Specification Of Intrusion Detection System Protocol - AUTOSAR

1y ago
8 Views
2 Downloads
508.14 KB
32 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Ophelia Arruda
Transcription

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-11Document TitleSpecification of IntrusionDetection System ProtocolDocument OwnerAUTOSARDocument ResponsibilityAUTOSARDocument Identification No981Document StatuspublishedPart of AUTOSAR StandardFoundationPart of Standard ReleaseR21-11Document Change HistoryDate2021-11-252020-11-301 of 32ReleaseChanged byDescriptionR21-11AUTOSARReleaseManagement Improved explanations of protocolfields Increased consistency betweenoverview and detailed tables Corrections in frame size calculationR20-11AUTOSARReleaseManagement Initial releaseDocument ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-11DisclaimerThis work (specification and/or software implementation) and the material contained init, as released by AUTOSAR, is for the purpose of information only. AUTOSAR and thecompanies that have contributed to it shall not be liable for any use of the work.The material contained in this work is protected by copyright and other types of intellectual property rights. The commercial exploitation of the material contained in thiswork requires a license to such intellectual property rights.This work may be utilized or reproduced without any modification, in any form or byany means, for informational purposes only. For any other purpose, no part of the workmay be utilized or reproduced, in any form or by any means, without permission inwriting from the publisher.The work has been developed for automotive applications only. It has neither beendeveloped, nor tested for non-automotive applications.The word AUTOSAR and the AUTOSAR logo are registered trademarks.2 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-11Table of Contents1 Introduction and overview51.11.2Protocol purpose and objectives . . . . . . . . . . . . .Applicability of the protocol . . . . . . . . . . . . . . . .1.2.1Constraints and assumptions . . . . . . . . .1.2.2Limitations . . . . . . . . . . . . . . . . . . .1.3Dependencies . . . . . . . . . . . . . . . . . . . . . . .1.3.1Dependencies to other protocol layers . . . .1.3.2Dependencies to other standards and norms1.3.3Dependencies to the Application Layer . . .2 Use Cases2.17UC 0001 "Propagation of Qualified Security Events to the IdsR" . . . .3 Protocol Requirements3.1Requirements Traceability . . . . . . . . . . . . . . . . . . . . . . . . .3 of 3289Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Protocol specification5.1784 Definition of Terms and Acronyms4.14.25555666691011IDS Message Format . . . . . . . . . . . . . . . . . . . . . .5.1.1IDS Protocol Overview . . . . . . . . . . . . . . .5.1.2Endianess - Byte Order . . . . . . . . . . . . . . .5.1.3Independence of communication interface . . . .5.1.4IDS Event Frame . . . . . . . . . . . . . . . . . . .5.1.4.1Protocol Version and Header . . . . . . .5.1.4.1.1 Protocol Version . . . . . . . . . . .5.1.4.1.2 Protocol Header . . . . . . . . . . .5.1.4.2IdsM Instance ID and Sensor Instance ID5.1.4.2.1 IdsM Instance ID . . . . . . . . . . .5.1.4.2.2 Sensor Instance ID . . . . . . . . .5.1.4.3Event Definition ID . . . . . . . . . . . . .5.1.4.4Count . . . . . . . . . . . . . . . . . . . .5.1.4.5Reserved . . . . . . . . . . . . . . . . . .5.1.5Timestamp . . . . . . . . . . . . . . . . . . . . . .5.1.5.1Timestamp AUTOSAR . . . . . . . . . . .5.1.5.1.1 Nanoseconds . . . . . . . . . . . .5.1.5.1.2 Seconds . . . . . . . . . . . . . . .5.1.5.2Timestamp OEM . . . . . . . . . . . . . .5.1.6Context Data . . . . . . . . . . . . . . . . . . . . .5.1.6.1Context Data - Size Long . . . . . . . . .5.1.6.2Context Data - Size Short . . . . . . . . .5.1.7Context Data Length Encoding . . . . . . . . . . ument ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.85.25.35.45.5Signature . . . . . . . . . . . . . . . . . . . . . . . .5.1.8.1Signature Length . . . . . . . . . . . . . . .5.1.8.2Signature Data . . . . . . . . . . . . . . . .5.1.9IDS Message Separation . . . . . . . . . . . . . . .5.1.9.1IDS Message Separation Header . . . . . .5.1.9.2IDS Message Separation Header ID . . . .5.1.9.3IDS Message Separation Header Length . .5.1.10PDU Type . . . . . . . . . . . . . . . . . . . . . . . .5.1.11Example of IDS Messages . . . . . . . . . . . . . .5.1.11.1Example IDS Message with Maximum Size5.1.11.2Example IDS Message with minimum size .Message types . . . . . . . . . . . . . . . . . . . . . . . . . .Services / Commands . . . . . . . . . . . . . . . . . . . . . .Sequences (lower layer) . . . . . . . . . . . . . . . . . . . . .Error messages . . . . . . . . . . . . . . . . . . . . . . . . . .2323242526262627272728282828296 Configuration parameters307 Protocol usage and guidelines314 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-111Introduction and overviewThis Protocol Requirements Specification defines the format, message sequences andsemantics of the AUTOSAR Protocol Intrusion Detection System (IDS).The document RS IntrusionDetectionSystem [1] describes the elements of a distributedIntrusion Detection System (IDS). Please see [1] for an overview of the IDS elements.The PRS IDS contributes to the IDS by providing the protocol for the transmission ofqualified security events (QSEv) from an Intrusion Detection System Manager (IdsM)instance to an Intrusion Detection System Reporter (IdsR) instance.1.1Protocol purpose and objectivesAs described in [1] QSEv can be persisted locally on the ECU where the security eventwas qualified. Alternatively a QSEv can be send to the IdsR. The IDS protocolcovers the sending of the QSEv from the IdsM instance to the IdsR instance.1.2Applicability of the protocolThe IDS protocol supports a push-interface for QSEv. The IdsM instances pushQSEv which are configured accordingly to the IdsR. A pull interface is not covered bythis protocol. It could be realized by storing the QSEv locally in a appropriate component and then accessing the locally stored QSEv via regular diagnostic interfaces.1.2.1Constraints and assumptionsThere are no specific assumptions and constraints for using the IDS protocol. Itwas designed to work for all bus system. The software stack must be able to send andreceive I-PDUs. The IdsM does not support the reception of QSEvs.1.2.2LimitationsThere is no limit defined for the context data size. The recommendation is to set thelimit for a complete individual QSEv to 16 kByte.5 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-111.31.3.1DependenciesDependencies to other protocol layersIdsM instances on the Classic Platform use the PDU Router to transmit QSEvvia the IDS protocol .1.3.2Dependencies to other standards and normsThe elements of the IDS protocol can be mapped to the syslog format by the IdsRif required for the SOC.1.3.3Dependencies to the Application LayerThe IDS protocol has no dependencies to the application layer. Application layercomponents can issue security events by using API of IdsM.6 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-112Use CasesThe AUTOSAR IDS architecture and functionality is described in [1]. Therefore thischapter is a brief summary of the use case for the protocol.IDName0001Transmissionof QSEv2.1DescriptionTransmission of qualified security events from IdsMinstances to IdsR instanceTable 2.1: Usecases for IDS protocolsUC 0001 "Propagation of Qualified Security Events to theIdsR"The main use case for the IDS protocol is the propagation of Qualified SecurityEvents QSEv to the IdsR in a way that is independent from the kind of ECU or theused communication mechanism. IdsM instances can be allocated to all nodes of thevehicle architecture that are security relevant. This decision is typically based on asecurity analysis of the vehicle E/E architecture. As a result an IdsM instance can beconnected to the IdsR indirectly via a number of different bus systems as illustrated inFigure 2.1.Figure 2.1: Use case for IDS protocol7 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-113Protocol Requirements3.1Requirements TraceabilityThe following tables reference the requirements specified in the IDS requirement specification [1] and links to the fulfillment of these.Requirement[RS Ids 00502][RS Ids 00503][RS Ids 00505][RS Ids 00510][RS Ids 00820]8 of 32DescriptionEvent TimestampsTimestamp SourcesAuthenticity of QSEvsThe IdsM shall allow to transmitQSEv to the IdsRIdsM Security EventsSatisfied by[PRS Ids 00400] [PRS Ids 00401][PRS Ids 00404][PRS Ids 00600] [PRS Ids 00601][PRS Ids 00001][PRS Ids 00720]Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-114Definition of Terms and Acronyms4.1AcronymsAcronymAdaptive PlatformBSWController Area Network/Controller Area Network with Flexible Data-RateContext DataClassic PlatformContext Data BufferECUEvent BufferEvent FrameFilter ChainFlexRayGeneral Purpose I-PduIntrusion Detection SystemIntrusion Detection System protocolIntrusion Detection SystemMessageIntrusion Detection SystemManagerIntrusion Detection System ReporterI-PDU MultiplexerLINProtocol Data Unit RouterProtocol Requirement Specification Intrusion Detection SystemQualified Security Event (QSEv)Security ExtractSecurity Events9 of 32Description:AUTOSAR Adaptive PlatformStandardized AUTOSAR Software modules, which provides basic functionalities usually required in electronic control unit.An automotive network communication protocol.Relevant information to a SEv. It is optional data that provides abroader understanding of the security event (e.g. the corrupteddata). The content and encoding of the context data is externallydefined by the sensor and unknown to the IdsM module.AUTOSAR Classic PlatformBuffer with variable sizes to fit to the needs of the context data ofthe SEvs.Electronic Control Unit which provides functionalities in electronicsystem of a car, e.g. brake system or window lifter.Buffer to temporarily store the reported SEv.Main frame of IDS protocol which includes the basic informationlike the Security Event ID.A set of consecutive filters which is applied to security events.The output are Qualified Security Events.An automotive network communication protocol.General Purpose Interaction Layer Protocol Data Unit.An Intrusion Detection System is a security control which detectsand processes security events.The IDS protocol specifies the message format which is used byIDS.Message which is send by the IdsM with the IDS protocol.The Intrusion Detection System Manager handles security eventsreported by security sensors.The Intrusion Detection System Reporter handles Qualified Security Events received from IdsM instances.An AUTOSAR Basic Software module which specifies the protocol to multiplex multiple Pdus with one Protocol Control information.Local Interconnect Network: serial communication bus to connect sensors and actuators.An AUTOSAR component responsible for routing of messagesindependent from underlying communication network.The specification document which describes all elements of theIDS protocol.Security events which pass their filter chain are regarded asQualified Security Events and are sent to the configured sink.The Security Extract specifies which security events are handledby IdsM instances and their configuration parameters.Onboard security events are reported by BSW, CDD, SWC orother software components or applications to the IdsM.Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-11AcronymSecurity Event MemorySecurity SensorsSecurity Incident and EventManagementSensorSecurity Operation CentreSocket AdapterDescription:A user defined diagnostic event memory which is independentfrom the primary diagnostic event memory.BSW, CDD, SWC or other software components or applicationswhich report security events to the IdsM.Technology concept to collect, correlate and analyze security incidents to detect a threat.Reporting identity that informs the IdsM module about SEvs. Itcan be a BSW module, a proprietary CDD or a SWC Application.Security Operation Center is the Backend of the IDS in whichdata can be processed and analysed.Socket Adaptor is a Basic Software module of AUTOSAR whichcreates interface between Pdu-Based communication on servicelevel and socket based TCP/IPTable 4.1: Acronyms4.2AbbreviationsAbbreviationAPAPIBSWCANCAN FDCDDCPECUIDIDSI-PDUIdsMIdsRLINmsN-PDUOEMPDUPRS OSAR Adaptive PlatformApplication Programming InterfaceBasic SoftwareController Area NetworkController Area Network with Flexible Data-RateComplex Device DriverAUTOSAR Classic PlatformElectronic Control UnitIdentifierIntrusion Detection SystemInteraction Layer Protocol Data UnitIntrusion Detection System ManagerIntrusion Detection System ReporterLocal Interconnect NetworkMilisecondsNetwork Layer Protocol Data UnitOriginal Equipment ManufacturerProtocol Data Unit RouterProtocol Requirement Specification Intrusion Detection SystemQualified Security EventSecurity ExtractSecurity EventSecurity Event MemorySecurity Incident and Event ManagementScalable service-Oriented MiddlewarE over IPSecurity Operation CenterSoftware ComponentTable 4.2: Abbreviations10 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115Protocol specification[PRS Ids 00001] dThe main purpose of the IDS protocol is the transmission ofqualified security events (QSEv) from an Intrusion Detection System Manager (IdsM)instance to an Intrusion Detection System Reporter (IdsR) instance.c(RS Ids 00510)5.1IDS Message FormatThe IDS protocol is shown in Figure 5.1.Event FrameTimestampContext Data FrameSignature FrameFigure 5.1: IDS Message including Signature[PRS Ids 00002] dThe IDS protocol consists of the standard Event Frame andup to three optional fields. It provides several options to send only minimal data ofQualified Security Event QSEv or to extend this data with more details.Beside the extension with a timestamp or context data, there is also the option tosecure the data transport by adding a signature to every QSEv. The list below showsexamples of configurations and explains the options.c()All options can be configured or switched off independent from each other, so a subsetor combination of all options is possible.1. [PRS Ids 00003] dStandard Qualified Security Event QSEv without furtherdata.c()2. [PRS Ids 00400] dQualified Security Event QSEv with Timestamp: If more precise timestamp is required in addition to the one provided for example by IdsR.The sensor or the IdsM can add timestamp to every QSEv.This option must be set by corresponding configuration bit in the protocol header.c(RS Ids 00502) (refer to 5.1.5 Timestamp)3. [PRS Ids 00500] dQualified Security Event QSEv with Context Data: The context data includes sensor specific information which are only forwarded to thesink. IdsM do not have knowledge on content or structure of this data.This option must be set by corresponding configuration bit in the protocol header.c() (refer to 5.1.6 Context Data)4. [PRS Ids 00600] dQualified Security Event QSEv with Signature: If more securecommunication of security events is required a signature can be added to everyQSEv.This option must be set by corresponding configuration bit in the protocol header.c(RS Ids 00505) (refer to 5.1.8 Signature)11 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.1IDS Protocol OverviewIn figure Figure 5.2 you can find an overview on all elements of the IDS protocol.FieldNameLengthDescription of the dataProtocolVersionProtocolHeader4 