Specification Of Intrusion Detection System Manager - AUTOSAR

1y ago
4 Views
2 Downloads
1.20 MB
104 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Mya Leung
Transcription

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-11Document TitleSpecification of IntrusionDetection System ManagerDocument OwnerAUTOSARDocument ResponsibilityAUTOSARDocument Identification No977Document StatuspublishedPart of AUTOSAR StandardClassic PlatformPart of Standard ReleaseR20-11Document Change HistoryDateRelease2020-11-30R20-111 of 104Changed byAUTOSARReleaseManagementDescription Initial releaseDocument ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-11DisclaimerThis work (specification and/or software implementation) and the material contained init, as released by AUTOSAR, is for the purpose of information only. AUTOSAR and thecompanies that have contributed to it shall not be liable for any use of the work.The material contained in this work is protected by copyright and other types of intellectual property rights. The commercial exploitation of the material contained in thiswork requires a license to such intellectual property rights.This work may be utilized or reproduced without any modification, in any form or byany means, for informational purposes only. For any other purpose, no part of the workmay be utilized or reproduced, in any form or by any means, without permission inwriting from the publisher.The work has been developed for automotive applications only. It has neither beendeveloped, nor tested for non-automotive applications.The word AUTOSAR and the AUTOSAR logo are registered trademarks.2 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-11Table of Contents1 Introduction and functional overview72 Acronyms and Abbreviations83 Related documentation3.13.210Related Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . .Input Documents & Related Standards and Norms . . . . . . . . . . .4 Constraints and assumptions4.14.211Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Applicability to Car Domains . . . . . . . . . . . . . . . . . . . . . . . .5 Dependencies to other modules5.1Interfaces to Modules . . . . . . . . . . .5.1.1Sensor Modules . . . . . . . .5.1.2Error Handling Modules . . .5.1.3Diagnostic Access . . . . . . .5.1.4Persistence of Reporting Level5.1.5IdsR Sink . . . . . . . . . . . .5.1.6Dem / Sem Sink . . . . . . . .5.1.7BSW Scheduler . . . . . . . .5.2File Structure . . . . . . . . . . . . . . .5.2.1Code File Structure . . . . . .5.2.2Header File Structure . . . . .1010111112.12121313131313131314146 Requirements Tracing157 Functional specification167.17.27.37.47.57.63 of 104Overview . . . . . . . . . . . . . . . . . .Module Handling . . . . . . . . . . . . .7.2.1Initialization . . . . . . . . . . .7.2.2Timing Related Functionality .Reception and Buffering of Events . . .7.3.1Reception of Events . . . . . .7.3.1.1Smart Sensors . . . .7.3.2Security Event Definition . . .7.3.3Buffers . . . . . . . . . . . . .IdsM Internal SEvs . . . . . . . . . . . .Qualification of SEvs . . . . . . . . . . .Filter Chain . . . . . . . . . . . . . . . .7.6.1Blocker Filters . . . . . . . . .7.6.1.1Reporting Mode Filter7.6.1.2Block State Filter . . .7.6.2Sampling Filters . . . . . . . .7.6.2.1Forward Every Nth . .1617181919191920222324242626272828Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-117.6.37.77.87.97.107.117.12Aggregation Filters . . . . . . . . . . . . .7.6.3.1Event Aggregation Filter . . . . .7.6.3.2Event Threshold Filter . . . . . .7.6.4Rate Limitation Filters . . . . . . . . . . .7.6.4.1Event Rate Limitation . . . . . . .7.6.4.2Traffic Limitation . . . . . . . . .Timestamp . . . . . . . . . . . . . . . . . . . . . .Reporting and Persistence of SEVs . . . . . . . . .7.8.1Structure Of QSEVs . . . . . . . . . . . .7.8.2Propagation of QSEvs: IdsR Sink . . . .7.8.2.1Authenticity of QSEvs: Signature7.8.2.2IDS Service Interface Options . .7.8.2.3Transmission Protocols . . . . . .7.8.3Storage of Events: Dem / Sem Sink . . .Persistence in NvM of Configuration . . . . . . . .Diagnostics for SEvs . . . . . . . . . . . . . . . . .7.10.1Reconfiguration of SEvs . . . . . . . . . .7.10.2Reading of SEvs Reporting Mode . . . .Error Classification . . . . . . . . . . . . . . . . . .7.11.1Development Errors . . . . . . . . . . . .7.11.2Runtime Errors . . . . . . . . . . . . . . .7.11.3Transient Faults . . . . . . . . . . . . . .7.11.4Production Errors . . . . . . . . . . . . .7.11.5Extended Production Errors . . . . . . . .Error Detection and Notification . . . . . . . . . . .7.12.1Api Parameter Checking . . . . . . . . .8 API specification8.18.244Imported Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Type Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8.2.1IdsM ConfigType . . . . . . . . . . . . . . . . . . . . . . .8.2.2IdsM Filters BlockStateType . . . . . . . . . . . . . . . . .8.2.3IdsM Filters ReportingModeType . . . . . . . . . . . . . .8.2.4IdsM TimestampType . . . . . . . . . . . . . . . . . . . . .8.3Function Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . .8.3.1IdsM Init . . . . . . . . . . . . . . . . . . . . . . . . . . . .8.3.2IdsM GetVersionInfo . . . . . . . . . . . . . . . . . . . . .8.3.3IdsM MainFunction . . . . . . . . . . . . . . . . . . . . . .8.3.4IdsM CopyTxData . . . . . . . . . . . . . . . . . . . . . . .8.3.5IdsM SetSecurityEvent . . . . . . . . . . . . . . . . . . . .8.3.6IdsM SetSecurityEventWithContextData . . . . . . . . . .8.3.7IdsM SetSecurityEventWithCount . . . . . . . . . . . . . .8.3.8IdsM SetSecurityEventWithCountContextData . . . . . . .8.3.9IdsM SetSecurityEventWithTimestampCount . . . . . . . .8.3.10IdsM SetSecurityEventWithTimestampCountContextData .8.4Callback Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . .4 of 14142.444444454545464646474749495050515152Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-118.4.1IdsM BswM StateChanged . . . . . . . . . . .8.4.2IdsM TpTxConfirmation . . . . . . . . . . . . . .8.4.3IdsM TxConfirmation . . . . . . . . . . . . . . .8.4.4IdsM Dcm GetReportingMode RequestResults8.4.5IdsM Dcm GetReportingMode Start . . . . . .8.4.6IdsM Dcm SetReportingMode Start . . . . . .8.5Scheduled Functions . . . . . . . . . . . . . . . . . . . . .8.6Expected Interfaces . . . . . . . . . . . . . . . . . . . . .8.6.1Mandatory Interfaces . . . . . . . . . . . . . . .8.6.2Optional Interfaces . . . . . . . . . . . . . . . . .8.7Service Interfaces . . . . . . . . . . . . . . . . . . . . . . .8.7.1Client-Server Interfaces . . . . . . . . . . . . . .8.7.2IdsM IdsMService . . . . . . . . . . . . . . . . .8.7.3IdsM SmartSensorService . . . . . . . . . . . .8.7.4IdsM CustomTimestamp . . . . . . . . . . . . .8.7.5Implementation Data Types . . . . . . . . . . . .8.7.6IdsM ContextDataType . . . . . . . . . . . . . .8.7.7IdsM SecurityEventIdType . . . . . . . . . . . .8.7.8Ports . . . . . . . . . . . . . . . . . . . . . . . .8.7.8.1Port IdsM IdsMService . . . . . . . . .8.7.8.2Port IdsM IdsMSmartSensorService . .8.7.8.3Port IdsM CustomTimestamp . . . . . .9 Sequence diagrams9.19.264Proposal for DEM / Sem Sequence Diagram . . . . . . . . . . . . . . .Timestamp Sequence Diagrams . . . . . . . . . . . . . . . . . . . . . .10 Configuration specification10.1 Containers and configuration parameters10.1.1IdsM . . . . . . . . . . . . . . .10.1.2IdsMGeneral . . . . . . . . . ation . . .10.1.6IdsMConfiguration . . . . . . .10.1.7IdsMFilterChain . . . . . . . .10.1.8IdsMBlockStateFilter . . . . . .10.1.9IdsMBlockState . . . . . . . .10.1.10IdsMForwardEveryNthFilter . .10.1.11IdsMEventAggregationFilter . .10.1.12IdsMEventThresholdFilter . . .10.1.13IdsMEvent . . . . . . . . . . .10.1.14IdsMReportingModeFilter . . .10.1.15IdsMPdus . . . . . . . . . . . .10.1.16IdsMIfTxPdu . . . . . . . . . .10.1.17IdsMEventTpTxPdu . . . . . .10.1.18IdsMBufferConfiguration . . .5 of 466.66666774757779808284858688899595969899Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-1110.1.19IdsMContextDataBuffer . . .10.1.20IdsMEventBuffers . . . . . .10.1.21IdsMServiceInterfaceOptions10.2 Configuration Constraints . . . . . . .10.3 Published Information . . . . . . . . .6 of 104.100101102104104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-111Introduction and functional overviewThis specification describes the functionality, API, and the configuration for theAUTOSAR Basic Software module Intrusion Detection System Manager (IdsM).The IdsM is part of the AUTOSAR Intrusion Detection System (IDS).An overview and description of the elements of a distributed IDS according toAUTOSAR is available in the IDS requirement specification [1].The software component IdsM provides a standardized interface for receiving notifications of on-board security events SEv. The SEvs can be reported by security sensorsimplemented in Basic Software Modules (BSW) and application Software Components(SW-C).Additionally, the SEvs can be reported with optional context data such as event typeand suspicious