METHOD AND DEVICE FOR PROCESSING DATA ASSOCIATED WITH A FIRST NETWORK ELEMENT
20220385636 · 2022-12-01
Inventors
- Andreas Weber (Weissach, DE)
- Janin Wolfinger (Birkenfeld, DE)
- Jens Gramm (Tuebingen, DE)
- Tobias Rudolph (Leinfelden, DE)
Cpc classification
H04L41/0604
ELECTRICITY
International classification
Abstract
A computer-implemented method for processing data associated with a first network element. The method includes: ascertaining a subset of a data traffic associated with the network element, and evaluating the subset.
Claims
1-18. (canceled)
19. A computer-implemented method for processing data associated with a first network element, the method comprising: ascertaining a subset of a data traffic associated with the network element; and evaluating the subset.
20. The method as recited in claim 19, wherein the first network element is configured to couple multiple further network elements, the first network element being a switch.
21. The method as recited in claim 19, wherein the ascertaining of the subset includes: selecting the subset based on a situation, the situation being characterizable and/or characterized by at least one of the following elements: a) a state of a target system, b) a state of an attack recognition system, based on at least one present event of the attack recognition system, and/or based on a recognition of anomalies; c) a state of a communication between sub-systems, at least one of the sub-systems including a control unit or a sub-network of a network, d) a state of surroundings, e) a state of at least one sub-system of a vehicle.
22. The method as recited in claim 21, further comprising at at least one of the following steps: a) ascertaining the situation and/or at least one of the states based on the data traffic, b) receiving first pieces of information characterizing the situation and/or the at least one state from at least one further unit.
23. The method as recited in claim 19, further comprising: filtering the data traffic using a hardware-based filter device, the hardware-based filter device including at least one associative memory including a content-addressable memory.
24. The method as recited in claim 19, further comprising: configuring and/or reconfiguring filter rules for the ascertaining of the subset, the configuration and/or reconfiguration of the filter rules being repeated, periodically, and/or being carried out in an event-controlled manner.
25. The method as recited in claim 24, wherein the configuration and/or reconfiguration of the filter rules is carried out dynamically during run time or during an operation of a device carrying out the method.
26. The method as recited in claim 19, wherein those of the data traffic which does not belong to the subset are not evaluated and/or are disregarded during the evaluation.
27. The method as recited in claim 19, further comprising: using various hardware filter rule sets for a hardware-based filtering of the data traffic for ascertaining the subset, and loading the various hardware filter rule sets according to a predefinable plan characterized by a predefinable planning algorithm.
28. The method as recited in claim 27, further comprising: using at least one of the following elements for the planning algorithm: a) time-based loading, a next hardware rule set being loaded and/or used after a predefinable first time; b) priority-based loading, a priority being assigned to each of multiple rule sets, and, a rule set having a higher priority being loaded and/or used more frequently than a rule set having a lower priority; c) port-based loading, a certain rule set, for example, being active at a port of the network element at any point in time, rule sets for the port being changed after a predefinable time; d) loading according to game theory; e) loading, based on a state machine, sequences in the data traffic triggering a reconfiguration of a rule set; f) event-based loading, arrival of a predefinable packet of the data traffic triggering a reconfiguration of a rule set; g) loading based on a packet number, a rule set being changed following a predefinable number of examined, packets.
29. The method as recited in claim 19, further comprising: at least temporarily storing various hardware rule sets, and loading and/or using at least one of the various hardware rule sets according to a planning algorithm.
30. The method as recited in claim 19, further comprising at least one of the following steps: a) assigning at least one first rule set to a first operating state or a first situation of a target system; b) assigning at least one second rule set to a second operating state or a second situation of the target system; c) using the first rule set for the first operating state or the first situation; d) using the second rule set for the second operating state or the second situation.
31. The method as recited in claim 30, wherein the situation and/or the operating state includes at least one of the following elements: a) diagnosis; b) update; c) energy-saving mode; d) a drive mode; e) a modes including a sports mode, an ECO, mode, a comfort mode, an emergency running; f) a season; g) a weather condition; h) a road condition; i) presence of a trailer load; j) smart phone connected.
32. A device configured to process data associated with a first network element, the device configured to: ascertain a subset of a data traffic associated with the network element; and evaluate the subset.
33. A non-transitory computer-readable memory medium on which is stored a computer program including commands for processing data associated with a first network element, the commands, when executed by a computer, causing the computer to perform the following steps: ascertaining a subset of a data traffic associated with the network element; and evaluating the subset.
