H04W12/121

AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEM

In one embodiment, a service receives administration traffic data in a network associated with a remote administration session in which a control device remotely administers a client device. The service analyzes the administration traffic data to determine whether any portion of the administration traffic data is resulting from an administration session involving a trusted administrator. The service flags a first portion of the administration traffic data as authorized when the first portion of the administration traffic data is determined to result from an administration session involving a trusted administrator, and a second portion of the administration traffic data is non-flagged. The service assesses the second portion of the administration traffic data using a machine learning-based traffic classifier to determine whether the second portion of the administration traffic data is malicious.

Vehicle auxiliary wireless personal area network system
11564019 · 2023-01-24 · ·

An auxiliary wireless personal area network system installable in a vehicle includes a plurality of line replaceable units each associated with an avionics subsystem and installable in prescribed locations in the aircraft. At least a subset of the line replaceable units are interconnectable over a dedicated subsystem network. A plurality of network node devices are each associated with a respective one of the plurality of line replaceable units. Each of the network node devices has a microcontroller, an onboard power source independent of any aircraft power source, a local interface connectible the corresponding one of the plurality of line replaceable units, and a wireless network interface connectible to a personal area network independent of the dedicated subsystem network for relaying operational data from the line replaceable unit to the network node device.

Vehicle auxiliary wireless personal area network system
11564019 · 2023-01-24 · ·

An auxiliary wireless personal area network system installable in a vehicle includes a plurality of line replaceable units each associated with an avionics subsystem and installable in prescribed locations in the aircraft. At least a subset of the line replaceable units are interconnectable over a dedicated subsystem network. A plurality of network node devices are each associated with a respective one of the plurality of line replaceable units. Each of the network node devices has a microcontroller, an onboard power source independent of any aircraft power source, a local interface connectible the corresponding one of the plurality of line replaceable units, and a wireless network interface connectible to a personal area network independent of the dedicated subsystem network for relaying operational data from the line replaceable unit to the network node device.

AUTONOMOUS VEHICLE SECURITY MEASURES IN RESPONSE TO AN ATTACK ON AN IN-VEHICLE COMMUNICATION NETWORK
20230019817 · 2023-01-19 ·

An illicit signal is detected on an in-vehicle communication network of an autonomous vehicle. A severity level corresponding to the illicit signal is identified, among multiple severity levels, based on one or more characteristics associated with the illicit signal. The severity level is indicative of a level of adverse impact on safety related to an autonomous vehicle environment. The adverse impact is to be caused by the autonomous vehicle when the autonomous vehicle is compromised by the illicit signal. A security operation is selected from multiple security operations based on the identified severity level. The security operation is performed to mitigate the adverse impact on safety related to the autonomous vehicle environment.

Radio frequency threat detection

A system and method includes receiving, via a fiber optic cable, an analog fiber optic signal that preserves native radio frequency (RF) energy characteristics of at least one first RF signal associated with at least one wireless device, and converting, by a light-to-RF converter, the received analog fiber optic signal into at least one second RF signal. The system and method can further comprise analyzing, by a processor, the at least one second RF signal and generating, by the processor, at least one digital signature associated with the at least one wireless device, respectively, based on the analysis of the at least one second RF signal. The system and method yet further comprise determining, by the processor, if the at least one wireless device associated with the at least one digital signature, respectively, is one of an authorized device and an unauthorized device.

Radio frequency threat detection

A system and method includes receiving, via a fiber optic cable, an analog fiber optic signal that preserves native radio frequency (RF) energy characteristics of at least one first RF signal associated with at least one wireless device, and converting, by a light-to-RF converter, the received analog fiber optic signal into at least one second RF signal. The system and method can further comprise analyzing, by a processor, the at least one second RF signal and generating, by the processor, at least one digital signature associated with the at least one wireless device, respectively, based on the analysis of the at least one second RF signal. The system and method yet further comprise determining, by the processor, if the at least one wireless device associated with the at least one digital signature, respectively, is one of an authorized device and an unauthorized device.

Communication device, communication method, and communication system

A communication device is a communication device connected to a mobility network which is a network mounted in a mobility and which is used by a plurality of electronic control devices for communication. The communication device includes: a holding unit which holds range information indicating a transferable path range determined for a message on the mobility network; a receiving unit which receives the message on the mobility network; and a determining unit which determines validity of the received message by using the range information.

Systems and methods for internet of things security environment

A system for monitoring the communication with a connected Internet of Things (IoT) device is provided. The system includes a first computing device including a least one processor in communication with at least one memory device. The at least one memory device stores a plurality of instructions, which when executed by the at least one processor cause the at least one processor to execute an IoT device communication application. The IoT device communication application monitors the IoT device. The instructions also cause the at least one processor to store IoT device data including a current location of the IoT device, determine an optimal communication path between the IoT device communication application and the IoT device based on the IoT device data, and transfer execution of the IoT device communication application to a second computing device based on the optimal communication path.

Systems and methods for internet of things security environment

A system for monitoring the communication with a connected Internet of Things (IoT) device is provided. The system includes a first computing device including a least one processor in communication with at least one memory device. The at least one memory device stores a plurality of instructions, which when executed by the at least one processor cause the at least one processor to execute an IoT device communication application. The IoT device communication application monitors the IoT device. The instructions also cause the at least one processor to store IoT device data including a current location of the IoT device, determine an optimal communication path between the IoT device communication application and the IoT device based on the IoT device data, and transfer execution of the IoT device communication application to a second computing device based on the optimal communication path.

Reduction of the attack surface in a communications system

A system and a method are for routing data packets from or to at least one electronic control unit, referred to as outgoing packets or incoming packets respectively. The at least one electronic control unit is connected to a communications system via a first interface. The communications system is connected via a second interface to a modem suitable for transferring the outgoing packets and the incoming packets to or respectively from at least one telecommunications network through a plurality of access points. Each access point is secured or unsecured. The outgoing and incoming packets are processed according to the type of access point by which the packets are transferred to or from the at least one telecommunications network.