摘要:
Techniques are provided for actively controlling a communications bus to mitigate threats, including cyber-attacks. A methodology implementing the techniques according to an embodiment includes detecting a threat in a message that is being transmitted between nodes on the communications bus. The message comprises one or more message frames and the threat detection is based on analysis of an initial portion of the message frame. The method further includes actively controlling the bus, based on the threat detection, to prevent the remaining portion of the message frame from delivering the threat to one or more of the nodes on the bus. Actively controlling the bus includes isolating nodes from the bus and/or overwriting data in the remaining portion of the message frame to invalidate the message frame or to remove the threat from the message frame.
摘要:
A Taint Modeling Function (TMF) finds abstract patterns and uses them to automate the malware detection process. TMF involves the process of statically analyzing a sequence of assembly language instructions and abstracting complex relationships among instruction inputs and outputs into a mathematical function containing a set of algebraic expressions. The set of expressions support fully automating semantic pattern detection in binary code. It deterministically generates outputs given inputs determining code block outputs, for given inputs, without executing the code. It detects code patterns automatically to spot bad coding patterns directly from the binary used to detect bugs statically in the entire application space.
摘要:
Techniques are provided for actively controlling a communications bus to mitigate threats, including cyber-attacks. A methodology implementing the techniques according to an embodiment includes detecting a threat in a message that is being transmitted between nodes on the communications bus. The message comprises one or more message frames and the threat detection is based on analysis of an initial portion of the message frame. The method further includes actively controlling the bus, based on the threat detection, to prevent the remaining portion of the message frame from delivering the threat to one or more of the nodes on the bus. Actively controlling the bus includes isolating nodes from the bus and/or overwriting data in the remaining portion of the message frame to invalidate the message frame or to remove the threat from the message frame.
摘要:
The present invention relates to a system and method for providing channel access synchronization in a time division multiple access (TDMA) multi-hop network employing a plurality of time slots defined within a frame structure which repeats. The system and method includes nodes which have local clock variables. The local clock variables generate an expected arrival time of signals from other nodes in the network. Each node then determines whether the local clock variable needs adjusting after receiving a transmission and comparing the expected arrival time with the actual arrival time. Thus, time synchronization across the network is distributed and updated locally at each node. Networks may be merged by casting out nodes in one network and joining those cast out nodes with the other network. Newly joined nodes are thereafter time synchronized into their new network by comparing actual and expected arrival times and updating their clock accordingly.
摘要:
An anomaly detection system is disclosed. In an embodiment, the anomaly detection system includes an anomaly detection module and a warning indicator module. The anomaly detection module includes one or more auto-encoders that receive sensor data from a plurality of sensors. Each of the one or more auto-encoders receives sensor data from at least three different sensors of the plurality of sensors. By receiving data output from at least three of the sensors, the auto-encoder can recognize expected inter-related patterns from the sensor output. The warning indicator module compares an output of a given auto-encoder of the plurality of auto-encoders to an input of the given auto-encoder to obtain an error value, and then compares that error value against an error threshold. In response to the error value exceeding the error threshold, the warning indicator module issues a warning signal associated with the sensor data received by the given auto-encoder.