34. The method as recited in claim 19, wherein the method is used for at least one of the following: a) ascertaining a subset of a data traffic associated with the network element of a motor vehicle; b) evaluating a subset of a data traffic associated with the network element of a motor vehicle; c) implementing a network-based, attack recognition system for a motor vehicle, on a computing unit of an automotive switch; d) taking into consideration a portion of the data traffic associated with a situation and/or an operating state; e) configuring or reconfiguring, as a function of the situation, at least one aspect of a device carrying out the method, filter rules and/or hardware rule sets.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
[0038] Exemplary specific embodiments,
[0039] In further exemplary specific embodiments, it is provided that first network element 10 is designed for coupling multiple further network elements 11a, 11b, 11c, first network element 10, for example, being a switch, e.g., for automotive applications, for example for motor vehicles.
[0040] In further exemplary specific embodiments,
[0041] In further exemplary specific embodiments,
[0042] In further exemplary specific embodiments,
[0043] In further exemplary specific embodiments,
[0044] In further exemplary specific embodiments, it is provided that configuration 124 and/or reconfiguration of filter rules FR is/are carried out dynamically, for example during the run time or during an operation of a device 200 carrying out the method (
[0045] In further exemplary specific embodiments, it is provided that the data traffic which does not belong to subset DV′ is not evaluated and/or is disregarded during evaluation 102, 122.
[0046] In further exemplary specific embodiments,
[0047] In further exemplary specific embodiments,
[0048] In further exemplary specific embodiments,
[0049] In further exemplary specific embodiments,
[0050] In further exemplary specific embodiments, it is provided that situation SIT, SIT-1, SIT-2 and/or operating state BZ-1, BZ-2 include(s) at least one of the following elements: a) diagnosis; b) update; c) energy mode, e.g., energy-saving mode, e.g., low power mode, e.g., sleep state; d) drive modes, e.g., forward, gear, backward, etc.; e) modes such as sports mode, ECO, comfort, emergency running, etc.; f) seasons; g) weather conditions; h) road conditions; i) presence of a trailer load, e.g., trailer attached; and j) smart phone connected.
[0051]
[0052] In further exemplary specific embodiments, it is provided that a comparatively specific analysis of data traffic DV or of a corresponding specific subset DV′ is carried out during start E1.
[0053] In further exemplary specific embodiments, it is provided that a comparatively comprehensive analysis of data traffic DV or of a corresponding specific subset DV′ is carried out during normal operation E2.
[0054] Element E3, by way of example, symbolizes a multitude of possible vehicle states, and element E4, by way of example, symbolizes a multitude of possible IDS events, i.e., events of an attack recognition system (IDS).
[0055] Arrow a2, by way of example, symbolizes a change from normal operation E2 to, e.g., one of multiple possible vehicle states, and arrow a3, by way of example, symbolizes a change from normal operation E2 to, e.g., one of multiple possible IDS events or states characterized thereby.
[0056] State transitions between elements E3, E4, as they may occur according to further exemplary specific embodiments, are symbolized by way of example by arrows a4, a5 in
[0057] In further exemplary specific embodiments, a comparatively specific analysis of data traffic DV or of a comparatively specific subset DV′ of data traffic DV may be carried out, e.g., at least temporarily, which in further exemplary specific embodiments has the goal, e.g., of analyzing, for example as completely as possible, a data traffic relevant for the particular situation. In further exemplary specific embodiments, an analysis of the entire data traffic DV which is as complete as possible is, e.g., at least briefly negligible.
[0058] In further exemplary specific embodiments, e.g., at least one rule set and, e.g., maximally as many rule sets (e.g., specific rule sets) as are necessary for the analysis may be stored for a comparatively specific analysis, which are, for example selectively, usable in further exemplary specific embodiments.
[0059] In further exemplary specific embodiments, one or multiple of these rule sets may, for example, be used to analyze a data traffic, which, e.g., is exclusively relevant for the situation, or a corresponding subset DV′ of data traffic DV.
[0060] In further exemplary specific embodiments, one or multiple of these, e.g., comparatively specific rule sets may be loaded or used once, for example for the duration of the specific situation, and, for example, cannot be changed throughout this duration.
[0061] In further exemplary specific embodiments, various rule sets may be reloaded and/or used, for example dynamically, for example based on a predefinable planning algorithm PA (
[0062] In further exemplary specific embodiments, a change between, e.g., a comprehensive and, e.g., a specific analysis of at least a subset DV′ of the data traffic may, e.g., take place as follows, cf.