BitThe version of the IdsM protocol4 BitIdsM protocol header information:Bit[0]: 0 - No Context Data included, 1 - Context Data includedBit[1]: 0 - No Timestamp included, 1 - Timestamp includedBit[2]: 0 - No Signature included, 1 - Signature includedBit[3]: reservedIdsMInstance IdModuleInstance IdEvent Id10 BitUnique identifier of the sending IdsMinstance 0-10236 BitIdentifier to differ between multiple instances of modules16 BitUnique identifier of a Security Event:Range of AUTOSAR internal IDs: 0 0x7FFFRange of Customer specific IDs: 0x8000 0xFFFFCount16 BitNumber of IdsM calls which result in the current event after processingthe configured filter, e.g. EventAggregationReserve8 BitReserved for future useTimestamp8 BytesTimestamp / Tickstamp when event was detected: (optional)Byte[0] Bit[7] 0: AUTOSAR Standard, Byte[0] Bit[6]: reservedByte[0] Bit[7] 1: OEM Specific / Custom TimestampResolution in ms. Maybe not necessary for every event type.If not set, field is .filled by IdsR. If not authentic time,IdsR might recalculate the time and insert a new valueContext DataLength1 or 4 BytesLength information of Context Data. Only available if Context Data exists. (option)Most Significant Bit of first byte Context Data signals ifContext Data Length is encoded in 7 Bit or 31 Bit:Context Data Byte[0] Bit[7] 0: Length is encoded in 7 Bits Byte[0] Bit[0.6] - Valid values: 1.127 BytesContext Data Byte[0] Bit[7] 1: Length is encoded in 31 Bits 1 (2 31)-1Byte[0] Bit[0.6], Byte[1.3] Bit[0.7] - Valid values:1.(2 31) - 1 BytesContext Data1 (2 31) -1BytesBinary blob attached by the sensor: (optional)SignatureLength2 BytesLength information of Signature. Only available if Signature exists. (optional)Signature Byte[0.1]: Signature Length 1.65535 BytesSignature1.65535 BytesSignature for authentification of security event: (optional)Signature calculated withEventframe Optional Timestamp Optional Context DataSignature Byte[2.n]: Signature Data - configurable via MetaModelFigure 5.2: Intrusion Detection System Protocol Overview12 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.2Endianess - Byte Order[PRS Ids 00004] dThe IDS protocol uses big endianess as byte order also knownas Motorola format. This is equal to the network byte order, e.g. used by ethernet.In the tables and descriptions of this section, the byte numbers increase in the samesequence as the bytes are transmitted in the IDS message, starting from 0.The first byte is the Most Signifcant Byte (MSB), usually Byte 0the last byte is the Least Significant Byte (LSB).The bit numbers decrease, the most significant bit (msb) of a byte being bit 7and the least significant bit (lsb) 0.c()5.1.3Independence of communication interface[PRS Ids 00005] dThe IDS protocol is independent from the used hardware andthe underlying communication interface (e.g. CAN, Ethernet, FlexRay). It is optimisedto fit to standard CAN bus communication with the minimum required information onsecurity event. Also ethernet communication is applicable.c()5.1.4IDS Event FrameFigure 5.3 shows the Event Frame of IDS protocol.TEvent FrameEvent FrameTimestamp7 msblsb 43 msblsb 0Protocol Byte 07 msblsb 0 lsb 6IdsMInstance IdIDIdsM InstanceByte 15 msblsb 0ModuleSensorInstance IdInstanceIDByte 27 msblsb 07 msbContext Data Framelsb 07 msblsb 0IdEventEventDefinitionIDByte 3Byte 4Signature Frame7 msblsb 0Byte 6Byte 7Event frame size: 8 BytesFigure 5.3: IDS Event Frame[PRS Ids 00006] dThe IDS Event Frame consists of 8 Byte as detailed above.c()13 of 32lsb 0ReserveReservedCountCountByte 57 msbDocument ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.4.1Protocol Version and HeaderByte 0Bit 7Bit 6Bit 5Bit 4Protocol VersionBit 3ReservedBit 2Bit 1Protocol HeaderTimesSignatamptureBit 0ContextDataTable 5.1: Layout of Protocol Version and Header5.1.4.1.1Protocol Version[PRS Ids 00008] dThe