US 11,757,903 B2
Unauthorized communication detection reference deciding method, unauthorized communication detection reference deciding system, and non-transitory computer-readable recording medium storing a program
Manabu Maeda, Osaka (JP); Takeshi Kishikawa, Osaka (JP); and Daisuke Kunimune, Osaka (JP)
Assigned to PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA, Torrance, CA (US)
Filed by PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA, Torrance, CA (US)
Filed on Aug. 24, 2020, as Appl. No. 17/919.
Application 17/000,919 is a continuation of application No. 16/244,162, filed on Jan. 10, 2019, granted, now 10,791,129.
Application 16/244,162 is a continuation of application No. PCT/JP2018/007103, filed on Feb. 27, 2018.
Claims priority of application No. 2017-076637 (JP), filed on Apr. 7, 2017; and application No. 2018-020034 (JP), filed on Feb. 7, 2018.
Prior Publication US 2020/0389475 A1, Dec. 10, 2020
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); H04L 12/40 (2006.01); G06N 7/00 (2023.01); G06N 20/00 (2019.01); H04L 9/40 (2022.01); G06N 7/01 (2023.01); B60R 16/023 (2006.01)
CPC H04L 63/1416 (2013.01) [G06N 7/01 (2023.01); G06N 20/00 (2019.01); H04L 12/40 (2013.01); B60R 16/023 (2013.01); H04L 2012/40215 (2013.01)] 11 Claims
OG exemplary drawing
 
1. A reference message determining method used in unauthorized communication detection in an onboard network system that is executed by an information processing system including at least one memory, the onboard network system including a network and one or more electronic control units connected to the network, the reference message determining method comprising:
identifying, from information relating to an attack message on the onboard network system detected in the unauthorized communication detection, a communication pattern indicating features of the attack message;
determining whether or not at least two messages sent out onto the network during a predetermined reception cycle match the communication pattern identified in the identifying; and
determining that one of the at least two messages determined not to match the communication pattern is to be used as a reference message for detecting the unauthorized communication during a predetermined next reception cycle, the reference message being used for calculation of data values or a reception time of a message to be received in the next reception cycle.