Barletta et al., 2024 - Google Patents
Quantum-Based Automotive Threat Intelligence and CountermeasuresBarletta et al., 2024
- Document ID
- 4045435017539774640
- Author
- Barletta V
- Caivano D
- Catalano C
- De Vincentiis M
- Publication year
- Publication venue
- Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering
External Links
Snippet
Due to the increasing amount of software and hardware in connected and autonomous cars, the attack surface is growing, which increases the risk of security attacks. Researchers proposed machine learning or deep learning techniques to identify threats in in-vehicle …
- 238000001514 detection method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sommer et al. | Survey and classification of automotive security attacks | |
Wang et al. | An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks | |
US11601463B2 (en) | Cybersecurity threat modeling and analysis with text miner and data flow diagram editor | |
CN111245793A (en) | Method and device for analyzing abnormity of network data | |
CN112231681A (en) | Access right verification method and system based on Internet of things | |
Atzeni et al. | Countering android malware: A scalable semi-supervised approach for family-signature generation | |
Zalewski et al. | Threat modeling for security assessment in cyberphysical systems | |
Jiang et al. | Evaluating the data inconsistency of open-source vulnerability repositories | |
Li et al. | An approach to model network exploitations using exploitation graphs | |
Liu et al. | Multi-step attack scenarios mining based on neural network and Bayesian network attack graph | |
Zhang et al. | Empirical Study for Open Source Libraries in Automotive Software Systems | |
Lodeiro-Santiago et al. | Collaborative SQL-injections detection system with machine learning | |
Varenitca et al. | Recommended practices for the analysis of web application vulnerabilities | |
Barletta et al. | Quantum-based Automotive Threat Intelligence and Countermeasures | |
Ryu et al. | Study on Trends and Predictions of Convergence in Cybersecurity Technology Using Machine Learning | |
Zegzhda et al. | Approach to the construction of the generalized functional-semantic cyber security model | |
Alosefer et al. | Predicting client-side attacks via behaviour analysis using honeypot data | |
Kulik et al. | Security verification of industrial control systems using partial model checking | |
Horalek et al. | Security Baseline for Substation Automation Systems | |
Schumacher et al. | Data mining in vulnerability databases | |
Ban et al. | A Survey on IoT Vulnerability Discovery | |
Guerra et al. | An Artificial Intelligence Framework for the Representation and Reuse of Cybersecurity Incident Resolution Knowledge | |
CN116070191A (en) | Information processing method and device, storage medium, and program product | |
Caivano et al. | Extending Developer Support: Quantum Artificial Intelligence for Automotive Security | |
Chen et al. | Attack intent analysis method based on attack path graph |