version information of the IDS protocol: Bit[7.4] : 0-15Formula for calculation:ProtocolVersion (BYTE0 & 0xF0) 4The used version number for this specification of the IDS protocol shall be 1.c()5.1.4.1.2Protocol Header[PRS Ids 00009] dIDS protocol header information, includes configuration bits toswitch specific functionalities on or off: Bit[0]: Context Data included0: No Context Data included1: Context Data included Bit[1]: Timestamp included0: No Timestamp included1: Timestamp included Bit[2]: Signature included0: No Signature included1: Signature included Bit[3]: reservedFormula for calculation:ProtocolHeader (BYTE0 & 0x0F)c()14 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-11Note:[PRS Ids 00010] dOnly if Timestamp, Context Data or Signature is available, the corresponding Protocol Header Bit is set to 1.Context Data or Signature will never be transmitted with Length 0.c()[PRS Ids 00011] dReserved Bits should be preset with value 0. On receiver sidethose bits should be ignored.c()5.1.4.2IdsM Instance ID and Sensor Instance ID[PRS Ids 00012] dTable 5.2 shows the combined element IdsM and Sensor InstanceID.c()Byte 1Bit7Bit6Bit5Byte 2Bit Bit Bit Bit4321IDS Instance IDBit0Bit7Bit6Bit5Bit Bit Bit Bit4321Sensor Instance IDBit0Table 5.2: IdsM Instance ID, Sensor Instance ID5.1.4.2.1IdsM Instance ID[PRS Ids 00013] dUnique identifier of the IdsM instance which sends the securityevent.IdsM Instance ID range: 0-1023.Usually there is one IdsM instance in one ECU. In case of complex ECU with Classicand Adaptive components, e.g. Multi Controller or Multi Partition devices it is possiblethat there are multiple IdsM. One IdsM in Classic Platform and one IdsM inAdaptive Platform. In such a constellation both IdsM must be configured withdifferent IDS Instance ID.Formula for calculation:IdsM Instance ID (10 Bits) ((BYTE2 & 0xC0) 6) ((BYTE1 2))c()5.1.4.2.2Sensor Instance ID[PRS Ids 00014] dIdentifier to differentiate between multiple instances of same kindof sensor module.Sensor Instance ID range: 0-63e.g. Multiple CanDrv in one ECU can issue "same" security event. To differentiatethese the Sensor Instance ID is used.In case there is only one instance of the sensor in the configuration, the value of theSensor Instance ID shall be, by default, set to 0.Note:15 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-11The Sensor Instance ID shall be set at configuration of the corresponding BasicSoftware module.Formula for calculation:Sensor Instance ID (6 Bits) (BYTE2 & 0x3F)c()5.1.4.3Event Definition IDThe Event Definition ID is shown in Table 5.3.Byte 3Byte 4Event Definition IDTable 5.3: Event Definition ID[PRS Ids 00015] dThe Event Definition ID is a unique identifier of a securityevent. It describes the kind of a security event.c()[PRS Ids 00016] dIf a sensor generates multiple security events of same kind itis called Event instance.c()[PRS Ids 00017] dThe range for the Event Definition ID is split into three scopes:1. AUTOSAR internal IDs: 0-0x7FFF (max. 32768 security events)2. Customer specific IDs: 0x8000-0xFFFE (max. 32767 security events)3. Invalid ID: 0xFFFFc()5.1.4.4CountTable 5.4 shows the IDS element Count.Byte 5Byte 6CountTable 5.4: Count[PRS Ids 00018] dThe count represents the number of IdsM API calls which resultin the current Qualified Security Event. When an event is created, its count isinitialized to 1. However, filters like Event Aggregation may combine several events intoa single one. The count of this event is set to the sum of the counts of all aggregatedevents. If the security event is send by a smart sensor which already filters andpreset the count value, this preset is just added to the count of IdsM. So the final countis the sum of the count of the sensor and the result of IdsM processing.c()16 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.4.5ReservedThe Reserved byte