[0063] In further exemplary specific embodiments, the attention in normal operating situations E2 of the vehicle is turned e.g., to a preferably comprehensive analysis of the data traffic. In this situation E2, in further exemplary specific embodiments, the possibly comparatively comprehensive rule sets for starting E1 are thus, e.g., regularly, re-loaded, e.g., by a selected scheduling algorithm PA (
[0064] In further exemplary specific embodiments, situations in which such a change may be useful are, e.g., various vehicle states, such as for example: update, low power mode (sleep), drive modes (forward, gear, backward, etc.), modes (sports, ECO, comfort, emergency running, etc.), seasons/weather conditions, road conditions, trailer attached, or smart phone connected.
[0065] In further exemplary specific embodiments, an, e.g., further possible, reason for the loading or use of specific rule sets HR may be recognized/reported IDS events E4. If, according to further exemplary specific embodiments, an anomaly is established, e.g., during an IDS, it may be useful to specifically examine the data traffic affected by the anomaly. When, for example in further exemplary specific embodiments, an anomaly is recognized with a transport control protocol (TCP), it may be useful in further exemplary specific embodiments to at least temporarily examine the TCP data traffic more closely, e.g., in the near future.
[0066] When, in further exemplary specific embodiments, the vehicle state, e.g., switches into the normal state again and/or no further IDS anomaly has occurred for a certain time, in further exemplary specific embodiments the IDS also switches into the normal state again, and thus, e.g., into the comprehensive network analysis or comprehensive analysis of data traffic DV or a comparatively comprehensive subset DV′ of data traffic DV.
[0067] If, in further exemplary specific embodiments, the IDS is, e.g., in a state specific to the vehicle state and an IDS event occurs, it may be useful in further exemplary specific embodiments to combine the two specific rule sets with one another.
[0068] If, in further exemplary specific embodiments, the IDS is in an IDS event-specific state, and the vehicle transitions into a different vehicle state, cf. arrow a5 according to
[0069] In further exemplary specific embodiments, it may furthermore be provided that the previously IDS-specific rule set no longer plays a role in the new state of the vehicle, and the vehicle-specific state accordingly “overwrites” the IDS-specific state.
[0070] Further exemplary specific embodiments,
[0071] In further exemplary specific embodiments, it is provided that device 200 includes: a computing unit (“computer”) 202 including, e.g., at least one computing core 202a, 202b, 202c, a memory unit 204 assigned to computing unit 202 for at least temporarily storing at least one of the following elements: a) data DAT; and b) computer program PRG, in particular, for carrying out the method according to the specific embodiments.
[0072] In further exemplary specific embodiments, data DAT may at least temporarily include subset DV′ of data traffic DV and/or data derivable therefrom, for example with the aid of evaluation 102, 122.
[0073] In further exemplary specific embodiments, memory unit 204 includes a volatile memory 204a (e.g., a working memory (RAM)), and/or a non-volatile memory 204b (e.g., a Flash EEPROM), or a combination thereof or with other, not explicitly described memory types.
[0074] Further exemplary specific embodiments relate to a computer-readable memory medium SM, encompassing commands PRG, which, during the execution by a computer 202, prompt the computer to carry out the method according to the specific embodiments.
[0075] Further exemplary specific embodiments relate to a computer program PRG, encompassing commands which, during the execution of program PRG by a computer 202, prompt the computer to carry out the method according to the specific embodiments.
[0076] Further exemplary specific embodiments relate to a data medium signal DCS which transfers and/or characterizes computer program PRG according to the specific embodiments. For example, data medium signal DCS is transferrable via an optional data interface 206.
[0077] In further exemplary specific embodiments, device 200 according to
[0078] In further exemplary specific embodiments, the principle according to the specific embodiments may, e.g., be used to carry out a comprehensive analysis of the network traffic, e.g., with the goal of achieving a greatest possible coverage of the analyzed network traffic, e.g., without analyzing the entire network traffic DV.
[0079] In further exemplary specific embodiments, a situation-dependent reconfiguration may take place, e.g., with the goal of analyzing network traffic DV as comprehensively or as specifically as possible.
[0080] During the comprehensive analysis of the network traffic according to further exemplary specific embodiments, e.g., preferably many different parts of the network traffic are to be analyzed, e.g., to achieve a greatest possible coverage of the network traffic, e.g., without analyzing the entire network traffic in the process.
[0081] During the specific analysis of the network traffic according to further exemplary specific embodiments, e.g., as much as possible is to be analyzed of network traffic relevant for situation SIT. This network traffic is a specifiable portion DV′ of the entire network traffic DV. The remaining network traffic, e.g., plays a minor role in this situation and is not analyzed in further exemplary specific embodiments.
[0082] Further exemplary specific embodiments,