CPC B60R 16/023 (2013.01) [G06F 21/554 (2013.01); G07C 5/085 (2013.01); G06F 2221/034 (2013.01)] | 16 Claims |
15. An information processing method performed by a vehicle system used for a vehicle, the vehicle including a plurality of in-vehicle apparatuses, the information processing method comprising:
storing, in a memory in advance, a predetermined penetration route, the predetermined penetration route defining an attack order of a malicious attack which is to be carried out on at least three of the plurality of in-vehicle apparatuses, the attack order identifying the at least three of the plurality of in-vehicle apparatuses sequentially from closest to furthest from an external network;
changing, in accordance with a depth of penetration of the malicious attack carried out on the at least three of the plurality of in-vehicle apparatuses included in the vehicle, at least one of a communication method with an outside of the vehicle, a defense method against the malicious attack, or a storage method for logs pertaining to the plurality of in-vehicle apparatuses; and
determining, by at least one of a controller or a processor, whether the malicious attack is being carried out based on anomaly detection in the plurality of in-vehicle apparatuses,
wherein the at least one of the controller or the processor determines that the malicious attack is being carried out when the anomaly detection matches the predetermined penetration route.
|