Network and security trends in connected cars

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security Awareness: Applying Practical Security in Your World
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Department Of Computer Engineering
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Chapter 6 of the Executive Guide manual Technology.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
2 nd Annual review Florence 15 th November 2013 Railway security demonstrator.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Broadband Access Solutions via Satellite Sergey Eleferov Russian Satellite Communications Company Satellite Communications Centre “DUBNA”
Car-to-Car Communication for Accident Avoidance
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 W3C Automotive and Web Platform Working Group Web Payments – Selected Automotive Use Cases.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Cryptography and Network Security Sixth Edition by William Stallings.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Some Great Open Source Intrusion Detection Systems (IDSs)
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
Chapter 1: Explore the Network
Connected Vehicles in the Internet of Things Presenter
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Principles of Automotive cyber-security
CompTIA Security+ Study Guide (SY0-401)
Overview of Data Communications and Networking
Snort – IDS / IPS.
Koji Nakao, Dai Arisue NICT, Japan
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Security of In-Vehicle Software
Access control techniques
ITEA3 Project: ACOSAR Advanced Co-Simulation Open System Architecture
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
VANET.
CYBERSECURITY FOR AUTONOMOUS VEHICLES
CompTIA Security+ Study Guide (SY0-401)
The security and vulnerabilities of IoT devices
Aniket Shah & Alexander Witt
Connected and Autonomous Vehicle Cybersecurity Controller Area Network
On the Efficacy of Anomaly Detection in Process Control Networks
ECE 4450:427/527 - Computer Networks Spring 2017
An Introduction to Computer Networking
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
File Transfer Issues with TCP Acceleration with FileCatalyst
Automotive Embedded System
How to Mitigate the Consequences What are the Countermeasures?
How to Detect Attacks and Supervise Rail Systems?
Security Management Platform
Network hardening Chapter 14.
Network and security practices in automotive systems
Introduction to Network Security
Designed for powerful live monitoring of larger installations
Data Communication Chapter 1 Introduction 1.#.
Network Security Mark Creighton GBA 576 6/4/2019.
Intrusion-Detection Systems
Presentation transcript:

Network and security trends in connected cars Alexios Lekidis alexis.lekidis@forescout.com a.lekidis@tue.nl

Why automotive security is challenging? Related to safety Complexity of in-vehicle networks

Overview of in-vehicle architectures Threat landscape Suggested security mechanisms

Overview of in-vehicle architectures Threat landscape Suggested security mechanisms

Automotive architecture Consists of different data networks: Legacy systems where new technologies are take many years to replace old ones Low cost technologies with multiple resource-constraints Changing a simple component requires possible changes and testing of the entire system

Entering the in-vehicle network central gateway GPS interface Diagnostic interface USB interface GSM/GPRS interface Bluetooth interface DSRC interface CAN MOST protocol FlexRay LIN Engine control Steering control Instrument cluster Head Unit Audio Video Transmission control Air Bag control Climate control Navigation Power train sensors Breaking system Door locking Telephone

In-vehicle protocol usage Abbreviation Description CAN Controller Area Network Inexpensive low-speed serial bus CAN FD With Flexible Data Rate Extension to CAN FlexRay N/A General purpose high speed protocol with safety-critical features LIN Local Interconnect Network Low cost in-vehicle sub-network MOST Media Oriented Systems Transport High speed multimedia interface Automotive Ethernet Ongoing development for infotainment and active safety

Background on Controller Area Network (CAN) Serial communication protocol Multi master message model Any node receives/transmits messages No addressing  use of ID CSMA/CA Priority determined by ID (low ID = high prio) Messages are sent/received: Periodically On request Also used in trucks, ships, railway systems, elevators, …

Overview of in-vehicle architectures Threat landscape Suggested security mechanisms

Attack surfaces OBDII Tire Pressure Monitoring Head Sensor Keyless Unit Keyless entry Medium observation in broadcasted messages Direct access Central Gateway Telematics Control Unit Short-range access Long-range access

Attack scenario OBDII Sniff the telematics system IP address Random generator of Bluetooth PIN / WiFi WPA password Brake Control Unit Central Gateway Telematics Control Unit Head Unit

Move to safety Bus from telematics system OBDII Move to safety Bus from telematics system Brake Control Unit Central Gateway Telematics Control Unit Head Unit

Disengage brakes or kill engine OBDII Disengage brakes or kill engine Brake Control Unit Central Gateway Telematics Control Unit Head Unit

Overview of in-vehicle architectures Threat landscape Suggested security mechanisms

Categories of security mechanisms Physical Security tampering protection mechanisms and tamper proof devices Digital signatures and Certificates Firewall Gateway Honeypot Software security Intrusion detection systems Intrusion prevention systems

Digital signatures and Certificates Pros: - Widely adopted as it provides a fast design/implementation security solution Cons: 1) Performance requirements can only be met when dedicated hardware is provided Accelerates the algorithmic execution 2) Infected ECUs can still send valid compromised messages

Firewall Based on the definition of CAN in Automation (CiA) 447 profile Pros: 1) Verification of message validity 2) Whitelist IP rules Cons: 1) Frequent rule update required Security update on the cars are not frequent 2) Bypassed by impersonation of legitimate ECU attacks

Intrusion detection/prevention systems (IDS/IPS) Monitoring V2X and in-vehicle activity and detection of suspicious and anomalous behavior Flow of data exchange Deep data inspection and analysis Can operate in the level of: Host application Communication network Pros: - Protection against zero-day attacks - Frequent update Cons: - Requires to learn the normal system behavior to detect anomalies Hybrid approach Signatures Behavior Normal network data parsed by IDS Abnormal network data parsed by IDS Alerts/logs

Vehicle cybersecurity in a glance Traffic encryption Firewall protection Anomaly detection (i.e. IDS) Misuse/threat distinction Incident response Vehicle cybersecurity in a glance

Reaction upon attack detection Turning the car into “limb” mode Partial networking functionality Main ECUs functioning with lower performance Car can be restored when any malicious activity is prevented Indications to the manufacturer Alarms to the driver?

Security research in automotive systems APPSTACLE: open standard APplication Platform for carS and TrAnsportation vehiCLEs Goals: open and secure cloud platform interconnecting a wide range of vehicles to the cloud via open in-car and Internet connection supported by an integrated open source software development ecosystem ForeScout IDS systems for end-to-end security in automotive environments Detection of known and unknown in-vehicle threats Support of different in-vehicle networks