Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle
Attack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity. For the purpose of promoting cybersecurity research capabili...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2021-01-01
|
Series: | E3S Web of Conferences |
Subjects: | |
Online Access: | https://www.e3s-conferences.org/articles/e3sconf/pdf/2021/44/e3sconf_vesep2020_01010.pdf |
id |
doaj-b4c7c4562c0b4786963c55e8418cdfdc |
---|---|
record_format |
Article |
spelling |
doaj-b4c7c4562c0b4786963c55e8418cdfdc2021-06-18T08:19:36ZengEDP SciencesE3S Web of Conferences2267-12422021-01-012680101010.1051/e3sconf/202126801010e3sconf_vesep2020_01010Study on cybersecurity attack-defense visualization method based on intelligent connected vehicleWang YafeiHan ShengqiangZhang NanHu PengAttack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity. For the purpose of promoting cybersecurity research capabilities, a novel Cybersecurity Attack-Defense Visualization method based on Intelligent Connected Vehicle (CADV-ICV) is proposed. In this scheme, an Attack-Defense Game model (ADG) is designed so that the logical relationship between the attack and defense can be studied through a system architecture. Then, the CADV-ICV method is implemented through three layers that are hardware layer, software layer and visualization layer. Finally, through an Intelligent Connected Vehicle, two TV monitors, a computer and a server, a real experimental environment is built to test the CADV-ICV method. The experimental results show that CADV-ICV can realize the visual display of attack-defense process, attack messages, defense state, real-time message monitoring, and attack-defense principle for 10 car’s components.https://www.e3s-conferences.org/articles/e3sconf/pdf/2021/44/e3sconf_vesep2020_01010.pdfintelligent connected vehiclecybersecurityattack-defensevisualization |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Wang Yafei Han Shengqiang Zhang Nan Hu Peng |
spellingShingle |
Wang Yafei Han Shengqiang Zhang Nan Hu Peng Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle E3S Web of Conferences intelligent connected vehicle cybersecurity attack-defense visualization |
author_facet |
Wang Yafei Han Shengqiang Zhang Nan Hu Peng |
author_sort |
Wang Yafei |
title |
Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle |
title_short |
Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle |
title_full |
Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle |
title_fullStr |
Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle |
title_full_unstemmed |
Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle |
title_sort |
study on cybersecurity attack-defense visualization method based on intelligent connected vehicle |
publisher |
EDP Sciences |
series |
E3S Web of Conferences |
issn |
2267-1242 |
publishDate |
2021-01-01 |
description |
Attack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity. For the purpose of promoting cybersecurity research capabilities, a novel Cybersecurity Attack-Defense Visualization method based on Intelligent Connected Vehicle (CADV-ICV) is proposed. In this scheme, an Attack-Defense Game model (ADG) is designed so that the logical relationship between the attack and defense can be studied through a system architecture. Then, the CADV-ICV method is implemented through three layers that are hardware layer, software layer and visualization layer. Finally, through an Intelligent Connected Vehicle, two TV monitors, a computer and a server, a real experimental environment is built to test the CADV-ICV method. The experimental results show that CADV-ICV can realize the visual display of attack-defense process, attack messages, defense state, real-time message monitoring, and attack-defense principle for 10 car’s components. |
topic |
intelligent connected vehicle cybersecurity attack-defense visualization |
url |
https://www.e3s-conferences.org/articles/e3sconf/pdf/2021/44/e3sconf_vesep2020_01010.pdf |
work_keys_str_mv |
AT wangyafei studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle AT hanshengqiang studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle AT zhangnan studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle AT hupeng studyoncybersecurityattackdefensevisualizationmethodbasedonintelligentconnectedvehicle |
_version_ |
1721373284311760896 |