Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle

Attack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity. For the purpose of promoting cybersecurity research capabili...

Full description

Bibliographic Details
Main Authors: Wang Yafei, Han Shengqiang, Zhang Nan, Hu Peng
Format: Article
Language:English
Published: EDP Sciences 2021-01-01
Series:E3S Web of Conferences
Subjects:
Online Access:https://www.e3s-conferences.org/articles/e3sconf/pdf/2021/44/e3sconf_vesep2020_01010.pdf
id doaj-b4c7c4562c0b4786963c55e8418cdfdc
record_format Article
spelling doaj-b4c7c4562c0b4786963c55e8418cdfdc2021-06-18T08:19:36ZengEDP SciencesE3S Web of Conferences2267-12422021-01-012680101010.1051/e3sconf/202126801010e3sconf_vesep2020_01010Study on cybersecurity attack-defense visualization method based on intelligent connected vehicleWang YafeiHan ShengqiangZhang NanHu PengAttack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity. For the purpose of promoting cybersecurity research capabilities, a novel Cybersecurity Attack-Defense Visualization method based on Intelligent Connected Vehicle (CADV-ICV) is proposed. In this scheme, an Attack-Defense Game model (ADG) is designed so that the logical relationship between the attack and defense can be studied through a system architecture. Then, the CADV-ICV method is implemented through three layers that are hardware layer, software layer and visualization layer. Finally, through an Intelligent Connected Vehicle, two TV monitors, a computer and a server, a real experimental environment is built to test the CADV-ICV method. The experimental results show that CADV-ICV can realize the visual display of attack-defense process, attack messages, defense state, real-time message monitoring, and attack-defense principle for 10 car’s components.https://www.e3s-conferences.org/articles/e3sconf/pdf/2021/44/e3sconf_vesep2020_01010.pdfintelligent connected vehiclecybersecurityattack-defensevisualization
collection DOAJ
language English
format Article
sources DOAJ
author Wang Yafei
Han Shengqiang
Zhang Nan
Hu Peng
spellingShingle Wang Yafei
Han Shengqiang
Zhang Nan
Hu Peng
Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
E3S Web of Conferences
intelligent connected vehicle
cybersecurity
attack-defense
visualization
author_facet Wang Yafei
Han Shengqiang
Zhang Nan
Hu Peng
author_sort Wang Yafei
title Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
title_short Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
title_full Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
title_fullStr Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
title_full_unstemmed Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
title_sort study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
publisher EDP Sciences
series E3S Web of Conferences
issn 2267-1242
publishDate 2021-01-01
description Attack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity. For the purpose of promoting cybersecurity research capabilities, a novel Cybersecurity Attack-Defense Visualization method based on Intelligent Connected Vehicle (CADV-ICV) is proposed. In this scheme, an Attack-Defense Game model (ADG) is designed so that the logical relationship between the attack and defense can be studied through a system architecture. Then, the CADV-ICV method is implemented through three layers that are hardware layer, software layer and visualization layer. Finally, through an Intelligent Connected Vehicle, two TV monitors, a computer and a server, a real experimental environment is built to test the CADV-ICV method. The experimental results show that CADV-ICV can realize the visual display of attack-defense process, attack messages, defense state, real-time message monitoring, and attack-defense principle for 10 car’s components.
topic intelligent connected vehicle
cybersecurity
attack-defense
visualization
url https://www.e3s-conferences.org/articles/e3sconf/pdf/2021/44/e3sconf_vesep2020_01010.pdf
work_keys_str_mv AT wangyafei studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle
AT hanshengqiang studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle
AT zhangnan studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle
AT hupeng studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle
_version_ 1721373284311760896