{"title":"通过重新配置ECU和禁用攻击包来缓解车载网络入侵的机制","authors":"Hyeokchan Kwon, Sokjoon Lee, Jungyong Choi, Byung-ho Chung","doi":"10.23919/INCIT.2018.8584882","DOIUrl":null,"url":null,"abstract":"As the connectivity of vehicles grows and becomes more intelligent, security threats are also increasing. In fact, hacking of vehicles such as Jeep Cherokee (2014), Mitsubishi Outlander (2016) and Tesla model S (2016 and 2017) has been reported. Currently, various intrusion detection solutions are emerging in order to defend the cyber-attacks of vehicles, but up to now, the response to detection has remained at the ex post countermeasure level. In this paper, we propose a mitigation mechanism to cope with an attack on a vehicular internal network. The proposed mechanism reconfigures ECUs and disables attack packets to mitigate damage to network intrusions.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"581 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Mitigation mechanism against in-vehicle network intrusion by reconfiguring ECU and disabling attack packet\",\"authors\":\"Hyeokchan Kwon, Sokjoon Lee, Jungyong Choi, Byung-ho Chung\",\"doi\":\"10.23919/INCIT.2018.8584882\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the connectivity of vehicles grows and becomes more intelligent, security threats are also increasing. In fact, hacking of vehicles such as Jeep Cherokee (2014), Mitsubishi Outlander (2016) and Tesla model S (2016 and 2017) has been reported. Currently, various intrusion detection solutions are emerging in order to defend the cyber-attacks of vehicles, but up to now, the response to detection has remained at the ex post countermeasure level. In this paper, we propose a mitigation mechanism to cope with an attack on a vehicular internal network. The proposed mechanism reconfigures ECUs and disables attack packets to mitigate damage to network intrusions.\",\"PeriodicalId\":144271,\"journal\":{\"name\":\"2018 International Conference on Information Technology (InCIT)\",\"volume\":\"581 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Information Technology (InCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/INCIT.2018.8584882\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information Technology (InCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/INCIT.2018.8584882","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mitigation mechanism against in-vehicle network intrusion by reconfiguring ECU and disabling attack packet
As the connectivity of vehicles grows and becomes more intelligent, security threats are also increasing. In fact, hacking of vehicles such as Jeep Cherokee (2014), Mitsubishi Outlander (2016) and Tesla model S (2016 and 2017) has been reported. Currently, various intrusion detection solutions are emerging in order to defend the cyber-attacks of vehicles, but up to now, the response to detection has remained at the ex post countermeasure level. In this paper, we propose a mitigation mechanism to cope with an attack on a vehicular internal network. The proposed mechanism reconfigures ECUs and disables attack packets to mitigate damage to network intrusions.