Breaking News

Firewalla Launches MSP 2.9: Introducing FireAI Search, AP7 Wi-Fi Management, Enhanced User Support, Mobile App Access Control Elgato Launches Retail-Exclusive, Discord-Edition Stream Deck Mini LIAN LI Unveils HydroShift II LCD-S Series AIO with Hot-Swappable Square LCD ASUS Republic of Gamers Announces Availability of Swift OLED PG27AQWP-W and Strix OLED XG27AQWMG ASUS Announces Prime AP303 Compact Mid-Tower ATX Case

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Panasonic Develops System to Protect Cyber Attacks in Connected Cars

Panasonic Develops System to Protect Cyber Attacks in Connected Cars

Enterprise & IT Oct 10,2017 0

Panasonic has developed automotive intrusion detection and prevention systems as a cyber security countermeasure for autonomous and connected cars.

Connected cars are connected to the Internet, so like current IT systems, they coud be targets of cyber attacks from around the world. Panasonic says its new systems detect cyber attacks in real-time while simultaneously preventing them.

The system consists of a vehicle-installed "monitoring module" and a "monitoring cloud" that is linked to the monitoring module. The vehicle-installed monitoring module monitors the entire vehicle based on the monitoring rules. By using the newly developed systems, once the attacks that cannot be detected with existing monitoring modules are discovered, the systems can prevent new attacks by updating the monitoring rules from the monitoring cloud. Therefore, it helps to maintain safety even after the vehicle is released on the market. Also, by grasping signs of attacks before they are identified as true security incidents, they are possible to implement countermeasures in advance so that they can minimize the effects of the attacks.

System details

  • In-vehicle device-type host intrusion detection technology: This technology detects intrusions from the Internet, which is an early stage of the attacks, and can be installed and used with Internet connected devices (IVI/TCU) In addition to identifying the attacks from the obtainable logs from an OS like Linux and other various security functions, the system can also detect the attacks by combining multiple behavioral information.
  • In-vehicle device-type Controller Area Network (CAN) intrusion detection technology: This technology detects intrusions to CAN communication systems, which is a second stage of the attacks, and can be installed and used with CAN connected devices (ECU) There are two types of CAN monitoring usages, which consist of (1) CAN filter that filter unauthorized CAN commands received by the installed ECU, and (2) CAN monitoring that detects unauthorized commands by monitoring all CAN bus systems that are connected by the installed ECU. Unauthorized commands are judged by taking into consideration various conditions of the vehicle, so it is possible to reduce the number of false positive under specific conditions. Detection of unauthorized commands can be made for each single command, resulting is real-time prevention after detection.
  • In-vehicle device-type Ethernet intrusion detection technology: This technology detects intrusions to Ethernet communication systems, which is a second stage of the attacks, and can be installed and used with Ethernet connected devices (ECU) There is an Ether filter that filters unauthorized Ether frames that are received or intercepted by the installed ECU (Ethernet Switch ECU, etc.) The system consists of the overlook method, which can lightly determine unauthorized commands by analyzing the frame headers and a detailed method, which has a high-load operation, but can determine unauthorized commands. Flexible detection is possible by combining these methods.
  • Cloud-type vehicle intrusion detection technology: This system analyzes a large amount of logs collected from in-vehicle devices of multiple vehicles through machine learning and can be used by placing it in the cloud. As for the usage, in-vehicle network model that has conducted prior learning, will automatically narrow down the logs that may become potential security risks. After that, the attack analysts will analyze only the selected logs. By linking with various in-vehicle device-type intrusion detection technologies, it is possible to grasp signs of attacks before they are identified as true security incidents.

Tags: Panasonic
Previous Post
Japan to Dramatically Improve GPS Accuracy Using Fourth Satellite
Next Post
China's BOE Ready to Produce Flexible OLEDs

Related Posts

  • Panasonic Announces Limited Drop of LUMIX S9 Titanium Gold Edition Models in Europe

  • Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series

  • Panasonic Introduces New LUMIX TZ99 White in Europe

  • Panasonic introduces AK-UBX100 4K multi-purpose camera

  • Panasonic Announces LUMIX S1II and LUMIX S1IIE and new lens

  • Panasonic’s New RB-F10 Wireless Open Design Earphones

  • Panasonic Announces New LUMIX S1RII Full-Frame Mirrorless Camera

  • Panasonic Announces Four 4K 60p 10bit Professional Camcorders

Latest News

Firewalla Launches MSP 2.9: Introducing FireAI Search, AP7 Wi-Fi Management, Enhanced User Support, Mobile App Access Control
Enterprise & IT

Firewalla Launches MSP 2.9: Introducing FireAI Search, AP7 Wi-Fi Management, Enhanced User Support, Mobile App Access Control

Elgato Launches Retail-Exclusive, Discord-Edition Stream Deck Mini
Consumer Electronics

Elgato Launches Retail-Exclusive, Discord-Edition Stream Deck Mini

LIAN LI Unveils HydroShift II LCD-S Series AIO with Hot-Swappable Square LCD
Cooling Systems

LIAN LI Unveils HydroShift II LCD-S Series AIO with Hot-Swappable Square LCD

ASUS Republic of Gamers Announces Availability of Swift OLED PG27AQWP-W and Strix OLED XG27AQWMG
Gaming

ASUS Republic of Gamers Announces Availability of Swift OLED PG27AQWP-W and Strix OLED XG27AQWMG

ASUS Announces Prime AP303 Compact Mid-Tower ATX Case
Cooling Systems

ASUS Announces Prime AP303 Compact Mid-Tower ATX Case

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed