Panasonic's automotive intrusion detection and prevention systems against cyberattacks
Panasonic announced that it has developed automotive intrusion detection and prevention systems as a cybersecurity countermeasure for autonomous and connected cars. Panasonic's systems reportedly allow the cyberattacks on connected cars to be detected in real time and simultaneously prevented. The company says that information on the evolved attacks is collected on the cloud side and detected by distributing and updating the new rules of the countermeasures to the vehicles. The system is designed to aid in compliance with future in-vehicle security legislations.
Panasonic says the new systems detect intrusions of attacks from the internet at an early stage and also detect intrusions to the in-vehicle network as a second step. The systems are said to be compatible with CAN as well as the Ethernet, and they reportedly enable comprehensive detections of intrusions to the entire vehicle. By collecting information from multiple vehicles on the cloud, the systems can detect attacks before they are identified as true security incidents.
The systems consist of a vehicle-installed "monitoring module" and a "monitoring cloud" that is linked to the monitoring module. The vehicle-installed monitoring module monitors the entire vehicle based on the monitoring rules. Once the attacks that cannot be detected with existing monitoring modules are discovered, the systems can reportedly prevent new attacks by updating the monitoring rules from the monitoring cloud.
Technical features include:
In-vehicle device-type host intrusion detection technology: Detects intrusions from the Internet, which is an early stage of the attacks, and can be installed and used with Internet connected devices (in-vehicle infotainment/telematics communication units). In addition to clearly identifying the attacks from the obtainable logs from an OS like Linux and other security functions, the system can also detect the attacks by combining multiple behavioral information.
In-vehicle device-type CAN intrusion detection technology: Detects intrusions to CAN communication systems, which is a second stage of the attacks, and can be installed and used with CAN connected devices (ECU). There are two types of CAN monitoring usages: 1) CAN filter that filters unauthorized CAN commands received by the installed ECU, and 2) CAN monitoring that detects unauthorized commands by monitoring all CAN bus systems that are connected by the installed ECU. Unauthorized commands are judged by considering various conditions of the vehicle, so it is possible to reduce the number of false positives under specific conditions. Detection of unauthorized commands can be made for each single command, resulting in real-time prevention after detection.
In-vehicle device-type Ethernet intrusion detection technology: Detects intrusions to Ethernet communication systems, which is a second stage of the attacks, and can be installed and used with Ethernet connected devices (ECU). There is an Ether filter that filters unauthorized Ether frames that are received or intercepted by the installed ECU. The system consists of the overlook method, which can lightly determine unauthorized commands by analyzing the frame headers, and a detailed method, which has a high-load operation, but can accurately determine unauthorized commands. Flexible detection is possible by combining these methods.
Cloud-type vehicle intrusion detection technology: Analyzes a large amount of logs collected from in-vehicle devices of multiple vehicles through machine learning and can be used by placing it in the cloud. The in-vehicle network model, which has conducted prior learning, will automatically narrow down the logs that may become potential security risks. After that, the attack analysts will analyze only the selected logs. By linking with various in-vehicle device-type intrusion detection technologies, it is possible to grasp signs of attacks before they are identified as true security incidents.