Guidelines for an intrusion prevention system for connected vehicles |
|
Recommendation ITU-T X.1377 establishes guidelines for an intrusion prevention system (IPS) for connected vehicles. This Recommendation mainly focuses on aspects of active response capability for intrusion and includes the implementation guidance and use cases of IPS for connected vehicles.
Prior in-vehicle intrusion detection systems (IDSs) have limitations, e.g., requiring too many computing resources that a vehicle cannot provide and being unable to mitigate intrusions due to characteristics of protocol and bus topology. To overcome these limitations of conventional in-vehicle IDSs, this Recommendation provides methodologies for both intrusion detection and intrusion prevention. The proposed IPS consists of the intrusion detection plane – an external component with intrusion detection algorithms – and the data plane – in-vehicle networks (IVNs) where traffic monitoring and active response happen. This Recommendation aims to protect (automotive) Ethernet-based IVNs.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/15103 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1370-X.1399: Intelligent transportation system (ITS) security |
Approval date: |
2022-10-14 |
Provisional name: | X.ipscv |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1377 (10/2022)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|