
  • r i and I are known quantities, which can be obtained by technical personnel according to experimental tests. The following describes the value of ri :
  • Case 1 If in the attack path protection scheme of the j-th attack path, the i-th subject implements subject protection measures, the probability of the i-th subject being attacked successfully after implementing the subject protection measures is taken as ri i .
  • Case 3 If in the attack path protection scheme of the jth attack path, the i th subject does not implement subject protection measures, and there is a subject protection measure corresponding to the i th subject in the combined protection scheme, then The probability of the i -th subject being attacked successfully after implementing the subject protection measure is taken as ri .
  • Step 404 based on the protection cost and risk value corresponding to each combined protection scheme, determine a combined protection scheme that satisfies the protection cost-effectiveness condition.
  • the combination protection schemes are obtained one by one in the sorted order.
  • the newly determined candidate combination protection scheme is set as the first comparison combination protection scheme
  • the currently obtained combination protection scheme is set as the first comparison combination protection scheme.
  • the scheme is used as the second comparative combined protection scheme.
  • the first comparative combined protection scheme and the second comparative protection scheme are determined.
  • the combination protection scheme with higher protection cost is regarded as the candidate combination protection scheme.
  • the candidate combination protection scheme finally determined is determined as the combination protection scheme with the most cost-effective protection.
  • the following methods when determining the combined protection scheme with higher protection cost performance in the first comparative combined protection scheme and the second comparative combined protection scheme, the following methods can be used:
  • the second comparative combined protection scheme is determined as the protection cost-effectiveness ratio between the first comparative combined protection scheme and the second comparative combined protection scheme High combined protection scheme.
  • the protection cost corresponding to the first comparative combined protection scheme is less than the protection cost corresponding to the second comparative combined protection scheme, calculate the cost increase rate of the second comparative combined protection scheme relative to the first comparative combined protection scheme, and calculate the second comparative combined protection scheme The risk reduction rate of the protection scheme relative to the first comparative combined protection scheme. Calculate the difference between the cost increase rate and the risk reduction rate.
  • the second comparative combined protection scheme is determined as a combined protection scheme with higher protection cost performance among the first comparative combined protection scheme and the second comparative combined protection scheme.
  • the first comparative combined protection scheme is determined as a combined protection scheme with higher protection cost performance among the first comparative combined protection scheme and the second comparative combined protection scheme.
  • the arranged first combined protection scheme is set as the first comparative combined protection scheme
  • the arranged second combined protection scheme is set as the second comparative combined protection scheme. Based on the protection cost and risk value corresponding to the first comparative combined protection scheme, and the protection cost and risk value corresponding to the second comparative combined protection scheme, determine the protection cost-effectiveness of the first comparative combined protection scheme and the second comparative combined protection scheme Combined protection scheme as a candidate combined protection scheme.
  • the combination protection schemes are obtained one by one in the sorted order.
  • the newly determined candidate combination protection scheme is set as the first comparison combination protection scheme
  • the currently obtained combination protection scheme is set as the first comparison combination protection scheme.
  • the scheme is used as the second comparative combined protection scheme.
  • the first comparative combined protection scheme and the second comparative protection scheme are determined.
  • the combination protection scheme with higher protection cost is regarded as the candidate combination protection scheme.
  • the candidate combination protection scheme finally determined is determined as the combination protection scheme with the most cost-effective protection.
  • the following methods when determining the combined protection scheme with higher protection cost performance in the first comparative combined protection scheme and the second comparative combined protection scheme, the following methods can be used:
  • the protection cost corresponding to the first comparative combined protection scheme is less than the protection cost corresponding to the second comparative combined protection scheme, the first comparative combined protection scheme is determined as the first comparative combined protection scheme and the second comparative combined protection scheme A cost-effective combination protection solution for medium protection.
  • the protection cost corresponding to the first comparative combined protection scheme is greater than the protection cost corresponding to the second comparative combined protection scheme, the cost increase rate of the first comparative combined protection scheme relative to the second comparative combined protection scheme is calculated, and the first comparative combined protection scheme is calculated.
  • the risk reduction rate of the comparative combined protection scheme relative to the second comparative combined protection scheme Calculate the difference between the cost increase rate and the risk reduction rate.
  • the first comparative combined protection scheme is determined as a combined protection scheme with higher protection cost performance among the first comparative combined protection scheme and the second comparative combined protection scheme.
  • the second comparative combined protection scheme is determined as a combined protection scheme with higher protection cost performance among the first comparative combined protection scheme and the second comparative combined protection scheme.
  • Two combination protection schemes are randomly selected from each combination protection scheme, and set as the first comparison combination protection scheme and the second comparison combination protection scheme respectively. Based on the protection cost and risk value corresponding to the first comparative combined protection scheme, and the protection cost and risk value corresponding to the second comparative combined protection scheme, determine the protection cost-effectiveness ratio between the first comparative combined protection scheme and the second comparative combined protection scheme High combined protection scheme, as a candidate combined protection scheme.
  • the protection cost and risk value corresponding to the combined protection scheme, and the protection cost and risk value corresponding to the second comparative combined protection scheme determine the combined protection with higher protection cost performance among the first comparative combined protection scheme and the second comparative combined protection scheme scheme, as a candidate combined protection scheme.
  • the candidate combination protection scheme finally determined is determined as the combination protection scheme with the most cost-effective protection.
  • the following methods when determining the combined protection scheme with higher protection cost performance in the first comparative combined protection scheme and the second comparative combined protection scheme, the following methods can be used:
  • the first comparative combined protection scheme is determined as a combined protection scheme with higher protection cost performance among the first comparative combined protection scheme and the second comparative combined protection scheme.
  • the second comparative combined protection scheme is determined as a combined protection scheme with higher protection cost performance among the first comparative combined protection scheme and the second comparative combined protection scheme.
  • each combined protection scheme may be divided into different information security levels according to the risk value of each combined protection scheme.
  • the classification method of information security level can be as follows:
  • the maximum risk value R into N parts in equal proportions, and obtain N risk value ranges, each of which corresponds to an information security level.
  • the lower limit of the risk value range corresponding to the i-th information security level is capped at
  • the boundary value can be divided into the risk value range corresponding to the higher information security level. The higher the information security level, the smaller the corresponding risk value.
  • the information security level corresponding to the risk value range to which the risk value of the combined protection scheme belongs is determined, and the combined protection scheme is divided into the information security level.
  • a combined protection scheme with the most cost-effective protection can be calculated for each information security level.
  • corresponding combined protection schemes can be given for connected vehicles with different information security requirements.
  • the method of selecting the combination protection with the most cost-effective protection for each combination protection scheme in each information security level is the same as the method of selecting the combination protection scheme with the most cost-effective protection from the remaining combination protection after the elimination process in the above step 404. are the same and will not be repeated here.
  • each combined protection solution is composed of an attack path protection solution corresponding to each attack path in the multiple attack paths. Then, in these combined protection schemes, combined with the risk value and protection cost of the combined protection scheme, a combined protection scheme with better protection cost performance is selected. It can be seen that, in this application, instead of determining the protection scheme for each attack path individually, a combined protection scheme corresponding to multiple attack paths is determined at one time, which is more efficient. In addition, in this application, when determining the combined protection, the risk value and the protection cost are comprehensively considered, so that the finally determined combined protection scheme is cost-effective and can effectively avoid cost waste.
  • an embodiment of the present application also provides an apparatus for determining a protection solution for an attack path.
  • the apparatus may be computer equipment.
  • the apparatus includes a combination module 610 , a calculation module 620 and a selection module 630.
  • the combination module 610 is configured to determine multiple combined protection schemes based on the attack path protection schemes corresponding to each of the multiple attack paths respectively, wherein the combined protection scheme is composed of the corresponding attack paths in the multiple attack paths. It consists of an attack path protection scheme; specifically, the combination module 610 is used to execute the above steps 401 and 402.
  • the calculation module 620 is used to determine the protection cost corresponding to each combined protection scheme, and to determine the corresponding risk value of each combined protection scheme; specifically, the calculation module 620 is used to perform the above step 403.
  • the selection module 630 is configured to determine a combined protection scheme that satisfies the protection cost-effectiveness condition based on the protection cost and risk value corresponding to each combined protection scheme. Specifically, the selection module 630 is configured to execute the above step 404 .
  • the apparatus further includes:
  • the grading module is used to determine the information security level to which each combined protection scheme belongs based on the risk value corresponding to each combined protection scheme and the risk value range corresponding to each information security level;
  • Selection module 630 for:
  • a combined protection scheme belonging to the information security level that meets the protection cost-effectiveness condition is determined.
  • the selection module 630 is used to:
  • the division module is also used to:
  • R is the risk value corresponding to the connected car when the combined protection scheme is not implemented
  • N is the level of the information security level.
  • the computing module 620 is used to:
  • the sum of the protection costs corresponding to the protection schemes of each attack path included in each combined protection scheme is calculated as the protection cost corresponding to each combined protection scheme.
  • the computing module 620 is used to:
  • the sum of the risk values corresponding to the protection schemes of each attack path included in each combined protection scheme is calculated as the risk value corresponding to each combined protection scheme.
  • each combined protection solution is composed of an attack path protection solution corresponding to each attack path in the multiple attack paths. Then, in these combined protection schemes, combined with the risk value and protection cost of the combined protection scheme, a combined protection scheme with better protection cost performance is selected. It can be seen that, in this application, instead of determining the protection scheme for each attack path individually, a combined protection scheme corresponding to multiple attack paths is determined at one time, which is more efficient. In addition, in this application, when determining the combined protection, the risk value and the protection cost are comprehensively considered, so that the finally determined combined protection scheme is cost-effective and can effectively avoid cost waste.
  • the device for determining an attack protection scheme provided in the above embodiment determines the protection scheme
  • only the division of the above functional modules is used as an example.
  • Module completion that is, dividing the internal structure of the computer device into different functional modules to complete all or part of the functions described above.
  • the device for determining a protection scheme provided in the above embodiment and the method for determining a protection scheme belong to the same concept, and the specific implementation process is detailed in the method embodiment, which will not be repeated here.
  • an embodiment of the present application provides a schematic diagram of a computer device 700 .
  • the computer device 700 includes at least one processor 701 , internal connections 702 , memory 703 and at least one transceiver 704 .
  • the computer device 700 is an apparatus with a hardware structure, which can be used to implement the functional modules in the apparatus shown in FIG. 6 .
  • the computing module 620 in the apparatus shown in FIG. 6 can be implemented by calling the code in the memory 703 by the at least one processor 701, and the combining module 610 and the selecting module 630 can also be implemented by the at least one processing
  • the processor 701 invokes the code in the memory 703 for implementation.
  • processor 701 may be a general-purpose central processing unit (central processing unit, CPU), network processor (network processor, NP), microprocessor, application-specific integrated circuit (application-specific integrated circuit, ASIC) , or one or more integrated circuits used to control the execution of the program of this application.
  • CPU central processing unit
  • NP network processor
  • ASIC application-specific integrated circuit
  • the internal connection 702 described above may include a path to transfer information between the aforementioned components.
  • the internal connection 702 is a single board or a bus or the like.
  • the above transceiver 704 is used to communicate with other devices or communication networks.
  • the above-mentioned memory 703 may be a read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, a random access memory (random access memory, RAM) or other types of storage devices that can store information and instructions.
  • ROM read-only memory
  • RAM random access memory
  • Types of dynamic storage devices which can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM), or other optical storage, CD-ROM storage (including compact discs, laser discs, compact discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being accessed by Any other medium accessed by the computer, but not limited to this.
  • the memory can exist independently and be connected to the processor through a bus.
  • the memory can also be integrated with the processor.
  • the memory 703 is used for storing the application program code for executing the solution of the present application, and the execution is controlled by the processor 701 .
  • the processor 701 is configured to execute the application program code stored in the memory 703, and cooperate with at least one transceiver 704, so that the computer device 700 realizes the functions of the present application.
  • the processor 701 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 7 .
  • the computer device 700 may include multiple processors. Each of these processors can be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • Embodiments of the present application further provide a computer-readable storage medium, where instructions or programs are stored in the computer-readable storage medium, and the instructions or programs are loaded and executed by a processor to implement the determination of the protection scheme provided by the embodiments of the present application. method.
  • Embodiments of the present application also provide a computer program product, where the computer program product includes instructions, and the instructions are loaded and executed by a processor to implement the method for determining a protection scheme provided by the embodiments of the present application.
  • An embodiment of the present application also provides a chip system, the chip system includes a processor and an interface; the interface is used to obtain a program or an instruction; the processor is used to call the program or instruction to implement or support a terminal computer device to implement the implementation of the present application
  • the example provides a method for determining the protection scheme.
  • An embodiment of the present application further provides a chip system, where the chip system includes at least one processor, and is configured to support implementing the functions involved in the method for determining a protection scheme provided by the embodiment of the present application, for example, to process the functions involved in the above method. data and/or information.
  • the system-on-a-chip further includes a memory for storing program instructions and data, the memory being located within the processor or outside the processor.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • An embodiment of the present application further provides an apparatus for determining a protection scheme, the apparatus includes at least one processor and a communication interface, where the communication interface is used for sending and/or receiving data, and the at least one processor is used for calling at least one memory A computer program stored in the device, so that the device implements the method for determining a protection solution for an attack path provided by the embodiments of the present application.
  • the computer program product includes one or more computer instructions, and when the computer program instructions are loaded and executed on a device, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, optical fiber, digital subscriber line) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that the device can access, or a data storage device such as a server, data center, or the like that includes an integration of one or more available media.
  • the usable medium may be a magnetic medium (such as a floppy disk, a hard disk, and a magnetic tape, etc.), an optical medium (such as a digital video disk (Digital Video Disk, DVD), etc.), or a semiconductor medium (such as a solid-state disk, etc.).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请公开了一种确定防护方案的方法、装置、设备及计算机可读存储介质,属于网联汽车安全技术领域。方法包括基于多个攻击路径中每个攻击路径分别对应的攻击路径防护方案,确定多个组合防护方案,其中,组合防护方案由所述多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成。确定每个组合防护方案对应的防护成本,并确定每个组合防护方案对应的风险值。基于每个组合防护方案对应的防护成本和风险值,确定满足防护性价比条件的组合防护方案。通过本申请,可以更加高效的选择出防护方案,且还可以减少不必要的成本浪费。

Description

确定防护方案的方法、装置、设备及计算机可读存储介质 技术领域
本申请涉及网联汽车安全技术领域,特别涉及一种确定防护方案的方法、装置、设备及计算机可读存储介质。
背景技术
随着网联汽车的不断普及,网联汽车的信息安全也越来越被人们所重视。目前,针对网联汽车的信息安全攻击,通常是按照攻击路径进行攻击,使网联汽车产生较大的信息安全风险。其中,攻击路径由至少一个主体组成,主体可以为网联汽车中的车载通信盒子(telematics box,T-Box)、网关(gateway,GW)、电子控制单元(electronic control unit,ECU)等节点中的应用程序、操作系统等。
目前,技术人员对于每个可能的攻击路径均给出了至少一种防护方案,对于同一攻击路径来说,不同防护方案的防护程度不同,可以满足不同的需求。在网联汽车开发阶段,开发人员结合自己的经验针对每种攻击路径选择对应的一种防护方案。
在选择防护方案后,开发人员需要对该防护方案进行试验以确定是否满足需求,如果不满足则要重新选择,这样,在选择每个攻击路径的防护方案时均需反复尝试,选择效率较低。
发明内容
本申请实施例提供了一种确定防护方案的方法、装置、设备及计算机可读存储介质,可以更加高效的确定出整体防护性价比更好的防护方案,且还可以降低不必要的成本浪费,技术方案如下:
第一方面,提供了一种确定防护方案的方法,该方法包括:
基于每个攻击路径分别对应的攻击路径防护方案,确定多个组合防护方案,其中,组合防护方案由多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成。确定每个组合防护方案对应的防护成本,并确定每个组合防护方案对应的风险值。基于每个组合防护方案对应的防护成本和风险值,确定满足防护性价比条件的组合防护方案。
在本申请实施例所示的方案中,先确定出多个组合防护方案,每个组合防护方案由多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成。然后,在这些组合防护方案中结合组合防护方案的风险值和防护成本,选择出防护性价比较好的组合防护方案。可见,在本申请中并非对于每条攻击路径单独确定其防护方案,而是一次确定出对应多条攻击路径的组合防护方案,效率更高。此外,在本申请中,确定组合防护时,综合考虑了风险值和防护成本,使得最终确定出的组合防护方案是性价比较好的,可以有效降低成本的浪费。
另外,对于多个攻击路径可能存在相同的主体,例如,第一攻击路径包括的主体为A、B、C,第二攻击路径包括的主体的A、D。在某种实施方式中,单独确定每条攻击路径的防护方案,对于上述第一攻击路径来说,可能选择在第一攻击路径对应的各攻击路径防护方案中选择出性价比较好的攻击路径防护方案是B1(主体B的主体防护措施)加C1(主体C的主体 防护措施),对于第二攻击路径来说,可能选择在第二攻击路径对应的各攻击路径防护方案中选择出性价比较好的攻击路径防护方案是D1(主体D的主体防护措施)。而攻击路径防护方案A1(主体A的主体防护措施)无论对于第一攻击路径还是对于第二攻击路径,都并未是性价比最好的防护方案。但是,A1即可以防护第一攻击路径也可以防护第二攻击路径,且其防护成本要小于B1+C1+D1,对第一条攻击路径来说,A1的防护效果好于B1+C1;对第二条攻击路径来说,A1的防护效果好于D1。那么,在对于第一攻击路径和第二攻击路径一起选择性价比最好的组合防护方案时,A1将会被选出,作为性价比最好的组合防护方案。显然,对于第一攻击路径和第二攻击路径来说,选择A1要比选择B1+C1+D1性价比高。
在一种可能的实现方式中,还可以将各组合防护方案划分到不同的信息安全等级下,并在每个信息安全等级中选择出满足防护性价比条件的组合防护方案,这样,可以更好的适应不同信息安全需求的网联汽车。具体的,基于每个组合防护方案对应的风险值,以及各信息安全等级对应的风险值范围,确定每个组合防护方案所属的信息安全等级。对于每个信息安全等级,基于属于该信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于该信息安全等级的满足防护性价比条件的组合防护方案。
在一种可能的实现方式中,防护性价比条件为防护性价比最高。
在一种可能的实现方式中,可以对最大风险值R等比划分为N份,得到N个风险值范围,每个风险值范围对应一个信息安全等级。其中,第i个信息安全等级对应的风险值范围的下限为
Figure PCTCN2021084518-appb-000001
上限为
Figure PCTCN2021084518-appb-000002
对于边界值可以划分到较高的信息安全等级对应的风险值范围。信息安全等级越高对应的风险值越小。
在一种可能的实现方式中,确定每个组合防护方案对应的防护成本的方法可以如下:
计算每个组合防护方案包括的各攻击路径的防护方案对应的防护成本之和,作为每个组合防护方案对应的防护成本。
在一种可能的实现方式中,确定每个组合防护方案对应的风险值的方法可以如下:
计算每个组合防护方案包括的各攻击路径的防护方案对应的风险值之和,作为每个组合防护方案对应的风险值。
在一种可能的实现方式中,本申请实施例提供的技术方案应用于网联汽车领域。
在网联汽车开发阶段,或者在网联汽车投入使用后,出于网联汽车安全的考虑,需要对网联汽车中存在的威胁网联汽车安全的攻击路径进行防护。此时,可以采用本申请实施例提供的方法针对威胁网联汽车安全的攻击路径,选择防护方案。具体的,基于网联汽车的每个攻击路径分别对应的攻击路径防护方案,确定网联汽车的多个组合防护方案。然后,确定网联汽车的每个组合防护方案对应的防护成本,并确定每个组合防护方案对应的风险值。最后,基于网联汽车的每个组合防护方案对应的防护成本和风险值,确定网联汽车的满足防护性价比条件的组合防护方案。
此外,在选择出网联汽车的满足防护性价比的组合防护方案后,可以将确定的组合防护方案的相关信息进行显示。其中,相关信息可以包括组合防护方案的具体实施步骤、预计防护效果、防护成本、注意事项等等。这样,技术人员可以清晰的获知组合防护方案的相关信息,进而技术人员可以基于组合防护方案的相关信息在网联汽车中实施该组合防护方案,以对网联汽车的攻击路径进行防护。
第二方面,提供了一种确定防护方案的装置,该装置用于执行上述第一方面所述的方法。具体地,该装置包括用于执行上述第一方面所述的方法的模块。
第三方面,提供了一种计算机设备,该计算机设备包括处理器和存储器,其中:
所述存储器存储指令,所述处理器执行所述指令,以实现如上述第一方面所述的确定防护方案的方法。
第四方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,所述指令由处理器加载并执行,以实现如上述第一方面所述的确定防护方案的方法。
第五方面,提供了一种芯片系统,该芯片系统包括处理器和接口;
接口用于获取程序或指令;
处理器用于调用所述程序或指令,以实现或者支持终端计算机设备实现如上述第一方面以及第一方面中任意一种可能的实施方式所述的确定防护方案的方法。
第六方面,提供了一种计算机程序产品,该计算机程序产品中包括有指令,所述指令由处理器加载并执行,以实现如第一方面以及第一方面中任意一种可能的实施方式所描述的方法。
第七方面,提供了一种确定防护方案的装置,该装置包括至少一个处理器和通信接口,所述通信接口用于发送和/或接收数据,所述至少一个处理器用于调用至少一个存储器中存储的计算机程序,以使得所述装置实现如第一方面以及第一方面中任意一种可能的实施方式所描述的方法。
第八方面,提供了一种芯片系统,该芯片系统包括至少一个处理器,用于支持实现上述第一方面以及第一方面中任意一种可能的实施方式中所涉及的功能,例如,接收或处理上述方法中所涉及的数据和/或信息。
在一种可能的设计中,该芯片系统还包括存储器,该存储器,用于保存程序指令和数据,存储器位于处理器之内或处理器之外。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
附图说明
图1是本申请实施例提供的一种网联汽车电子电气架构图;
图2是本申请实施例提供的一种节点级攻击路径示意图;
图3是本申请实施例提供的一种主体级攻击路径和节点级攻击路径的关系示意图;
图4是本申请实施例提供的一种确定防护方案的方法流程图;
图5是本申请实施例提供的一种主体的脆弱点示意图;
图6是本申请实施例提供的一种确定防护方案的装置结构示意图;
图7是本申请实施例提供的一种计算机设备的结构示意图。
具体实施方式
本申请实施例提供了一种确定防护方案的方法,该方法可以由计算机设备实现,其中,计算机设备可以为笔记本电脑(Laptop)、台式电脑、平板电脑(pad)等。在本申请实施例中,计算机设备可以一次确定出对应多条攻击路径的组合防护方案,效率更高。此外,在本申请实施例中,还综合考虑了组合防护方案的风险值和防护成本,使得最终确定出的组合防护方案是性价比较好的,可以有效避免成本的浪费。
上述防护方案可以部署在网联汽车中,参见图1示出了一种可能的网联汽车电子电气架构图。在图1中,车载通信盒子(telematics box,T-BOX)用于和外界进行通信,网关(gateway,GW)用于执行协议转换、数据交换等。除T-Box和GW以外的部分,可以包括动力域、底盘域、车身域和信息娱乐域和高级驾驶辅助系统(Advanced Driver Assistance System,ADAS)。每个域包括相应的域控制器(Domain Controller,DC)、控制器局域网络(Controller Area Network,CAN)以及至少一个电子控制单元(Electronic Control Unit,ECU)。
在图1中,动力域包括DC1、动力总成控制器局域网络(Powertrain CAN,PT CAN)、ECU1、ECU2等,其中,ECU可以为发动机控制模块(Engine Control Module,ECM)、电池管理系统(Battery Management System,BMS)等。底盘域包括DC2、底盘控制器局域网络(Chassis CAN,CH CAN)、ECU3、ECU4等,其中,ECU可以为防抱死制动系统(Antilock Brake System,ABS)、车身电子稳定系统(Electronic Stability Program,ESP)等。车身域包括DC3、车身控制器局域网络(Body CAN)、车身控制模块(Body Control Module,BCM)ECU5、ECU6等,其中,ECU可以为胎压监测系统(Tire Pressure Monitoring System,TPMS)、全景式监控影像系统(Around View Monitor,AVM)等。信息娱乐域包括DC4、信息娱乐控制器局域网络(information CAN,info CAN)、ECU7、车载信息娱乐(In-Vehicle Infotainment,IVI)系统等,其中,ECU可以为组合仪表(Instrument Pack,IPK)等。
为了便于对本申请实施例的理解,下面先对本申请中的攻击路径进行说明。
从硬件层面来说,攻击路径为节点级攻击路径,从硬件中具体被攻击的主体来说,攻击路径为主体级攻击路径。
每个节点级攻击路径中包括至少一个节点,节点可以为网联汽车中的硬件模块,如T-Box、GW、DC、ECU等。例如,攻击目的是使网联汽车的远光灯开启,则对应的节点级攻击路径可以如图2所示,即先攻击T-Box,再攻击GW,再攻击车身域的DC,最后攻击控制远光灯的ECU。
参见图3,示出了一种可能的节点级攻击路径和主体级攻击路径之间的关系。在图3中,示出了一个节点级攻击路径,该节点级攻击路径包括的节点依次为T-Box、GW、DC1、ECU1,其中,T-Box包括多个主体,在这多个主体中主体1和主体2为被攻击的主体,GW包括多个主体,在这多个主体中主体3和主体4为被攻击的主体,DC1包括多个主体,主体5和主体6为被攻击的主体,ECU1包括多个主体,在这多个主体中主体7为被攻击的主体。对应于该节点级攻击路径,图3还示出了三个主体级攻击路径,其中,第一个主体级攻击路径包 括的主体依次为主体2、主体1、主体3、主体5、主体7,第二个主体级攻击路径包括的主体依次为主体1、主体4、主体6、主体7,第三个主体级攻击路径包括的主体依次为主体2、主体3、主体5、主体7。
根据攻击路径包括的节点数量,可以分为单节点攻击路径和多节点攻击路径。其中,单节点攻击路径指在攻击路径中只包括一个节点的攻击路径,即攻击该一个节点即可产生风险。多节点攻击路径指在攻击路径中包括多个节点的攻击路径。
根据攻击路径中ECU的数量,可以分为无ECU攻击路径、单ECU攻击路径和多ECU攻击路径。
参见图4,本申请实施例提供了一种确定防护方案的方法,该方法的处理流程可以包括如下步骤:
步骤401、确定对网联汽车进行信息安全攻击的多个攻击路径中每种攻击路径对应的攻击路径防护方案。
其中,一个攻击路径对应的攻击路径防护方案由该攻击路径包括的至少一个主体对应的主体防护措施组成。一个攻击路径可以对应有至少一个攻击路径防护方案。主体防护措施可以为主体中脆弱点或漏洞的补丁代码,也可以为用于防护脆弱点或漏洞的硬件模块等。
参见图5所示,主体1对应有两个主体防护措施,在未实施任何主体防护措施时,主体1有四个脆弱点或漏洞,对主体1实施主体防护措施1后,主体1还剩一个脆弱点或漏洞,对主体1实施主体防护措施2后,主体1还剩3个脆弱点或漏洞。
在实施中,技术人员可以预先确定出网联汽车可能存在的k个攻击路径,k为大于1的整数。并且对于各攻击路径中的主体,技术人员可以给出相应的主体防护措施,每个主体可以对应有至少一种主体防护措施。
对于一个攻击路径来说,该攻击路径的一个攻击路径防护方案由该攻击路径所包括的每个主体分别对应的最多一个主体防护措施组成。也即是,在攻击路径的一个攻击路径防护方案中,对于该攻击路径的每个主体,可以对应一个主体防护措施,也可以不实施主体防护措施。一个攻击路径对应的攻击路径防护方案的数量可以如下公式表示:
Figure PCTCN2021084518-appb-000003
其中,Y j是k个攻击路径中的第j个攻击路径对应的攻击路径防护方案的数量。N i是第j个攻击路径中的第i个主体对应的主体防护措施的数量。N i+1表示对于第i个主体可以选择的主体防护措施有N i个,还可以选择不对该第i个主体实施主体防护措施。m是第j个攻击路径包括的主体的数量,C为排列组合符号。
步骤402、基于每个攻击路径分别对应的攻击路径防护方案,确定多个组合防护方案。
其中,组合防护方案由多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成。此处需要说明的是,对于一个攻击路径来说,该攻击路径对应的攻击路径防护方案包括不对该攻击路径实施防护方案。
在实施中,多个攻击路径防护方案可以组成一个组合防护方案,那么,对于k个攻击路径,组合防护方案的数量可以由以下公式计算表示:
Figure PCTCN2021084518-appb-000004
其中,k为攻击路径的数量,Y j是k个攻击路径中的第j个攻击路径对应的攻击路径防护方案的数量。
在一种可能的实现方式中,在上述S种组合防护方案中,如果某个组合防护方案中对应同一主体包括了多个可实施的主体防护措施,那么,可以将该组合防护方案剔除。
例如,在某组合防护方案中,第一攻击路径防护方案中包括有对应第一主体的主体防护措施,第二攻击路径防护方案中也包括有对应上述第一主体的主体防护措施。而在实际实施时,对于第一攻击路径防护方案中对应上述第一主体的主体防护措施和第二攻击路径防护方案中对应上述第一主体的主体防护措施只会实施一个。那么,该组合防护方案最后便不会被采用,可以将该组合防护方案剔除。
假设对应相同包括多个主体防护措施的组合防护方案数量有X,那么,剔除后剩余的组合防护方案数量为S′=S-X。
步骤403、确定每个组合防护方案对应的防护成本,并确定每个组合防护方案对应的风险值。
其中,每个组合防护方案指上述剔除后剩余的组合防护方案中的每个组合防护方案。
在实施中,对于每个组合防护方案的防护成本,可以先计算该组合防护方案包括的各攻击路径防护方案的防护成本,再将各攻击路径防护方案的防护成本相加,得到该组合防护方案的防护成本。具体的,对于某组合防护方案的防护成本可以由如下公式计算得到:
Figure PCTCN2021084518-appb-000005
其中,CS′为组合防护方案的防护成本,k为该组合防护方案中包括的攻击路径防护方案数量,也即是攻击路径的数量,C j为该组合防护方案中第j个攻击路径防护方案的防护成本。
对于第j个攻击路径防护方案的防护成本可以由以下公式计算得到:
Figure PCTCN2021084518-appb-000006
其中,m为该第j个攻击路径包括的主体数量,c i为第i个主体对应的防护成本,如果在该第j个攻击路径防护方案中,对于该第i个主体实施主体防护措施,则c i为实施该主体防护措施所产生的防护成本,如果在该第j个攻击路径防护方案中,对于该第i个主体不实施主体防护措施,则c i为0。主体防护措施的防护成本是指实施该主体防护措施所要付出的人力、物力等的量化值,可以由技术人员根据实验测试得到。
对于每个组合防护方案的风险值,可以先计算该组合防护方案包括的各攻击路径防护方案的风险值,再将各攻击路径防护方案的风险值相加,得到该组合防护方案的风险值。具体的,对于某组合防护方案的风险值可以由如下公式计算得到:
Figure PCTCN2021084518-appb-000007
其中,RS′为组合防护方案的风险值,k为该组合防护方案中包括的攻击路径防护方案数量,也即是攻击路径的数量,R j为该组合防护方案中第j个攻击路径防护方案的风险值。
对于第j个攻击路径防护方案的风险值可以由以下公式计算得到:
Figure PCTCN2021084518-appb-000008
其中,m为该第j个攻击路径包括的主体数量,r i为该第j个攻击路径中的第i个主体对应的攻击概率。I为攻击路径的影响结果量化值。r i和I均为已知量,可以由技术人员根据实验测试得到。下面对于r i的取值情况进行说明:
情况一、如果在该第j个攻击路径的攻击路径防护方案中,该第i个主体实施主体防护措施,则将实施该主体防护措施后的该第i个主体被攻击成功的概率作为r i
情况二、如果在该第j个攻击路径的攻击路径防护方案中,该第i个主体不实施主体防护措施,且在该组合防护方案中不存在对应该第i个主体的主体防护措施,则将该第i个主体不实施任何主体防护措施时对应的攻击概率作为r i
情况三、如果在该第j个攻击路径的攻击路径防护方案中,该第i个主体不实施主体防护措施,且在该组合防护方案中存在对应该第i个主体的主体防护措施,则将实施该主体防护措施后该第i个主体被攻击成功的概率作为r i
步骤404、基于每个组合防护方案对应的防护成本和风险值,确定满足防护性价比条件的组合防护方案。
在实施中,在上述剔除处理后剩余的组合防护中,选择出防护性价比最好的组合防护方案,具体的,选择的方法可以有多种,下面列举几种进行说明:
方法一:
将各组合防护方案按照对应的风险值大小降序排列,将排列后的第一个组合防护方案设置为第一对比组合防护方案,将排列后的第二个组合防护方案设置为第二对比组合防护方案。基于第一对比组合防护方案对应的防护成本和风险值,以及第二对比组合防护方案对应的防护成本和风险值,确定第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案,作为候选组合防护方案。
自排列后的第三个组合防护方案开始,按排列顺序逐个获取组合防护方案,每获取一个组合防护方案,将最新确定的候选组合防护方案设置第一对比组合防护方案,将当前获取的组合防护方案作为第二对比组合防护方案,基于第一对比组合防护方案对应的防护成本和风险值,以及第二对比组合防护方案对应的防护成本和风险值,确定第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案,作为候选组合防护方案。
将最后确定的候选组合防护方案,确定为防护性价比最高的组合防护方案。
在该方法一中,确定第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案时,可以采用如下方法:
如果第一对比组合防护方案对应的防护成本大于第二对比组合防护方案对应的防护成本,则将第二对比组合防护方案确定为第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案。
如果第一对比组合防护方案对应的防护成本小于第二对比组合防护方案对应的防护成本,则计算第二对比组合防护方案相对于第一对比组合防护方案的成本增加率,并计算第二对比组合防护方案相对于第一对比组合防护方案的风险降低率。计算成本增加率和风险降低率的差值。
如果差值小于0,则将第二对比组合防护方案确定为所述第一对比组合防护方案和第二 对比组合防护方案中防护性价比较高的组合防护方案。
如果所述差值不小于0,则将第一对比组合防护方案确定为第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案。
方法二:
将各组合防护方案按照对应的风险值大小升序排列。将排列后的第一个组合防护方案设置为第一对比组合防护方案,将排列后的第二个组合防护方案设置为第二对比组合防护方案。基于第一对比组合防护方案对应的防护成本和风险值,以及第二对比组合防护方案对应的防护成本和风险值,确定第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案,作为候选组合防护方案。
自排列后的第三个组合防护方案开始,按排列顺序逐个获取组合防护方案,每获取一个组合防护方案,将最新确定的候选组合防护方案设置第一对比组合防护方案,将当前获取的组合防护方案作为第二对比组合防护方案,基于第一对比组合防护方案对应的防护成本和风险值,以及第二对比组合防护方案对应的防护成本和风险值,确定第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案,作为候选组合防护方案。
将最后确定的候选组合防护方案,确定为防护性价比最高的组合防护方案。
在该方法二中,确定第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案时,可以采用如下方法:
如果第一对比组合防护方案对应的防护成本小于第二对比组合防护方案对应的防护成本,则将第一对比组合防护方案确定为所述第一对比组合防护方案和所述第二对比组合防护方案中防护性价比较高的组合防护方案。
如果第一对比组合防护方案对应的防护成本大于所述第二对比组合防护方案对应的防护成本,则计算第一对比组合防护方案相对于第二对比组合防护方案的成本增加率,并计算第一对比组合防护方案相对于第二对比组合防护方案的风险降低率。计算成本增加率和风险降低率的差值。
如果差值小于0,则将第一对比组合防护方案确定为第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案。
如果所述差值不小于0,则将第二对比组合防护方案确定为第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案。
方法三、
在各组合防护方案中随机选择两个组合防护方案,分别设置为第一对比组合防护方案和第二对比组合防护方案。基于第一对比组合防护方案对应的防护成本和风险值,以及第二对比组合防护方案对应的防护成本和风险值,确定第一对比组合防护方案和所述第二对比组合防护方案中防护性价比较高的组合防护方案,作为候选组合防护方案。
逐个获取剩余的组合防护方案,每获取一个组合防护方案,将最新确定的候选组合防护方案设置第一对比组合防护方案,将当前获取的组合防护方案作为第二对比组合防护方案,基于第一对比组合防护方案对应的防护成本和风险值,以及第二对比组合防护方案对应的防护成本和风险值,确定第一对比组合防护方案和所述第二对比组合防护方案中防护性价比较高的组合防护方案,作为候选组合防护方案。
将最后确定的候选组合防护方案,确定为防护性价比最高的组合防护方案。
在该方法三中,确定第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案时,可以采用如下方法:
计算第一对比组合防护方案相对于所述第二对比组合防护方案的成本增加率,并计算所述第一对比组合防护方案相对于所述第二对比组合防护方案的风险降低率。计算成本增加率和所述风险降低率的差值。
如果差值小于0,则将第一对比组合防护方案确定为第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案。
如果差值大于0,则将第二对比组合防护方案确定为第一对比组合防护方案和第二对比组合防护方案中防护性价比较高的组合防护方案。
在一种可能的实现方式中,在选择满足防护性价比条件的组合防护方案之前,可以先根据各组合防护方案的风险值,将各组合防护方案划分到不同的信息安全等级中。
信息安全等级的划分方法可以如下:
先对最大风险值R等比划分为N份,得到N个风险值范围,每个风险值范围对应一个信息安全等级。其中,第i个信息安全等级对应的风险值范围的下限为
Figure PCTCN2021084518-appb-000009
上限为
Figure PCTCN2021084518-appb-000010
边界值可以划分到较高的信息安全等级对应的风险值范围。信息安全等级越高对应的风险值越小。
然后,对于每个组合防护方案,判断该组合防护方案的风险值所属的风险值范围对应的信息安全等级,并将该组合防护方案划分至该信息安全等级。
在将组合防护方案划分到相应的信息安全等级后,可以对于每个信息安全等级计算出一个防护性价比最高的组合防护方案。这样,可以针对不同信息安全要求的网联汽车,给出相应的组合防护方案。此处,对于每个信息安全等级中的各组合防护方案选择防护性价比最高的组合防护的方法,与上述步骤404在在剔除处理后剩余的组合防护中选择出防护性价比最高的组合防护方案的方法相同,在此不再赘述。
在本申请实施例所示的方案中,先确定出多个组合防护方案,每个组合防护方案由多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成。然后,在这些组合防护方案中结合组合防护方案的风险值和防护成本,选择出防护性价比较好的组合防护方案。可见,在本申请中并非对于每条攻击路径单独确定其防护方案,而是一次确定出对应多条攻击路径的组合防护方案,效率更高。此外,在本申请中,确定组合防护时,综合考虑了风险值和防护成本,使得最终确定出的组合防护方案是性价比较好的,可以有效避免成本的浪费。
基于相同的技术构思,本申请实施例还提供了一种确定攻击路径的防护方案的装置,该装置可以为计算机设备,如图6所示,该装置包括组合模块610、计算模块620和选择模块630。
组合模块610,用于基于多个攻击路径中的每个攻击路径分别对应的攻击路径防护方案,确定多个组合防护方案,其中,组合防护方案由多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成;具体的,该组合模块610用于执行上述步骤401和402。
计算模块620,用于确定每个组合防护方案对应的防护成本,并确定每个组合防护方案 对应的风险值;具体的,该计算模块620用于执行上述步骤403。
选择模块630,用于基于每个组合防护方案对应的防护成本和风险值,确定满足防护性价比条件的组合防护方案。具体的,该选择模块630用于执行上述步骤404。
在一种可能的实现方式中,装置还包括:
分级模块,用于基于每个组合防护方案对应的风险值,以及各信息安全等级对应的风险值范围,确定每个组合防护方案所属的信息安全等级;
选择模块630,用于:
对于每个信息安全等级,基于属于信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于信息安全等级的满足防护性价比条件的组合防护方案。
在一种可能的实现方式中,选择模块630,用于:
基于属于信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于信息安全等级的防护性价比最高的组合防护方案。
在一种可能的实现方式中,划分模块,还用于:
确定第i个信息安全等级对应的风险值范围的下限为
Figure PCTCN2021084518-appb-000011
上限为
Figure PCTCN2021084518-appb-000012
其中,R为未实施组合防护方案时网联汽车对应的风险值,N为信息安全等级的级数。
在一种可能的实现方式中,计算模块620,用于:
计算每个组合防护方案包括的各攻击路径的防护方案对应的防护成本之和,作为每个组合防护方案对应的防护成本。
在一种可能的实现方式中,计算模块620,用于:
计算每个组合防护方案包括的各攻击路径的防护方案对应的风险值之和,作为每个组合防护方案对应的风险值。
在本申请实施例所示的方案中,先确定出多个组合防护方案,每个组合防护方案由多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成。然后,在这些组合防护方案中结合组合防护方案的风险值和防护成本,选择出防护性价比较好的组合防护方案。可见,在本申请中并非对于每条攻击路径单独确定其防护方案,而是一次确定出对应多条攻击路径的组合防护方案,效率更高。此外,在本申请中,确定组合防护时,综合考虑了风险值和防护成本,使得最终确定出的组合防护方案是性价比较好的,可以有效避免成本的浪费。
需要说明的是:上述实施例提供的确定攻防护方案的装置在确定防护方案时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将计算机设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的确定防护方案的装置与确定防护方案的方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
参见图7,本申请实施例提供了一种计算机设备700示意图。该计算机设备700包括至少一个处理器701,内部连接702,存储器703以及至少一个收发器704。
该计算机设备700是一种硬件结构的装置,可以用于实现图6所示的装置中的功能模块。例如,本领域技术人员可以想到图6所示的装置中的计算模块620可以通过该至少一个处理器701调用存储器703中的代码来实现,组合模块610和选择模块630也可以通过该至少一 个处理器701调用存储器703中的代码来实现。
可选的,上述处理器701可以是一个通用中央处理器(central processing unit,CPU),网络处理器(network processor,NP),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。
上述内部连接702可包括一通路,在上述组件之间传送信息。可选的,内部连接702为单板或总线等。
上述收发器704,用于与其他设备或通信网络通信。
上述存储器703可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器703用于存储执行本申请方案的应用程序代码,并由处理器701来控制执行。处理器701用于执行存储器703中存储的应用程序代码,以及配合至少一个收发器704,从而使得该计算机设备700实现本申请中的功能。
在具体实现中,作为一种实施例,处理器701可以包括一个或多个CPU,例如图7中的CPU0和CPU1。
在具体实现中,作为一种实施例,该计算机设备700可以包括多个处理器。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令或程序,指令或程序由处理器加载并执行,以实现本申请实施例提供的确定防护方案的方法。
本申请实施例还提供了一种计算机程序产品,该计算机程序产品中包括指令,指令由处理器加载并执行,以实现本申请实施例提供的确定防护方案的方法。
