Automotive Intrusion Detection and Prevention Systems against Cyber Attacks by Panasonic

en171010-3-1Panasonic has developed an automotive intrusion detection and prevention system against cyber attacks.

Connected cars, any cars connected to the Internet, are vulnerable to cyber attacks. So Panasonic has developed a system to detect cyber attacks in real time and prevent them.

It allows for updates at the attacks are evolving, before cars were only preventing attacks know at the time the cars left the factory.

Features according to the Panasonic press release:

  1. Detects intrusions of attacks from the Internet at an early stage, and additionally detects intrusions to the in-vehicle network as a second step.
  2. In addition to the widely used CAN *1, the systems are also compatible with Ethernet*2, which is expected to spread in the future as an in-vehicle network, and enables comprehensive detections of intrusions to the entire vehicle.
  3. By collecting information from multiple vehicles on the cloud, the systems can detect attacks before they are identified as a true security incident.

The Technical Features include:

  • 1. In-vehicle device-type host intrusion detection technology: This technology detects intrusions from the Internet, which is an early stage of the attacks, and can be installed and used with Internet connected devices (IVI/TCU*3) In addition to clearly identifying the attacks from the obtainable logs from an OS like Linux and other various security functions, the system can also detect the attacks by combining multiple behavioral information.
  • 2. In-vehicle device-type CAN intrusion detection technology: This technology detects intrusions to CAN communication systems, which is a second stage of the attacks, and can be installed and used with CAN connected devices (ECU) There are two types of CAN monitoring usages, which consist of (1) CAN filter that filter unauthorized CAN commands received by the installed ECU, and (2) CAN monitoring that detects unauthorized commands by monitoring all CAN bus systems that are connected by the installed ECU. Unauthorized commands are judged by taking into consideration various conditions of the vehicle, so it is possible to reduce the number of false positive under specific conditions. Detection of unauthorized commands can be made for each single command, resulting is real-time prevention after detection.
  • 3. In-vehicle device-type Ethernet intrusion detection technology: This technology detects intrusions to Ethernet communication systems, which is a second stage of the attacks, and can be installed and used with Ethernet connected devices (ECU) There is an Ether filter that filters unauthorized Ether frames that are received or intercepted by the installed ECU (Ethernet Switch ECU, etc.) The system consists of the overlook method, which can lightly determine unauthorized commands by analyzing the frame headers and a detailed method, which has a high-load operation, but can accurately determine unauthorized commands. Flexible detection is possible by combining these methods.
  • 4. Cloud-type vehicle intrusion detection technology: This system analyzes a large amount of logs collected from in-vehicle devices of multiple vehicles through machine learning and can be used by placing it in the cloud. As for the usage, in-vehicle network model that has conducted prior learning, will automatically narrow down the logs that may become potential security risks. After that, the attack analysts will analyze only the selected logs. By linking with various in-vehicle device-type intrusion detection technologies, it is possible to grasp signs of attacks before they are identified as true security incidents
  • *1 CAN (Controller Area Network)
    CAN is a high noise-resistant serial communication protocol that was developed for vehicles, and current vehicles use in-vehicle networks via CAN communication to communicate between the vehicle ECU.
  • *2 Ethernet
    Using Ethernet to communicate between the ECU and electrical components within the vehicles based on the network standard used in offices and households is expected the increase the speed and capacity of data transmissions. It also enables data exchange with an IP base, making links to external network (cloud) even easier.
  • *3 IVI/TCU
    ・IVI (In-Vehicle Infotainment): In-vehicle infotainment device
    ・TCU (Telematics Communication Unit): Communication control unit

Panasonic is Bronze Corporate Partner of MACo. Information from this article has been provided by a Panasonic press release.

For more information about MACo’s Corporate Partner Program visit our website.