Cooperative cloud-edge vehicle anomaly detection
First Claim
Patent Images
1. A non-transitory computer readable medium, storing instructions to execute a process, the process comprising:
- managing model management information associating each of a plurality of analytic models with one or more types of data associated with a vehicle, and an operation status of the vehicle;
receiving data associated with the vehicle;
for receipt of a report from another vehicle or a cloud indicative of the received data being high risk for being anomalous;
reducing a risk threshold for anomaly analysis for the plurality of analytic models;
for receipt of the report from the another vehicle or the cloud indicative of the received data being high risk for being anomalous, or non-receipt of the report from the another vehicle or the cloud;
determining a type of the received data from the vehicle and the operation status of the vehicle;
selecting one or more analytic models of the plurality of analytic models based on the determined type of the received data associated with the vehicle, the determined operation status of the vehicle, and the model management information; and
executing the selected one or more analytic models on the received data to generate an anomaly determination of the received data;
for receipt of the report from the another vehicle or the cloud indicative of the received data being malicious, marking the received data as anomalous; and
for receipt of the report from the another vehicle or the cloud indicative of the received data being safe, marking the received data as safe.
1 Assignment
0 Petitions
Accused Products
Abstract
Example implementations of the present disclosure are directed to systems and methods directed to increasing the accuracy and speed that anomalous and malicious network data can be identified within a vehicle. Through the utilization of example implementations described herein, the security of the vehicle can be increased and the risk of a vehicle'"'"'s internal systems being compromised and property being damaged can be reduced.
-
Citations
20 Claims
-
1. A non-transitory computer readable medium, storing instructions to execute a process, the process comprising:
-
managing model management information associating each of a plurality of analytic models with one or more types of data associated with a vehicle, and an operation status of the vehicle; receiving data associated with the vehicle; for receipt of a report from another vehicle or a cloud indicative of the received data being high risk for being anomalous; reducing a risk threshold for anomaly analysis for the plurality of analytic models; for receipt of the report from the another vehicle or the cloud indicative of the received data being high risk for being anomalous, or non-receipt of the report from the another vehicle or the cloud; determining a type of the received data from the vehicle and the operation status of the vehicle; selecting one or more analytic models of the plurality of analytic models based on the determined type of the received data associated with the vehicle, the determined operation status of the vehicle, and the model management information; and executing the selected one or more analytic models on the received data to generate an anomaly determination of the received data; for receipt of the report from the another vehicle or the cloud indicative of the received data being malicious, marking the received data as anomalous; and for receipt of the report from the another vehicle or the cloud indicative of the received data being safe, marking the received data as safe. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a vehicle platform comprising; a memory configured to manage model management information associating each of a plurality of analytic models with one or more types of data associated with a vehicle, and an operation status of the vehicle; and a processor, configured to, receive data associated with the vehicle; for receipt of a report from another vehicle or a cloud indicative of the received data being high risk for being anomalous; reduce a risk threshold for anomaly analysis for the plurality of analytic models; for receipt of the report from the another vehicle or the cloud indicative of the received data being high risk for being anomalous, or non-receipt of the report from the another vehicle or the cloud; determine a type of the received data from the vehicle and the operation status of the vehicle; select one or more analytic models of the plurality of analytic models based on the determined type of the received data associated with the vehicle, the determined operation status of the vehicle, and the model management information; and
execute the selected one or more analytic models on the received data to generate an anomaly determination of the received data;for receipt of the report from the another vehicle or the cloud indicative of the received data being malicious, mark the received data as anomalous; and for receipt of the report from the another vehicle or the cloud indicative of the received data being safe, mark the received data as safe. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification