Saturday, April 21, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
ZTE's Nubia Red Gaming Phone Released
LG Display's OLED Smartphone Screens Still Not Ready For Apple
Nintendo Labo Kits Now Available
June's VLSI Symposium Focuses on Next Generation Transistor Technology and MRAM
Samsung Not Interested in Nokia's Health Unit
ZTE Says Company's Survival at Risk
2nd Generation AMD Ryzen Desktop Processors Arrive to Offer Great Value
Lenovo Unveils New moto g6 and moto e5 Smartphones
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Panason...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, October 10, 2017
Panasonic Develops System to Protect Cyber Attacks in Connected Cars


Panasonic has developed automotive intrusion detection and prevention systems as a cyber security countermeasure for autonomous and connected cars.

Connected cars are connected to the Internet, so like current IT systems, they coud be targets of cyber attacks from around the world. Panasonic says its new systems detect cyber attacks in real-time while simultaneously preventing them.

The system consists of a vehicle-installed "monitoring module" and a "monitoring cloud" that is linked to the monitoring module. The vehicle-installed monitoring module monitors the entire vehicle based on the monitoring rules. By using the newly developed systems, once the attacks that cannot be detected with existing monitoring modules are discovered, the systems can prevent new attacks by updating the monitoring rules from the monitoring cloud. Therefore, it helps to maintain safety even after the vehicle is released on the market. Also, by grasping signs of attacks before they are identified as true security incidents, they are possible to implement countermeasures in advance so that they can minimize the effects of the attacks.

System details

  • In-vehicle device-type host intrusion detection technology: This technology detects intrusions from the Internet, which is an early stage of the attacks, and can be installed and used with Internet connected devices (IVI/TCU) In addition to identifying the attacks from the obtainable logs from an OS like Linux and other various security functions, the system can also detect the attacks by combining multiple behavioral information.
  • In-vehicle device-type Controller Area Network (CAN) intrusion detection technology: This technology detects intrusions to CAN communication systems, which is a second stage of the attacks, and can be installed and used with CAN connected devices (ECU) There are two types of CAN monitoring usages, which consist of (1) CAN filter that filter unauthorized CAN commands received by the installed ECU, and (2) CAN monitoring that detects unauthorized commands by monitoring all CAN bus systems that are connected by the installed ECU. Unauthorized commands are judged by taking into consideration various conditions of the vehicle, so it is possible to reduce the number of false positive under specific conditions. Detection of unauthorized commands can be made for each single command, resulting is real-time prevention after detection.
  • In-vehicle device-type Ethernet intrusion detection technology: This technology detects intrusions to Ethernet communication systems, which is a second stage of the attacks, and can be installed and used with Ethernet connected devices (ECU) There is an Ether filter that filters unauthorized Ether frames that are received or intercepted by the installed ECU (Ethernet Switch ECU, etc.) The system consists of the overlook method, which can lightly determine unauthorized commands by analyzing the frame headers and a detailed method, which has a high-load operation, but can determine unauthorized commands. Flexible detection is possible by combining these methods.
  • Cloud-type vehicle intrusion detection technology: This system analyzes a large amount of logs collected from in-vehicle devices of multiple vehicles through machine learning and can be used by placing it in the cloud. As for the usage, in-vehicle network model that has conducted prior learning, will automatically narrow down the logs that may become potential security risks. After that, the attack analysts will analyze only the selected logs. By linking with various in-vehicle device-type intrusion detection technologies, it is possible to grasp signs of attacks before they are identified as true security incidents.


Previous
Next
Japan to Dramatically Improve GPS Accuracy Using Fourth Satellite        All News        China's BOE Ready to Produce Flexible OLEDs
Japan to Dramatically Improve GPS Accuracy Using Fourth Satellite     General Computing News      LG's Q3 Operating to Rise on Strong TV and Home Appliances Sales

Get RSS feed Easy Print E-Mail this Message

Related News
Panasonic Develops 8K Global Shutter Technology Using Organic-Photoconductive-Film CMOS Image Sensor
Panasonic Toughbook CF-20 Gets Performance Boost
Panasonic Debuts HDR10+ OLED TVs, Ultra HD Blu-ray Players and New Technics Turntables at CES
Toyota and Panasonic to Start Study on Automotive Prismatic Battery Business
Panasonic Develops a "Makeup Design Tool" That Lets You Use Create Digital Professional Makeup
Panasonic - Technics Audio and Video Products at IFA
Panasonic Technology Detects and Predicts a Driver's Level of Drowsiness
Panasonic Releases Tiny 512Gb SSD in Japan
Panasonic DMP-UB30 Ultra HD Blu-ray Player Debuts in Japan
Panasonic Announces the Toughbook 33 2-in-1 Detachable Laptop
Panasonic Releases the Toughbook CF-33 2-in-1
Panasonic Brings High Contrast Transparent Screen to Market

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .