Font Size: a A A

The Simulation Platform Of Vehicle-mounted Network Protection Based On The Intrusion Detection Technology

Posted on:2017-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:H T SunFull Text:PDF
GTID:2272330482495761Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of automobile industry, people’s lives are undergoing profound changes. The vehicle plays an increasingly important role in people’s daily life. With the popularity of the current vehicle networks, the Internet has a closely relation to the vehicles.With the Internet of things and the Internet of vehicles being put forward and developed with an astonishing speed,the information exchanges between vehicles, drivers, roads and the Internet have been realized by using such as the communications technology, the sensor technology and the computing technology, which greatly enhances the perception of drivers to the environment. However, the vehicle joins in the network as a member of the Internet, which also brings the security issues. Not only should we ensure the hidden of vehicle information, but also we should guarantee the high reliability and availability of the information and avoid the invasion of network and the protocol violations. In this case, a safe, reliable and efficient simulation platform of vehicle-mounted network protection for the vehicle network system has become aresearch focus.The intrusion detection system is widely used in the network security industry.The Snort is an open source, lightweight intrusion detection system. In this thesis, we first conducted research and study on the Snort, and then we added the network security protocol and applied it in the vehicle-mounted network security protection system. Finally, we verified the validityand usabilityof the simulation platform through various experiments. The main works can be described as below:1.Analyze the potential points of attack on the vehicle. Analyze the attack vulnerabilities of the vehicle and select the point of attack according to the context of vehicle.2.Study the types of the potential attack in the simulation platform of the vehicle-mounted information security protection. According to the resultsand combining the traditional type of attack computer systems, study the types of attacks of the vehicle information, which includedinterrupts, eavesdropping, forgery, interception, tamperingand etc..3.Use the Snort intrusion detection system as the platform. Realize the whole coverage of the flow detection of the vehicle-mounted network and further achieve the security of the on-board communication by adding the strategy of the security protection.4.Select the security strategy according to each type of attacks. Design and implement the corresponding and appropriate protection strategy, establish the monitoring mechanismsaccording to various types of attacks.5.The appropriate protection strategy was configured based on the system architecture.The appropriate protection strategy which was implemented by softwarewas arranged on the position where existed the corresponding attack risks in the system.6.The vehicle-mounted protection simulation platform was established. The simulation platform was designed and implemented under the Windows operating system.
Keywords/Search Tags:vehicle-mounted network security, intrusion detection, Snort, IPsec protocol
PDF Full Text Request
Related items