is shown in Table 5.5.Byte 7ReservedTable 5.5: Reserved[PRS Ids 00019] dThe Byte[7] of the Event Frame of IDS protocol is reservedfor future use.c()Note:[PRS Ids 00020] dReserved Bytes should be preset with value 0. On receiver sidethose bytes should be ignored.c()17 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.5TimestampDetails on timestamp are shown in Figure 5.4.TimestampEvent Frame7 msbContext Data FrameSignature Framelsb 0TimestampByte 0Byte 1SourceReservedBit 7Bit 6Byte 2Byte 3Byte 4Byte 5Byte 6Byte 7NanosecondsBit 5Bit .Bit 0Timestamp frameFigure 5.4: Timestamp[PRS Ids 00401] dThe IDS Protocol provides Timestamp as a configurable option.c(RS Ids 00502)[PRS Ids 00402] dIt is logged when security event was detected the first time(first occurence).c()[PRS Ids 00403] dResolution in ms is required. The Timestamp shall be encodedwith 64 Bits in total to fit into a single CAN frame.c()[PRS Ids 00404] dDifferent sources for Timestamp can be configured in the IDSProtocol. Bit[7]: Timestamp source0: AUTOSAR Standard CP: StbM - AP: ara::tsync1: Auxiliary / OEM Specific timestamp Bit[6]: reservedc(RS Ids 00503)18 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.5.1Timestamp AUTOSARTimestampBit 7Bit 6SourceReservedByte 0Byte 1Byte 2Byte 3Bit 5 . 0NanosecondsTable 5.6: Timestamp Source and NanosecondsTimestampByte 4Byte 5Byte 6Byte 7SecondsTable 5.7: Timestamp Seconds[PRS Ids 00405] dFor the IDS Protocol AUTOSAR time format combines thetimestamps for nanoseconds with 30 Bits and seconds with 32 Bits.c()5.1.5.1.1Nanoseconds[PRS Ids 00406] dFor nanoseconds only 30 Bits are required to encode 0.999 999999 ns 10-9 seconds.c()Note:AUTOSAR Time Synchronisation Protocol (e.g. stbm in CP) uses 32 Bits for nanoseconds. The truncation of nanoseconds for IDS Protocol does not limit the resolutionof the timestamp.5.1.5.1.2Seconds[PRS Ids 00407] dSeconds are encoded with 32 Bits which result in approximately127 years resolution.c()Note:For details please refer to Time Synchronisation Protocol SWS-TimeSynchronisation[2]19 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.5.2Timestamp OEMTimestampByte 0SourceBit 7Byte 1Byte 2Byte 3Bit 6 . 0OEM TimestampTable 5.8: OEM Timestamp format[PRS Ids 00408] dOEM time source offers the option to use other time protocol. Thelength is limited to 63 Bits. An interface to OEM application is required. Accuracy isdefined by OEM.c()20 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.6Context Data[PRS Ids 00501] dThe IDS protocol provides an optional feature to enrich thestandard security event transfered in the Event Frame with more detailed information. Therefore context data can be added. It is a binary blob attached by the sensor.These data includes specific detailed information about the security event which canbe used by the SOC for improved analysis of the security incident, e.g. a malformedmessage detected by a communication sensor.IdsM has no knowledge of the content or structure of these data. Only the issuingsensor and the Backend or SOC knows it.c()There are two variants of context data with different sizes:5.1.6.1Context Data - Size LongFigure 5.5 shows the "Context Data Size Long" with 4 Bytes length field.Event Frame7 msbTimestampContext Data FrameSignature Framelsb 0Context Data LengthByte 0Byte 1Byte 2Context DataByte 3Byte 4Byte .Byte .Byte nContext Data frameFigure 5.5: Context Data Size Long[PRS Ids 00502] dThe "Context Data Size Long" includes a 4 Bytes length field. Upto 231 -1 context data bytes can be transmitted.c()21 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.6.2Context Data - Size ShortIn Figure 5.6 the alternative version "Context Data Size Short" is shown.Event Frame7 msbTimestampContext Data FrameSignature Framelsb 0ContextContext DataData LengthByte 0Byte 1Byte 2Byte 3Byte .Byte .Byte .Byte nContext Data frameFigure 5.6: Context Data Size Short[PRS Ids 00503] dThe "Context Data Size Short" is the alternative version with 1 Bytelength field for max. 127 Bytes context data.c()5.1.7Context Data Length EncodingContext DataByte 0Bit 7LengthFormatBit 6Bit 5Bit 4Bit 3Bit 2Context Data LengthBit 1Bit 0Table 5.9: Context Data[PRS Ids 00504] dIn Table 5.9 the encoding of the Context Data Length is shown. Context Data Byte[0] Bit[7]0: 7 Bits length information encoded in Context Data Byte[0] Bit[0.6]: 1-127Bytes1: 31 Bits Length Information encoded in Context Data Byte[0.3] Bit[0.30]:1.