data, which can be useful information for the security forensic performed at the backend.Besides collecting, the IdsM has the capability of qualifying SEvs according to configurable rules. The IdsM filters and transforms reported SEvs to qualified on-boardsecurity events (QSEv). The QSEv are further handled by the IdsM for storage or forwarding.Depending on the overall security concept, QSEv can be persisted locally on the ECUvia Security Event Memory (Sem), propagated towards configured sinks, or both. Theavailable sinks are the Diagnostic Event Manager (Dem) module and the IDS ReporterModule (IdsR), which might pass the QSEv data to a security operation center (SOC)in the backend.7 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-112Acronyms and AbbreviationsThe glossary below includes acronyms and abbreviations relevant to the Intrusion Detection System Manager module that are not included in the AUTOSAR TR Glossary[2].Abbreviation / Acronym:APIBSWBswMCDDClassic RAMOEMPDUPDU pplication Programming InterfaceBasic SoftwareBasic Software Mode ManagerComplex Device DriverAUTOSAR Classic PlatformCrypto Service ManagerDiagnostic Communication ManagerDiagnostic Event Manager moduleDefault Error TracerElectronic Control UnitECU configurationIdentifierIntrusion Detection SystemIntrusion Detection System ManagerIntrusion Detection System ReporterInterfaceMicrocontroller UnitNon-volatile memoryNon-volatile random access memoryOriginal Equipment ManufacturerProtocol Data UnitPDU IdentifierPDU RouterQualified Security EventRuntime EnvironmentSecurity ExtractSecurity Event MemoryOn-board Security EventSynchronized Time-Base ManagerSoftware ComponentSecurity Operation CenterTransport ProtocolTerms:Context Data BufferDescription:Buffer with variable sizes to fit to the needs of the context data ofthe SEvs.Relevant information to a SEv. It is optional data that provides abroader understanding of the security event (e.g. the corrupteddata ). The content and encoding of the context data is externallydefined by the sensor and unknown to the IdsM module.Buffer to temporarily store the reported SEv IDS.A modifier of the security events which can drop or alter an incoming SEv.One configured sequence of filters.Context DataEvent BufferFilterFilter Chain8 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-11Terms:IdsM block stateIntrusionManagerIdsRDetectionSystemQualified Security Event (QSEv)Security Event (SEv)Security Event TypeSemSensorSinkTimestamp Provider9 of 104Description:State reported by the BswM via IdsM BswM StateChanged.The states are used to suspend the collection of security events.The Intrusion Detection System Manager handles security eventsreported by security sensors.The IdsR is an OEM specific adaptive application that can beused to further propagate the QSEvs to the SOC.Events that have passed their corresponding filter chain and aresent to the configured sink.On-board Security Events are instances of security event typeswhich are reported by BSW or SW-C to the IdsM. They are structured data originating from a sensor which serve as fundamentalinput and output data format for filters. These reported events tothe IdsM that are indicative of an ongoing attack or are somehowsuited to assess the security state of the vehicle. This meansthat events can occur during the normal operation without anyongoing attack.A security event type can be identified by its security event typeID. Instances of security event types are called security eventsand share the same security event type ID.Security event memory is a Dem Module user defined memorywhich is separated from the Dem’s primary memory.Reporting identity that informs the IdsM module about SEvs. Itcan be a BSW Module, a proprietary CDD or an SW-C Application.Destination of a QSEv. Depending on the configuration the QSEvcan be persisted, propagated or both.Service or SW-Component which provides a TimeStamp. e.g. inCP Stbm.Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-113Related documentation3.1Related SpecificationAUTOSAR provides a General Specification on Basic Software modules [3], which isalso valid for the Intrusion Detection Manager.Thus, the specification SWS BSW General shall be considered as additional and required specification for the Intrusion Detection Manager.This document is part of the AUTOSAR IDS specification and covers aspects specificto Classic Platform only. For other aspects of the IDS specification, please referto the following documents: AUTOSAR RS Intrusion Detection System [1]: Specifies IDS system requirements. AUTOSAR PRS IntrusionDetectionSystem [4]: Specifies the communicationprotocol for the transmission of security events. AUTOSAR MOD GeneralDefinitions [5]: Standardized Security Events reported by AUTOSAR BSW AUTOSAR TPS SecurityExtractTemplate [6]: Specifies the Security Extract.3.2Input Documents & Related Standards and Norms[1] Requirements on Intrusion Detection SystemAUTOSAR RS IntrusionDetectionSystem[2] GlossaryAUTOSAR TR Glossary[3] General Specification of Basic Software ModulesAUTOSAR SWS BSWGeneral[4] Specification of Intrusion Detection System ProtocolAUTOSAR PRS IntrusionDetectionSystem[5] Standardized M1 Models used for the Definition of AUTOSARAUTOSAR MOD GeneralDefinitions[6] Security Extract TemplateAUTOSAR TPS SecurityExtractTemplate[7] General Requirements on Basic Software ModulesAUTOSAR SRS BSWGeneral10 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-114Constraints and assumptions[SWS IdsM CONSTR 00001] dThe Intrusion Detection Manager has no knowledgeof the meaning of the Context Data reported within a SEv; thus, it can not determineindependently if a system has being compromised or not. Identification and threatresponse is realized outside of the scope of IdsM, e.g., in a SOC.c()4.1AssumptionsThe following assumptions have been made in the design of the IdsM concept: Precision of timestamps: The timestamps of events received by the backendmay be inaccurate to some degree. However, it shall be possible in most casesto extract the order of events from the events received by the backend. In somecases, this might not be possible, e.g., because of events occurring in parallel ondifferent ECUs or because of inherent tolerances in time synchronization. Uniqueness of QSEv: Events do not need to be uniquely identifiable. Two eventsmay contain the same data. Dropping of events: It is acceptable that SEvs are dropped depending on theirreporting frequency and criticality, e.g., a general overload of the system. Semantics of events: Security-related events are indicative of a potential ongoing attack or are somehow suited to assess the security state of the vehicle.Meaning that events can occur during the normal operation without any attackhappening.4.2Applicability to Car DomainsThe AUTOSAR Intrusion Detection System Manager is generic and provides flexibleconfiguration. It is independent of the underlying communication system and can beapplied to any automotive domain under limitations and assumptions provided above.11 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-115Dependencies to other modules5.1Interfaces to ModulesThe AUTOSAR Intrusion Detection System Manager includes header files ofthe modules BswM, Dcm, DET, Dem, NvM, PduR, and the RTE. Furthermore, it providesgeneric interfaces to Basic Software Modules and Software Components (Sensors) forreporting their SEvs.Figure 5.1 shows the interfaces provided to and required from other modules in theAUTOSAR BSW.StbMRteStbM GetCurrentTime()DcmSensorBswMRte Call CustomTimestamp m InterfaceuseIdsM Dcm GetReportingMode Start()IdsM Dcm GetReportingMode RequestResults()IdsM Dcm SetReportingMode Start()Det ReportError()usePduRPduR IdsMTransmit()«EmbeddedInterface»Sensor InterfaceIdsM SetSecurityEvent()IdsM SetSecurityEventWithContextData()IdsM SetSecurityEventWithCount()IdsM SetSecurityEventWithCountContextData()IdsM SetSecurityEventWithTimestampCount()IdsM mbeddedInterface»BswM InterfaceIdsM BswM StateChanged()use«EmbeddedInterface»PduR InterfaceuseIdsM TxConfirmation()IdsM CopyTxData()IdsM rnal Submodules and APIs«EmbeddedInterface»Csm Interfaceuse«EmbeddedInterface»NvM InterfaceuseIdsM NvMRamBlockDataIdsM NvMRomBlockDataFigure 5.1: IdsM’s interfaces to other modules5.1.1Sensor ModulesThe IdsM provides generic IdsM interfaces that notify Security Events (SEvs) withadditional information depending on the configuration.Standard API Used by the Basic Software Modules and by Software Components. Notification of a SEv Notification of a SEv with context dataSmart Sensor API Used by software components in cases in which it is necessaryto transmit an event count and a timestamp. These additional parameters are alreadycalculated by a smart sensor. They are located either in a SW-C or a Cdd. Notification of a SEv with a counter12 of 104CsmCsm SignatureGenerate()IdsM CsmNotification()Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManagerNvMNvM WriteBlock()NvM GetErrorStatus()

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-11 Notification of a SEv with a counter and context data Notification of a SEv with a timestamp and a counter Notification of a SEv with a timestamp, a counter and context data5.1.2Error Handling ModulesIdsM reports development errors to the Default Error Tracer.5.1.3Diagnostic AccessThe Dcm module is able to modify the configuration of the events’ reporting level.5.1.4Persistence of Reporting LevelThe NvM module persists the configuration values of the events’ reporting level.5.1.5IdsR SinkThe PduR is used in case the events are configured to be sent to the IdsR sink; Thesending of the events is bus independent.5.1.6Dem / Sem SinkThe Dem module is used in case the events are configured to be logged in the Dem /Sem sink.5.1.7BSW SchedulerThe IdsM needs cyclic invocation of its main scheduling function in order to evaluateand handle the reported SEvs.5.2File StructureThis section explains the file structure of the IdsM.13 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-115.2.1Code File StructureFor details, refer to the section 5.1.6 “Code file structure” in [3, SWS BSW General].5.2.2Header File StructureBesides the files defined in section 5.1.7 “Header file structure” in [3, SWS BSW General], the Intrusion Detection System Manager module needs to include the files defined below.[SWS IdsM 00101] dThe IdsM module shall include the header file Det.h if the parameter IdsMDevErrorDetect is enabled.c()[SWS IdsM 00102] dThe IdsM module shall include the header file Dem.h if the parameter IdsMSinkDem is enabled.c()[SWS IdsM 00103] dThe IdsM module shall include the header file Dcm.h if the parameter IdsMDiagnosticSupport is enabled.c()[SWS IdsM 00104] dThe IdsM module shall include the header file NvM.h if the parameter IdsMNvmBlockDescriptor is configured.c()[SWS IdsM 00105] dThe IdsM module shall include the header file PduR.h if theparameter IdsMSinkIdsR is enabled.c()14 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-116Requirements TracingThe following tables reference the requirements specified in the IDS requirement specification [1], the Specification of Intrusion Detection System Protocol [4, Specificationof Intrusion Detection System Protocol] and BSW General system requirement specification [7] and links to the fulfillment of these. Please note that if column “Satisfied by”is empty for a specific requirement this means that this requirement is not fulfilled bythis document.Requirement[DRAFT]DescriptionNo description[RS IDS 00300]Provide configurable filter chainsfor qualifying SEv[RS IDS 00301][RS IDS 00310][RS IDS 00320][RS IDS 00330]Provide multiple filter chainsConfigure reporting mode perSecurity Event Type and IdsMinstanceSupport machine state filterSupport sampling filter[RS IDS 00340]Support Aggregation filter[RS IDS 00350]Support Threshold filter[RS IDS 00502][RS IDS 00503]Event TimestampsTimestamp Sources[RS IDS 00505][RS IDS 00510]Authenticity of QSEvsThe IdsM shall allow to transmitQSEv to the IdsRLimit event rate and traffic[RS IDS 00511][RS IDS 00610]15 of 104Configuration of qualificationfilters for SEvSatisfied by[SWS IdsM 01600][SWS IdsM 01601][SWS IdsM 01602][SWS IdsM 01001][SWS IdsM 01003][SWS IdsM 01004][SWS IdsM 01005][SWS IdsM 01001][SWS IdsM 01012][SWS IdsM 01013][SWS IdsM 01023][SWS IdsM 01031][SWS IdsM 01032][SWS IdsM 01041][SWS IdsM 01043][SWS IdsM 01044][SWS IdsM 01045][SWS IdsM 01046][SWS IdsM 01047][SWS IdsM 01048][SWS IdsM 01049][SWS IdsM 01061][SWS IdsM 01062][SWS IdsM 01106][SWS IdsM 01107][SWS IdsM 01108][SWS IdsM 01109][SWS IdsM 01110][SWS IdsM 01112][SWS IdsM 01204][SWS IdsM 01203][SWS IdsM 01070][SWS IdsM 01081][SWS IdsM 01091][SWS IdsM 01002]Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-117Functional specification7.1OverviewThe Intrusion Detection functionality consists of collecting possible security events,handle them with filter rules and forward them towards configured sinks.This chapter specifies the functional behavior of the IdsM for the Classic Platform.Figure 7.1 shows how the IdsM is integrated in the AUTOSAR BSW security stack:Application LayerRTECryptoServicesCryptoHW Abstr.CryptoDriversMicrocontroller (µC)Crypto ServicesKey ManagerCrypto e 7.1: AUTOSAR BSW architecture showing the IdsM moduleThe modules that act as sensors and report SEvs towards the IdsM are: AUTOSAR Basic Software Modules (BSW) Proprietary Complex Device Drivers (CDD) Application Software Components (SW-C)The collected On-board Security Event SEvs are processed by a series of configuredrules called "Filter Chains" into QSEvs, which can be sent to the following sinks: Intrusion Detection System Reporter (IdsR), using the PduR for transmission ofthe QSEvs. Dem / Sem Module, for local persistence of the QSEv records.It is possible to reconfigure specific event parameters and filter qualifiers via diagnosticsusing the Dcm module. 7.10.1Optionally integrity and confidentiality of the QSEv records can be enforced via cryptoalgorithms.16 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-11Figure 7.2 shows the interaction with the modules mentioned above. The modulesCanIf, LinIf, EthIf, KeyM and SecOC are illustrated as BSW sensor examples.AppRTEMEMORY SERVICESSYSTEM SERVICESCRYPTO SERVICESCOMMUNICATION YPTO HARDWARE ABSTRACTIONEthIfCanIfCryIfCOMMUNICATION DRIVERSCRYPTO DRIVERSCrypto ( HSM )CanDrvEthDrvMicrocontrollerHSMFigure 7.2: Interaction of the IdsM with other stack modules7.2Module HandlingThe functionality of the IdsM is divided into the following functional sub-modules: Reception of Events Buffering of Events IdsM Internal SEvs Qualification of Events Reporting of QSEvs Persistence of specific parameter of events in NvM Read and Write specific parameters of events via diagnostics with DcmFigure 7.3 shows the allocation in the stack of the functional sub-modules listed above,these are described in detail throughout this chapter 7.17 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-11SW-CApplicationReport SEvRTERTEMEMORY SERVICESCOMMUNICATION SERVICESDcmCRYPTO SERVICESAccess QSEvrecordsReconfiguratespecificparameters ofCOMMUNICATION SERVICESSecOCIdsMBuffer SEv(Sensor example)Report SEvQualify SEvSEvPrepare QSEv forpersistenceNvmSYSTEM SERVICESPersistspecificparametersof SEvsPrepare QSEv fortransmissionPduRPropagate QSEvto IdsRDemSemPersist QSEVCsmPreparesignatureCRYPTO HARDWARE ABSTRACTIONCryIfCRYPTO DRIVERSMCALCrypto ( HSM)COMMUNICATION DRIVERSEthDrv(Sensor example)Report SEvHSMMicrocontrollerFigure 7.3: Functional modules of the IdsM.7.2.1InitializationThe IdsM module is initialized via IdsM Init. Except for IdsM GetVersionInfoand IdsM Init, the API functions of the IdsM module may only be called after themodule has been properly initialized.[SWS IdsM 00202] dA call to IdsM Init initializes all internal variables and sets theIdsM module to the initialized state.c()[SWS IdsM 00203] dIf development error reporting is enabled via IdsMDevErrorDetect, the IdsM module shall call Det ReportError with the error codeIDSM E PARAM UNINIT when any API other than IdsM Init or IdsM GetVersionInfo is called in uninitialized state.c()[SWS IdsM 00204] dWhen IdsM Init is called in initialized state, the IdsM module shall not re-initialize its internal variables. It shall instead call Det ReportErrorwith the error code IDSM E ALREADY INITIALIZED if development error reporting isenabled (see IdsMDevErrorDetect).c()18 of 104Document ID 977: AUTOSAR SWS IntrusionDetectionSystemManager

Specification of Intrusion Detection SystemManagerAUTOSAR CP R20-117.2.2Timing Related FunctionalityTo be able to handle the security events and their filters asynchronously, theIdsM module is triggered cyclically via the IdsM MainFunction.7.3Reception and Buffering of Events7.3.1Reception of EventsIf a sensor reports a security event via the IdsM services IdsM SetSecurityEvent or IdsM SetSecurityEventWithContextData, without and with context data respectively, an event buffer from the IdsM event buffer pool is used andprocessed asynchronously in the IdsM MainFunction function.If context data exists, a context data buffer with the adequate size will be used. If thereare currently no context buffers available, the event is processed without context data.The service IdsM SetSecurityEvent and IdsM SetSecurityEventWithContextData can be used by any sensor, independently of its source.[SWS IdsM 00300] dThe IdsM shall be able to receive SEvs with the service IdsM SetSecurityEvent when there no context data is reported.c()[SWS IdsM 00301] dThe IdsM shall be able to receive SEvs with the service IdsM SetSecurityEventWithContextData when the optional context data is reported.c()7.3.1.1Smart SensorsSmart sensors provide additional information to the standard sensors. The smart sensors can be a SW-C or a CDD which previously records a timestamp a

The IdsM is part of the AUTOSAR Intrusion Detection System (IDS). An overview and description of the elements of a distributed IDS according to AUTOSAR is available in the IDS requirement specification [1]. The software component IdsM provides a standardized interface for receiving notifica-

Related Documents:

c. Plan, Deploy, Manage, Test, Configure d. Design, Configure, Test, Deploy, Document 15. What are the main types of intrusion detection systems? a. Perimeter Intrusion Detection & Network Intrusion Detection b. Host Intrusion Detection & Network Intrusion Detection c. Host Intrusion Detection & Intrusion Prevention Systems d.

Intrusion Detection System Objectives To know what is Intrusion Detection system and why it is needed. To be familiar with Snort IDS/IPS. What Is Intrusion Detection? Intrusion is defined as “the act of thrusting in, or of entering into a place or state without invitation, right, or welcome.” When we speak of intrusion detection,

called as behaviour-based intrusion detection. Fig. 2: Misuse-based intrusion detection process Misuse-based intrusion detection is also called as knowledge-based intrusion detection because in Figure 2. it depicts that it maintains knowledge base which contains the signature or patterns of well-known attacks. This intrusion

There exists a number of intrusion detection systems particularly those that are open-source. These intrusion detection systems have their strengths and weaknesses when it comes to intrusion detection. This work compared the performance of open-source intrusion detection systems namely Snort, Suricata and Bro.

Intrusion Prevention: Signature Policies 201 Intrusion Prevention: Signature Policies - New 203 Intrusion Prevention: Sensors 204 Intrusion Prevention: Sensor - New 205 Intrusion Prevention: Sensor - Associating Sensor to a Firewall Policy 206 Intrusion Prevention: Alerts and Reports 208 Intrusion Prevention: View Rule File 210

Intrusion Detection System (IDS). Please see [1] for an overview of the IDS elements. The PRS IDS contributes to the IDS by providing the protocol for the transmission of qualified security events (QSEv) from an Intrusion Detection System Manager (IdsM) instance to an Intrusion Detection System Reporter (IdsR) instance. 1.1Protocol purpose and .

2. Evaluation of a Single Intrusion Detection System (IDS) A computer intrusion detection system (IDS) is con-cerned with recognizing whether an intrusion is being attempted into a computer system. An IDS provides some type of alarm to indicate its assertion that an intrusion is present. The alarm may be correct or incor-rect.

This chapter presents the corresponding research work on the intrusion detection and intrusion prevention in large-scale high-speed network environment and is organized as follows: firstly, a distributed extensible intrusion prevention system is provided, then various packet selection models for intrusion detection systems based-on sampling are