2022
DOI: 10.3233/jcm-215889
|View full text |Cite
|
Sign up to set email alerts
|

Internet of vehicles security situation awareness based on intrusion detection protection systems

Abstract: With the rise of technologies such as mobile Internet, 5G networks and artificial intelligence, the development of Internet of Vehicle Information Security (ICVS) has become the mainstream and direction for the future development of the automotive industry. ICVS, people, roads, clouds, and APP constitute a complex network of vehicles. As part of the Internet, vehicle networking will inevitably face various complex information security threats and risks. This paper aims to design a kind of security situation aw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In addition to the above analysis, it is also necessary to consider the node protection degree en and the alarm return sn. The security index of the independent node can be obtained by (1).…”
Section: 3network Security Situation Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to the above analysis, it is also necessary to consider the node protection degree en and the alarm return sn. The security index of the independent node can be obtained by (1).…”
Section: 3network Security Situation Estimationmentioning
confidence: 99%
“…For example, "Stuxnet virus" attacking Bushehr nuclear power plant in Iran, "Aurora attack" against Google mail server, "BlackEnergy" attack against Ukrainian power grid, etc. Although the information security personnel of the enterprise have deployed a large number of security devices in the network, some attacks will still bypass all protective measures and go straight to the enterprise, resulting in the leakage, damage or tampering of important data assets [1]. Therefore, it is necessary to find the threats hidden in the network in time through technical means, quickly find the malicious behaviors in the threats as soon as possible, accurately locate the target and the source of the attack, and judge and trace the intrusion path and attacker background, so as to solve the security threats in the enterprise network from the source and reduce the losses caused by the security threats to the enterprise as much as possible [2].…”
Section: Introductionmentioning
confidence: 99%