(231 -1) BytesMost Significant Bit (msb) of first byte Context Data (MSB) signals if the length is encoded in 7 Bits (1 Byte) or 31 Bits (4 Bytes).c()22 of 32Document ID 981: AUTOSAR PRS IntrusionDetectionSystem

Specification of Intrusion Detection SystemProtocolAUTOSAR FO R21-115.1.8Signature[PRS Ids 00601] dThe IDS protocol provides an opt

Intrusion Detection System (IDS). Please see [1] for an overview of the IDS elements. The PRS IDS contributes to the IDS by providing the protocol for the transmission of qualified security events (QSEv) from an Intrusion Detection System Manager (IdsM) instance to an Intrusion Detection System Reporter (IdsR) instance. 1.1Protocol purpose and .

Related Documents:

c. Plan, Deploy, Manage, Test, Configure d. Design, Configure, Test, Deploy, Document 15. What are the main types of intrusion detection systems? a. Perimeter Intrusion Detection & Network Intrusion Detection b. Host Intrusion Detection & Network Intrusion Detection c. Host Intrusion Detection & Intrusion Prevention Systems d.

Intrusion Detection System Objectives To know what is Intrusion Detection system and why it is needed. To be familiar with Snort IDS/IPS. What Is Intrusion Detection? Intrusion is defined as “the act of thrusting in, or of entering into a place or state without invitation, right, or welcome.” When we speak of intrusion detection,

called as behaviour-based intrusion detection. Fig. 2: Misuse-based intrusion detection process Misuse-based intrusion detection is also called as knowledge-based intrusion detection because in Figure 2. it depicts that it maintains knowledge base which contains the signature or patterns of well-known attacks. This intrusion

There exists a number of intrusion detection systems particularly those that are open-source. These intrusion detection systems have their strengths and weaknesses when it comes to intrusion detection. This work compared the performance of open-source intrusion detection systems namely Snort, Suricata and Bro.

Intrusion Prevention: Signature Policies 201 Intrusion Prevention: Signature Policies - New 203 Intrusion Prevention: Sensors 204 Intrusion Prevention: Sensor - New 205 Intrusion Prevention: Sensor - Associating Sensor to a Firewall Policy 206 Intrusion Prevention: Alerts and Reports 208 Intrusion Prevention: View Rule File 210

2. Evaluation of a Single Intrusion Detection System (IDS) A computer intrusion detection system (IDS) is con-cerned with recognizing whether an intrusion is being attempted into a computer system. An IDS provides some type of alarm to indicate its assertion that an intrusion is present. The alarm may be correct or incor-rect.

This chapter presents the corresponding research work on the intrusion detection and intrusion prevention in large-scale high-speed network environment and is organized as follows: firstly, a distributed extensible intrusion prevention system is provided, then various packet selection models for intrusion detection systems based-on sampling are

ZO-104: Practical Zoology Uttarakhand Open University Page 6 Habit and Habitat: Amoeba proteus is widely distributed. It is commonly found on the bottom mud or on underside of aquatic vegetation in fresh water ponds, lakes, springs, pools and slow running streams. It is .