Live Appointment | Garrett Zhang Jianfeng: Intrusion detection system implemented in mass production to ensure the safety of intelligent connected cars

According to the latest information network security report, in the past five years, the global automotive industry has suffered losses of more than $500 billion due to cyber attacks, and nearly 70% of automotive security threats are caused by long-distance cyber attacks. As digital, intelligent and networked technologies take shape, automobile companies have developed more business models to provide drivers and passengers with a more comprehensive and comfortable experience, but they also provide more attack surfaces and attack surfaces for cyberattacks. carrier. Facing the increasing challenges of network security, regulatory agencies in various countries are also gradually introducing various regulations and standards. In the first half of this year, my country's Automotive Standardization Technical Committee also officially released drafts for comments on four mandatory national standards including the "Automotive Information Security Technical Requirements". Specific vehicle network security technical requirements and specifications will also be recommended in subsequent recommendations. It is specified in the standard (GB/T). While complying with the development trend of the automotive industry, how to better protect the safety of intelligent connected vehicles?

In this context, vehicle intrusion detection and prevention systems provide new solutions for vehicle network information security. The system can effectively collect and detect potential attacks on the in-vehicle network and inappropriate behaviors on the external connection network, and perform dynamic defense and response based on the security detection results of the current status of the vehicle. Among them, intrusion detection systems can detect different types of attacks that may occur in the network, such as denial of service/distributed denial of service, port scanning, malware or ransomware, etc. Intrusion prevention systems are designed to help mitigate or avoid the above attacks and prevent them from causing damage to in-vehicle systems. Compared with the above two single systems, IDPS with both detection and defense functions can double the security protection effect. On the one hand, it monitors the system and protects the network from intruders, and on the other hand, it reports to the management when an attack occurs in the network environment. Provide reports to staff to help further feedback on response measures. Compared with the active security defense mechanism mentioned earlier, the intrusion detection and prevention system IDPS has the characteristics of small bandwidth resources and easy deployment, and is more suitable for vehicle networks with limited resources and costs.

The 38th Tansi Lab AutoSec ​​automotive security live class specially invited Mr. Zhang Jianfeng, senior information security expert of Garrett Power Technology (Shanghai) Co., Ltd., to discuss "Intrusion Detection in Mass Production" with everyone on August 22. system to ensure the safety of intelligent connected cars." The computing power of intelligent connected cars is increasing day by day. Although it brings flexible software-defined car architecture upgrades, it also brings serious information security threats. In order to cope with this challenge, various countries have introduced relevant regulations requiring the automotive industry to have a comprehensive, efficient, flexible and compliant intrusion detection system. But how does one measure the gold standard of an intrusion detection system?

Speakers

Garrett Power Technology (Shanghai) Co., Ltd.

Zhang Jianfeng

Information security senior expert

the speech topic

Mass-produced intrusion detection system to ensure the safety of intelligent connected cars

Live broadcast time

August 22nd 19:30-20:30

way of participation

Add WeChat: taaslabs01

You can participate in the live broadcast for free and join the AutoSec ​​industry exchange group

Guess you like

Origin blog.csdn.net/TaasLabs/article/details/132335025