With the introduction of more and more ECUs and components in vehicles, the automotive industry is moving towards increasingly connected and autonomous driving. This means not only more functionality available but also an increased risk to vehicle security and driver safety. Therefore, it is necessary to improve the existing solutions and create new techniques and methods not only to detect cyber attacks but also to mitigate and respond with appropriate actions. The paper proposes a Knowledge Base in Automotive to be integrated within a Vehicle Security Operation Center (V-SOC) in order to provide support to analysts in being able to reconstruct the attack kill chain and understand the impact of the attack on other components. The idea is to exploit, at this stage of the research, existing taxonomies in the literature on automotive attacks in order to obtain the classification of existing attacks, the automotive security development process, and the decomposition of incidents that consist of multiple attack steps.

Automotive Knowledge Base for Supporting Vehicle-SOC Analysts

Barletta V. S.
;
Caivano D.;De Vincentiis M.;Pal A.;
2023-01-01

Abstract

With the introduction of more and more ECUs and components in vehicles, the automotive industry is moving towards increasingly connected and autonomous driving. This means not only more functionality available but also an increased risk to vehicle security and driver safety. Therefore, it is necessary to improve the existing solutions and create new techniques and methods not only to detect cyber attacks but also to mitigate and respond with appropriate actions. The paper proposes a Knowledge Base in Automotive to be integrated within a Vehicle Security Operation Center (V-SOC) in order to provide support to analysts in being able to reconstruct the attack kill chain and understand the impact of the attack on other components. The idea is to exploit, at this stage of the research, existing taxonomies in the literature on automotive attacks in order to obtain the classification of existing attacks, the automotive security development process, and the decomposition of incidents that consist of multiple attack steps.
2023
9798350300802
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11586/533323
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact