+ All Categories
Home > Documents > Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit...

Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit...

Date post: 06-Oct-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
14
Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas and modular IDPS architecture design elements protecting Automotive Ethernet Networks
Transcript
Page 1: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

Security areas and modular IDPS architecture design elements protecting Automotive Ethernet Networks

Page 2: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

2© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

• Classical Dependability is a well known and throughout the automotive industry well mastered topic

• Nowadays we see several needs raising– Rasing data-rate of communication (CAN, LIN, FR vs. GBit Ethernet)

– Raising computing effort (simple logic vs. High Performance, multicore computing)

– Raising complexity (window control vs. Piloted driving)

– Rase of connectivity to outside world ( simple OBD connector vs. Update over the air)

This increases the focus on security, yet strengthening the safety aspect (Integrity, Availability)

Motivation

Dependability & Security

Reliability

Safety

Maintainability

Confidentiality

Integrity

Availability

Page 3: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

3© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

Multi-Level Communication Security ArchitectureAutomotive System Security Layers

Protecting Automotive Ethernet Networks

Secure Environment

Secure Ext. Comm. & Interfaces

Secure Network Segmentation

Secure OnBoardComm.

Secure Platform(HW, Boot, Up-

date, Separation)

Level 1: restrict access to the networkLevel 2: secure onboard communicationLevel 3: apply data usage policiesLevel 4: detect anomalies and defend

focus of presentation

Page 4: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

4© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

– Vehicle Functions according to criticality and trust levelgrouped in security areas

– For example, • security area with highly critical functions (breaking,

steering, …) • security areas with HMI functions …• security area with functions that contain external

interfaces (mobile connection, remote key, WLAN, V2G, …)

How to separate?What to separate?

Security Areas

– Physical: Domain E/E Architecture (physical)– Logical: VLANs, IP Subnets for new E2E architectures with

mixed topology (e.g., centralized architecture with no physical separation or zonal E/E arch.)

– Gateways: Traffic between the security areas is only possible between adjacent areas via a gateway

Domain E/E Architecture(physical separation via domains)

Zonal E/E Architecture(logic separation required)

Page 5: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

5© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

• Goal: increase the number of borders to cross between security areas– Like an onion skin, the security areas are nested into each

other, with the innermost security area offering the highest level of protection, e.g., a frame from the cloud must never reach a breaking ECU directly.

– End nodes can only be part of a single security area.

• Gateways (Security Area Crossings)– Communication between areas only via dedicated gateways

such as, VLAN Bridges, IP routers, Application Level Gateways– Dedicated gateways shall provide a Firewall with deep packet

inspection (e.g., check of VLAN, MAC/IP-addresses, port numbers, L5+ protocol type, …)

Level of Separation?

Security Areas

Security Area 0External Network (e.g. Cloud Server)

Security Area 1ECUs with external connections

Security Area 2ECUs without external connections,

functions with safety requirement up to ASIL C

Security Area 3ECUs without external connections,

functions with safety requirements up toASIL D

Gateway

Gateway

Gateway

Security Area 0External Network (e.g. Cloud Server)

Security Area 1Connectivity

Security Area 2b

Body

Security Area 2c

ADAS

Security Area 2a

Infotainment

Gateway

Variant A:o Separation based on

domainso no hierarchy beside

external connectiono Max. 2 borderso Comparison with IT:

Sec Area 0 = public networkSec Area 1 = DMZSec Area 2 = private network

Variant B:o Separation based

on criticalityo multiple hierarchy

levelso Max. 3 borders

Page 6: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

6© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

VMLink

Service Proxy (application level gateway)IP Router with Firewall

Example for a Security Area Crossing

OS

IP Router

IP Stack

Eth Driver

Eth Ctrl

Switch Core

Firewall

DPIRouting engine

ECU1 ECU2 ECU3 ECU4

Switch Hardware

EB Switch Firmware

Security area 2a Security area 2bInfotainment ADAS

Network 1

S

C

VMNet 1

S*

C

VMNet 2

Network 2Firewall

One to three VMs depending on security level

efficient application data exchange (blocks network frames)

S*

C S

C

CPU

Service 1 Client on Net1 uses Server on Net2

ServerSClientC

DPI … Deep Packet Inspection

Service 2Client on Net2 uses Server on Net1

ProxyS*

Page 7: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

7© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

Intrusion preventionNetwork StackIntrusion Detection

Intrusion dedection and prevention System (IDPS)

Data

TCP/UDP Header

TCP/UDP Header

IP DataIP Header

Frame DataFrame Header

•Location: Host•Layer: Application

Traffic Monitoring

•Location: Host•Layer: UDP/TCPI

IP Security Events

•Location: Host, Switch, Firewall, Router•On demand mirroring

IP Traffic

•Location: Host, Router•Layer: IPIP Statistics

•Location: Switch•Layer: MAC, Phy

Port Statistics

• Location: Host• Layer: context aware

Application

Plausibilisatoinin Application

• Location: Host• Layer: UDP/TCP

Firewall, stateful firewall

• Location: Host, Switch, Firewall, Router

• Layer: all, network setup

IP Traffic limitation, whitelists

• Location: Host, Router• Layer: IP

VLANs, Port Whitelists

• Location: Switch• Layer: MAC, Switch Config

Port Checking, VLANs

Page 8: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

8© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

Host IDS Network IDS Hybrid IDSAnalyzes • internals of a computing system

and• Host network interfaces on a

ingress packet level

• Packets in the network to detect suspicous activities

• Can be on a packet or packet statistics level

• Both, Host based sensor data and network sensor data

Pros One can instrument on every layer• Can monitor encrypted

communication if directed to the host

• Independent from target system • Combination of both principles• Higher coverage

Cons • Depends on protocol stack of the host

• Cannot detect anomalies in t he whole network

• A full coverage would require mirroring of all packets

• Unefficient, thus usually not done• Cannot monitor encrypted packets

• Needs a management and data collection system (IDPS Vehicle Controller)

IDS types

Hybrid IDS

Network IDS

HostIDS

Page 9: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

9© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

Attack Pattern Host IDS Network IDS Hybrid IDS

Port Scan from one host Most cases detectable Difficult to detect but possible

Additional data from Network IDS may improve Host IDS

Distributed port scan Difficult to detect Many cases detectable Additional data from Host IDS may improve Network IDS

Buffer overflow attack Many techniques for detection exist

undetectable Same as Host IDS

Denial of service attack (non distributed)

Detectable Detectable and easy to isolate

Additional Data from Host IDS may improve Network IDS

Denial of service attack (distributed, e.g., gateway)

Detectable, difficult to isolate Difficult to detect Detectable, difficult to isolate

Man in the middle Difficult to detect May be detected May be detected

Attack Patterns and detection mechanisms

Page 10: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

10© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

Location Data Type* Implementation Remark

Network IDS (Switch)

Port Statistics

(M) Traffic statistics per port

Hardware supported ingress sampling needed

Host IDS (Host Ethernet Interface, Switch firmware, router)

IP Statistics (M) Table statistics per flow (Layer 4)Sampling of configuration interface data

Hardware supported ingress sampling needed

Network IDS( Switch, Switch Firmware, Router)

IP Traffic duplication

(D) Duplicate matching packets acc. To a filter

Layer 2 filtering support needed

Host IDS (Host Ethernet Interface, Firewall)

IP security Events

(D) Forward dropped frames (or metadata)

e.g., frames out of spec (comm. Matrix)

Where, what and How

IDS Sensor Examples

Host IDS

Network IDS

*Sensor Type:• (M)etadata (Port, protocol statistics)• (D)eep Packet Inspection (Frame by frame

inspection, flow analysis)

Page 11: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

11© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

• Sensors and actuators are usually paired

• Each sensor/actuator needs unified interface (CONN)

• Sensors and actuators for VM internal parts are not shown

• SOC* Platform is connected via gateway

• Controller do an anomaly detection based on sensor data

Sensors, actuators and controllers

Modular IDPS Architecture

Performance Controller SOC 1

Linux VM Classic AUTOSAR

Classic AUTOSAR

EthEth

Real-Time Controller MCU1

EB Switch Firmware .

Eth Ctrl

EB virtual Switch

Eth CtrlCan Ctrl

IDPS ECU Ctrl

IDPS SOC Platform

IDPS Vehicle Controller

IDPS ECU Ctrl

SOC .. Security Operations Center

CONNCONNS2

CONN

CONNS1 A1 A2

A3

S4 A4

S3

CONNS5 A5

CONNS6 A6

Page 12: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

12© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

LevelFleet

Vehicle

Security Area

ECU

The Impact-Automatism-Latency tradeoffLatency of decision

Authority of an potential automatism

ImpactInfluencing factors of IDSPs reactions

Intrusion detection might end up in extensive decisions. Those are dependent on level• The Latency of decision: from a certain level on one

might want to have human in the loop (e.g., grounding of a whole fleet)

• The Authority of an automatism: on a low level decisions can be taken easier (e.g., discard packets with security violation)

• The Impact: on a higher level decisions influence a bigger portion of the system

Page 13: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

13© Elektrobit (EB) 2019

Security areas and modular IDPS2019 IEEE-SA Ethernet & IP @ Automotive Technology Day – Detroit

• Protect automotive networks is important, because of safety, legal and commercial requirements• Security areas have been defined to restrict the attack surface• Crossing Security areas are limited to gateways with firewalls and deep packet inspection• EB’s modular IDPS consists of sensors, actuators and controllers for efficient intrusion detection• Anomaly detection is done on different levels considering latency, automation level and impact

13

Dr. Georg Gaderer, ElektrobitSenior Manager, Car Infrastructure [email protected]

Author information

Thank you for your attention!

Summary

Dr. Michael Ziehensack, ElektrobitVP, Car Infrastructure [email protected]

Page 14: Security areas and modular IDPS - IEEE SA...Dr. Georg Gaderer & Dr. Michael Ziehensack, Elektrobit 2019 IEEE -SA Ethernet & IP @ Automotive Technology Day – Detroit Security areas

[email protected]

Get in touch!


Recommended