Menu Close

New cybersecurity tech protects computer networks in vehicles

New York: A team of US researchers has developed a new machine learning-based framework to enhance the security of computer networks inside vehicles without undermining performance.

In collaboration with experts from Virginia Tech, the University of Queensland and Gwangju Institute of Science and Technology, researchers at the US Army Research Laboratory devised a technique called ‘DESOLATOR‘ to help optimise a well-known cybersecurity strategy known as the moving target defense.

DESOLATOR, which stands for deep reinforcement learning-based resource allocation and moving target defense deployment framework, helps the in-vehicle network identify the optimal IP shuffling frequency and bandwidth allocation to deliver effective, long-term moving target defense.

“The idea is that it’s hard to hit a moving target,” said Dr Terrence Moore, a US Army mathematician.

“If everything is static, the adversary can take their time looking at everything and choosing their targets. But if you shuffle the IP addresses fast enough, then the information assigned to the IP quickly becomes lost, and the adversary has to look for it again,” he explained in a statement.

The research team used deep reinforcement learning to gradually shape the behaviour of the algorithm based on various reward functions, such as exposure time and the number of dropped packets, to ensure that DESOLATOR took both security and efficiency into equal consideration.

“Existing legacy in-vehicle networks are very efficient, but they weren’t really designed with security in mind,” Moore said. “Nowadays, there’s a lot of research out there that looks solely at either enhancing performance or enhancing security. Looking at both performance and security is in itself a little rare, especially for in-vehicle networks.”

In addition, DESOLATOR is not limited to identifying the optimal IP shuffling frequency and bandwidth allocation.

Since this approach exists as a machine learning-based framework, other researchers can modify the technique to pursue different goals within the problem space.

According to Army computer scientist and programme lead Dr Frederica Free-Nelson, this level of fortification of prioritised assets on a network is an integral component for any kind of network protection.

“This ability to retool the technology is very valuable not only for extending the research but also marrying the capability to other cyber capabilities for optimal cybersecurity protection,” Nelson said.

Article: New cybersecurity tech protects computer networks in vehicles

Leave a Reply

Your email address will not be published. Required fields are marked *

(UN General Assembly, 1948) The Universal Declaration of Human Rights: 1. All human beings are free and equal 2. No discrimination 3. Right to life 4. No slavery 5. No torture and inhuman treatment 6. Same right to use law 7. Equal before the law 8. Right to be treated fair by court 9. No unfair detainment 10. Right to trial 11. Innocent until proved guilty 12. Right to privacy 13. Freedom to movement and residence 14. Right to asylum 15. Right to nationality 16. Rights to marry and have family 17. Right to own things 18. Freedom of thought and religion 19. Freedom of opinion and expression 20. Right to assemble 21. Right to democracy 22. Right to social security 23. Right to work 24. Right to rest and holiday 25. Right of social service 26. Right to education 27. Right of cultural and art 28. Freedom around the world 29. Subject to law 30. Human rights can’t be taken away