In-Vehicle Systems

AutoCrypt IDS

Intrusion detection system for vehicular environments
autocrypt ids featured

Intrusion detection and policy management for in-vehicle systems.

To counter cybersecurity threats, UN Regulation R155 requires all automotive OEMs to have a cybersecurity management system (CSMS) in place. To establish an effective CSMS, an intrusion detection system (IDS) and vehicle security operations center (vSOC) are crucial.

AutoCrypt® IDS provides a vehicular intrusion detection solution that detects, filters, and prevents cyberattacks against in-vehicle systems. It consists of an N-IDPS (network intrusion detection and prevention system) and an H-IDS (host intrusion detection system), complemented by event reporting, automated policy generation and simulation, and ECU resource optimization.

AutoCrypt® IDS can be easily integrated into both AUTOSAR and legacy environments. It can be linked to AutoCrypt® vSOC or third-party vSOCs.


AutoCrypt IDS security architecture

autocrypt ids diagram

AutoCrypt® IDS is centered around AUTOCRYPT’s proprietary Security Sensor, which uses an N-IDPS to detect abnormal data in the network, and an H-IDS to identify any abnormal behaviours of the ECUs. The IdsM (Intrusion Detection System Manager) evaluates detected security events (SEv) and sends qualified cases (QSEv) to the IdsR (Intrusion Detection System Reporter), which reports them to the vSOC.

Besides intrusion detection, AutoCrypt® IDS also ensures its Security Sensor is up-to-date with the latest attack patterns and threats. The IdsR reports newly discovered security incidents to the Policy Manager, which utilizes data from the DBC (CAN database files) to automatically generate, simulate, and apply new policies to the Security Sensor.

AutoCrypt® IDS offers easy architectural integration for both AUTOSAR and legacy environments, applicable in both traditional microcontrollers (MCU) and more advanced application processors (AP).


Efficient, automated, and optimized IDS

sensor icon
Efficient Security Sensor
  • Accurately detects anomalies in the system and network and reports security events (SEv) to the IdsM
  • Evaluates all in-vehicle software and system resources in real-time for timely detection
  • Readily implementable in both AUTOSAR and legacy environments
  • Adapted to ensure basic car controls remain uninterrupted
policy icon
Automated Policy Generator
  • Automatically updates detection policies by analyzing the DBC (CAN database files)
  • Applies updated policies to Security Sensor
  • Systematically applies policies to specific ECUs and CAN buses
  • Real-time updates ensure protection against latest threats
simulator icon
Smart Policy Simulator
  • Runs simulations to evaluate detection policy effectiveness
  • Suggests policy improvements based on the order of importance to vehicle functions
  • Extremely low false detection rate
optimize icon
ECU Resource Optimization
  • Generates a preview of policy file size and remaining ECU storage space
  • Depicts storage usage rate in real-time
  • Enables easy tracking of policy files based on size
  • Suggests similar policies that consume less resources

Related Resources

Play Video