Sonatus Foundation Security Services
Protect vehicle networks
and hosts
Connected cars are more vulnerable to cybersecurity risks. Detect and prevent threats to in-vehicle networks and host ECUs from intrusions and data breaches with highly configurable monitoring and mitigation policies.
UIDPS
The automotive industry is increasing its focus on vehicle cyber security management systems to protect connected vehicles from intrusions, hacking, malware, data breaches and other cyber threats In many geographies, automotive manufacturers are increasingly required to comply with new vehicle regulations to protect against external threats and additional data protection laws to protect sensitive information.
To mitigate these cybersecurity risks, connected cars require layered cyber security management systems. One critical component is protecting networks in connected vehicles. Sonatus’s Unified Intrusion Detection and Prevention System (UIDPS) operates across both CAN and Ethernet networks within a vehicle, to mitigate cybersecurity risks and apply data security protocols to vehicle networks.
Benefits
- Highly adaptable to new and emerging threats
- Isolates sensitive data to prevent data breaches
- Complementary to 3rd party cloud security solutions
- Helps reduce security-related recalls
- Tunable based on system load and safety factors
- Offloads ECU to reduce impact of monitoring on performance
Key Technical Features
- Multi-network (CAN, Ethernet, Cellular, WiFi, etc.) and multi-protocol
- Integrated with Ethernet switch hardware
- Configurable detection and prevention monitoring based on system load
- Comprehensive inspection capabilities, including Deep packet inspection, verified by 3rd party to support:
- Unknown traffic and connections
- Protocol violations and errors
- Denial of Service (DoS) attacks
- Rate violations
- Port Scan attacks
- Diagnostics attacks
- ECU removal
- Dynamically configurable for different types of security threats
- Apply detection and mitigation policies in real-time
- Complies with UN Regulation No. 155 for cyber security
Benefits
- Highly adaptable to new and emerging threats
- Complementary to 3rd party cloud security solutions
- Helps reduce security-related recalls
- Tunable based on system load and safety factors
- Offloads ECU to reduce impact of monitoring on performance
Key Technical Features
- Multi-network (CAN, Ethernet, Cellular, WiFi, etc.) and multi-protocol
- Integrated with Ethernet switch hardware
- Configurable detection and prevention monitoring based on system load
- Comprehensive inspection capabilities, including Deep packet inspection, verified by 3rd party to support:
- Unknown traffic and connections
- Protocol violations and errors
- Denial of Service (DoS) attacks
- Rate violations
- Port Scan attacks
- Diagnostics attacks
- ECU removal
- Dynamically configurable
- Apply detection and mitigation policies in real-time
- Complies with UN Regulation No. 155 for cyber security
ECU Monitoring Agent
ECU Monitoring Agent allows the OEMS or Tier-1 suppliers in the automotive industry to maintain visibility into infrastructure and operating systems for the purposes of both security and performance monitoring. It can be configured with data analytics to search for anomalous behavior that could be indicative of cyber threats or other application issues, and report the observations to the cloud.
- SQL interface for detailed monitoring and anomaly detection
- Queries based on ECU activity thresholds and schedules
- Visibility into OS/Kernel events
- File integrity monitoring
- Support for differential and snapshot query
- Event reporting to the cloud
- Built in safeguard to limit resource consumption
- Fully configurable
Key Technical Features
- SQL interface for detailed monitoring and anomaly detection
- Queries based on ECU activity thresholds and schedules
- Visibility into OS/Kernel events
- File integrity monitoring
- Support for differential and snapshot query
- Event reporting to the cloud
- Built in safeguard to limit resource consumption
- Fully configurable