本申请实施例还提供了一种芯片系统,该芯片系统包括处理器和接口;接口用于获取程序或指令;处理器用于调用所述程序或指令,以实现或者支持终端计算机设备实现本申请实施例提供的确定防护方案的方法。
本申请实施例还提供了一种芯片系统,该芯片系统包括至少一个处理器,用于支持实现本申请实施例提供的确定防护方案的方法中所涉及的功能,例如,处理上述方法中所涉及的数据和/或信息。
在一种可能的设计中,该芯片系统还包括存储器,该存储器,用于保存程序指令和数据, 存储器位于处理器之内或处理器之外。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
本申请实施例还提供了一种确定防护方案的装置,该装置包括至少一个处理器和通信接口,所述通信接口用于发送和/或接收数据,所述至少一个处理器用于调用至少一个存储器中存储的计算机程序,以使得所述装置实现如本申请实施例提供的确定攻击路径的防护方案的方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现,当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令,在设备上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴光缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是设备能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(如软盘、硬盘和磁带等),也可以是光介质(如数字视盘(Digital Video Disk,DVD)等),或者半导体介质(如固态硬盘等)。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的实施例,并不用以限制本申请,凡在本申请原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (17)

  1. 一种确定防护方案的方法,其特征在于,所述方法包括:
    基于多个攻击路径中的每个攻击路径分别对应的攻击路径防护方案,确定多个组合防护方案,其中,所述组合防护方案由所述多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成;
    确定每个组合防护方案对应的防护成本,并确定每个组合防护方案对应的风险值;
    基于所述每个组合防护方案对应的防护成本和风险值,确定满足防护性价比条件的组合防护方案。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    基于每个组合防护方案对应的风险值,以及各信息安全等级对应的风险值范围,确定每个组合防护方案所属的信息安全等级;
    所述基于每个组合防护方案对应的防护成本和风险值,确定满足防护性价比条件的组合防护方案,包括:
    对于每个信息安全等级,基于属于所述信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于所述信息安全等级的满足防护性价比条件的组合防护方案。
  3. 根据权利要求2所述的方法,其特征在于,所述基于属于所述信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于所述信息安全等级的满足防护性价比条件的组合防护方案,包括:
    基于属于所述信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于所述信息安全等级的防护性价比最高的组合防护方案。
  4. 根据权利要求2或3所述的方法,其特征在于,所述基于每个组合防护方案对应的风险值,以及各信息安全等级对应的风险值范围,确定每个组合防护方案所属的信息安全等级之前,所述方法还包括:
    确定第i个信息安全等级对应的风险值范围的下限为
    Figure PCTCN2021084518-appb-100001
    上限为
    Figure PCTCN2021084518-appb-100002
    其中,R为未实施组合防护方案时网联汽车对应的风险值,N为信息安全等级的级数。
  5. 根据权利要求1-4中任一项所述的方法,其特征在于,所述确定每个组合防护方案对应的防护成本,包括:
    计算每个组合防护方案包括的各攻击路径的防护方案对应的防护成本之和,作为每个组合防护方案对应的防护成本。
  6. 根据权利要求1-5中任一项所述的方法,其特征在于,所述确定每个组合防护方案对应的风险值,包括:
    计算每个组合防护方案包括的各攻击路径的防护方案对应的风险值之和,作为每个组合 防护方案对应的风险值。
  7. 一种确定防护方案的装置,其特征在于,所述装置包括:
    组合模块,用于基于多个攻击路径中的每个攻击路径分别对应的攻击路径防护方案,确定多个组合防护方案,其中,所述组合防护方案由所述多个攻击路径中每个攻击路径分别对应的一个攻击路径防护方案组成;
    计算模块,用于确定每个组合防护方案对应的防护成本,并确定每个组合防护方案对应的风险值;
    选择模块,用于基于每个组合防护方案对应的防护成本和风险值,确定满足防护性价比条件的组合防护方案。
  8. 根据权利要求9所述的装置,其特征在于,所述装置还包括:
    分级模块,用于基于每个组合防护方案对应的风险值,以及各信息安全等级对应的风险值范围,确定每个组合防护方案所属的信息安全等级;
    所述选择模块,用于:
    对于每个信息安全等级,基于属于所述信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于所述信息安全等级的满足防护性价比条件的组合防护方案。
  9. 根据权利要求8所述的装置,其特征在于,所述选择模块,用于:
    基于属于所述信息安全等级的各组合防护方案分别对应的防护成本和风险值,确定属于所述信息安全等级的防护性价比最高的组合防护方案。
  10. 根据权利要求8或9所述的装置,其特征在于,所述划分模块,还用于:
    确定第i个信息安全等级对应的风险值范围的下限为
    Figure PCTCN2021084518-appb-100003
    上限为
    Figure PCTCN2021084518-appb-100004
    其中,R为未实施组合防护方案时所述网联汽车对应的风险值,N为信息安全等级的级数。
  11. 根据权利要求7-10中任一项所述的装置,其特征在于,所述计算模块,用于:
    计算每个组合防护方案包括的各攻击路径的防护方案对应的防护成本之和,作为每个组合防护方案对应的防护成本。
  12. 根据权利要求7-11中任一项所述的装置,其特征在于,所述确计算模块,用于:
    计算每个组合防护方案包括的各攻击路径的防护方案对应的风险值之和,作为每个组合防护方案对应的风险值。
  13. 一种计算机设备,其特征在于,所述计算机设备包括处理器和存储器,其中:
    所述存储器存储指令,所述处理器执行所述指令,以实现如权利要求1至6中任一项所述的确定防护方案的方法。
  14. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,所述指令由处理器加载并执行,以实现如权利要求1至6中任一项所述的确定防护方案的方法。
  15. 一种芯片系统,其特征在于,所述芯片系统包括至少一个处理器,所述处理器用于支持实现如权利要求1至6中任一项所述的确定防护方案的方法。
  16. 根据权利要求15所述的芯片系统,其特征在于,所述芯片系统还包括存储器,所述存储器用于保存程序指令和数据,所述存储器位于所述处理器之内或所述处理器之外。
  17. 一种计算机程序产品,其特征在于,所述计算机程序产品中包括有指令,所述指令由处理器加载并执行,以实现如权利要求1至6中任一项所述的确定防护方案的方法。
PCT/CN2021/084518 2021-03-31 2021-03-31 确定防护方案的方法、装置、设备及计算机可读存储介质 WO2022205122A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202180001201.1A CN113228594B (zh) 2021-03-31 2021-03-31 确定防护方案的方法、装置、设备及计算机可读存储介质
PCT/CN2021/084518 WO2022205122A1 (zh) 2021-03-31 2021-03-31 确定防护方案的方法、装置、设备及计算机可读存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/084518 WO2022205122A1 (zh) 2021-03-31 2021-03-31 确定防护方案的方法、装置、设备及计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2022205122A1 true WO2022205122A1 (zh) 2022-10-06

Family

ID=77081359

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/084518 WO2022205122A1 (zh) 2021-03-31 2021-03-31 确定防护方案的方法、装置、设备及计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN113228594B (zh)
WO (1) WO2022205122A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146240A (zh) * 2018-07-03 2019-01-04 北京航空航天大学 一种面向智能网联车辆的信息安全风险评估方法及系统
CN109302380A (zh) * 2018-08-15 2019-02-01 全球能源互联网研究院有限公司 一种安全防护设备联动防御策略智能决策方法及系统
EP3783514A1 (en) * 2019-08-21 2021-02-24 Seculting SA A system and a method for automated cyber-security risk control

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010042979A1 (en) * 2008-10-13 2010-04-22 Swinburne University Of Technology Process and system for assessing network vulnerability
CN102810137A (zh) * 2012-06-13 2012-12-05 天津大学 软件安全开发中的可复用攻击模式的建立及复用方法
CN105681338B (zh) * 2016-03-04 2018-10-30 西北大学 漏洞利用成功概率计算方法及网络安全风险管理方法
CN109117637A (zh) * 2018-07-03 2019-01-01 北京航空航天大学 基于攻击树的智能网联车辆信息安全事件发生概率评估方法与系统
JP6995726B2 (ja) * 2018-09-26 2022-01-17 フォルシアクラリオン・エレクトロニクス株式会社 脆弱性評価装置、脆弱性評価システム及びその方法
IT201800021550A1 (it) * 2018-12-31 2020-07-01 Magneti Marelli Spa "Procedimento di protezione da attacchi informatici al veicolo e corrispondente dispositivo"
CN110460573B (zh) * 2019-07-08 2022-05-20 上海赫千电子科技有限公司 一种应用于汽车ecu安全升级管理系统及方法
CN110535863A (zh) * 2019-08-30 2019-12-03 北京先勤科技有限公司 一种车联网通信仿真方法、系统及平台和计算机可读存储介质
CN110855722A (zh) * 2020-01-16 2020-02-28 北京安博通科技股份有限公司 一种主机风险评估方法及装置
CN112087445A (zh) * 2020-09-04 2020-12-15 全球能源互联网研究院有限公司 一种融合业务安全的电力物联网安全脆弱性评估方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146240A (zh) * 2018-07-03 2019-01-04 北京航空航天大学 一种面向智能网联车辆的信息安全风险评估方法及系统
CN109302380A (zh) * 2018-08-15 2019-02-01 全球能源互联网研究院有限公司 一种安全防护设备联动防御策略智能决策方法及系统
EP3783514A1 (en) * 2019-08-21 2021-02-24 Seculting SA A system and a method for automated cyber-security risk control

Also Published As

Publication number Publication date
CN113228594A (zh) 2021-08-06
CN113228594B (zh) 2022-07-29

Similar Documents

Publication Publication Date Title
US11411681B2 (en) In-vehicle information processing for unauthorized data
EP4387175A1 (en) Chip, chip manufacturing method, and related apparatus
DE102019104531A1 (de) Anomalieerkennung in einem netzswerksbereichskontroller
CN111597040B (zh) 一种资源分配方法、装置、存储介质和电子设备
CN112422595B (zh) 车载系统安全保护方法及设备
CN111357242B (zh) 异常通信探测装置及其方法、计算机可读取的记录介质
EP3982587A1 (en) Authentication method, device, and system
CN113608483B (zh) 获取车辆信号值方法、电子设备及电子控制单元
WO2021017667A1 (zh) 业务数据的传输方法和装置
WO2022205122A1 (zh) 确定防护方案的方法、装置、设备及计算机可读存储介质
CN109639555B (zh) 链路层报文生成方法、链路层报文生成装置及终端设备
CN115378581A (zh) 一种认证方法、设备和系统
WO2022205132A1 (zh) 确定攻击路径的防护方案的方法和装置
CN116886260A (zh) 实验设备数据跨链传输方法及系统
CN112118275B (zh) 过载处理方法、物联网平台及计算机可读存储介质
CN115208590A (zh) 一种跨域通信系统、方法及存储介质
US20240048563A1 (en) Service access method and apparatus
WO2024016251A1 (zh) 一种日志上报方法及装置
CN114546927B (zh) 数据传输方法、核心、计算机可读介质、电子设备
CN110471702B (zh) 任务处理方法、装置、存储介质及计算机设备
CN116069478A (zh) 基于图神经网络的车载系统安全感知设计优化方法及设备
CN108027774A (zh) 用于自适应缓存管理的方法和装置
CN117544495A (zh) 配置车载网关的方法、装置、设备及存储介质
JP2008078924A (ja) Lan構成設計方法、lan構成設計プログラム、記録媒体、及びlan構成設計支援装置
CN114036235A (zh) 区块链系统及用于区块链系统的方法

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21933790

Country of ref document: EP

Kind code of ref document: A1