CPC H04L 63/1416 (2013.01) [B60R 25/20 (2013.01); B60R 25/30 (2013.01)] | 19 Claims |
1. A method of improving security of a computing system having a network of embedded devices, the method comprising:
(a) obtaining an expected number of cyclic messages to be received within a predetermined length of time;
(b) starting a timer of the predetermined length of time;
(c) when the timer is running, incrementing a message counter each time a cyclic message is received within the predetermined length of time, such that each increment of the message counter represents one cyclic message that is received before the timer ends at the end of the predetermined length of time;
(d) when the timer ends, incrementing a set counter in response to the message counter exceeding the expected number of cyclic messages to be received by a first threshold value;
(e) repeating steps (b), (c), and (d) during which the set counter is continuously incremented until the set counter exceeds a second threshold value; and
(f) detecting an intrusion in the system in response to the set counter exceeding the second threshold value.
|