Can Intrusion Detection for EV Powertrain Networks

이 논문은 전기차(EV) 파워트레인 네트워크의 CAN 통신 보안을 위한 실시간 재구성 가능한 침입 탐지 시스템(IDS)을 제안한다. 4개의 ECU로 구성된 테스트 벤치에서 수집한 CAN 트래픽을 기반으로, 타이밍, 식별자 화이트리스트, 데이터 길이 코드 준수 등 다양한 규칙을 적용해 공격을 2ms 이내에 탐지하며, 오탐률은 1% 미만이다. 또한, 자동차용 임베디드 환경에서 실행 가능한 경량화된 설계와 공개된 EV 파워트레인 데이터셋을 제공해 연구 재현성과 실무 적용성을 높였다. 본 연구는 IDS의 탐지 지연(latency) 측정과 재현 가능한 평가 프로토콜을 제시해 기존 연구의 한계를 극복했다.

https://www.mdpi.com/2079-9292/15/9/1788

#cansecurity #intrusiondetection #evpowertrain #embedded #realtime

Why a Locked Floppy Disk Could Be Safer Than a Modern Network

Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.

Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.

THE LOCKED-BOX LOGIC

If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.

That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.

MODERN SECURITY, NEW PROBLEMS

Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.

Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.

So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.

Sources:
Britannica — https://www.britannica.com/technology/floppy-disk
Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg

The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internetHistory #intrusionDetection #officeHistory #physicalSecurity #techNostalgia

🚨 New article now available online!

As new attack strategies emerge, network intrusion detection systems are subject to increasing pressure. Accurate classification of potential threats requires both adequate analysis of complex data sets and effective utilisation of computational resources available.
Researchers Akanksha Pamena and Manohar Naik Sugali propose an approach combining deep learning for dimensionality reduction with attention modules: SAE-AM. Their solution proves highly effective, reaching 99% accuracy on benchmark datasets. Read the latest article on our website, “SAE-AM: Enhancing Network Intrusion Detection Using Sparse Autoencoders with Attention Modules” and learn more about their method.
https://www.acigjournal.com/SAE-AM-Enhancing-Network-Intrusion-Detection-Using-Sparse-Autoencoders-with-Attention,213872,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #machineLearning #networkSecurity #intrusionDetection #machineLearning #deepLearning

Background:
for my #homelab I set up #suricata in #nixos and have a functioning #ids #intrusiondetection system with a #grafana dashboard (#flake info here https://codeberg.org/adingbatponder/reticulum_nixos_flake/src/commit/9ebc4cd68ba461b0baad990cbdd4a4ef50b57045/features/network-appliance/README.md ).
Preliminary plan:
I now want to go to and #ips #intrusionprevention system that blocks threats detected. Current plan is #nftables with #nfqueue but there is no GUI for that it seems, and it is a bit clunky and black-boxy.
Question: What are the more user-friendly options for an IPS front-end / GUI ?
Thanks!
Cookie monster!

Made a transparent network bridge on #NixOS which sits between router & #LAN switch, monitoring traffic for #IDS #intrusiondetection , #Suricata and #Zeek capture and analyze packets → #Filebeat ships #logs#Elasticsearch with #GeoIP ingest pipeline → #Grafana setup of dashboard to visualise data is defined in flake itself so using the flake will give the same dashboard. #flake details here https://codeberg.org/adingbatponder/reticulum_nixos_flake/src/branch/main/features/network-appliance
Hardware: HP EliteDesk 800 G1 SFF 16Gb RAM & https://www.jacob.de/produkte/Intel-Ethernet-Server-Adapter-I350-T4-I350T4V2-artnr-2094756.html #i350t4

Auch 2026 findet wieder ein #GI-SPRING-Graduiertenworkshop der Fachgruppe Security - Intrusion Detection and Response (SIDAR) statt. Diesmal am 21. und 22.04.2026 in #Heidelberg.

Zu den Themen gehören #VulnerabilityAssessment, #ThreatIntelligence, #IntrusionDetection, #Malware, #IncidentManagement, #WirelessSecurity, #DigitalForensics usw.

Einreichungen werden bis zum 15.03.2026 angenommen.

https://spring.fg-sidar.gi.de

#CyberSecurity #Conference

Graduierten-Workshop SPRING

Ein Workshop für Nachwuchswissenschaftler auf dem Gebiet der Reaktiven Sicherheit.

Top 5 #Security Features of #Imunify360
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time #Antivirus Protection, Network #Firewall and Patch Management. ...
Continued 👉 https://blog.radwebhosting.com/top-5-security-features-of-imunify360/?utm_source=ReviveOldPost&utm_medium=social&utm_campaign=ReviveOldPost #hipaacomplianthosting #businesscontinuance #malwarescanner #intrusionprevention #malwareremoval #wordpresssecurity #intrusiondetection #webapplicationfirewall
Top 5 Security Features Of Imunify360 - VPS Hosting Blog | Dedicated Servers | Reseller Hosting

You now know the top 5 security features of Imunify360.

RadWeb, LLC
Top 5 #Security Features of #Imunify360
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time #Antivirus Protection, Network #Firewall and Patch Management. ...
Continued 👉 https://blog.radwebhosting.com/top-5-security-features-of-imunify360/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #malwarescanner #webapplicationfirewall #hipaacomplianthosting #businesscontinuance #malwareremoval #intrusionprevention #intrusiondetection #wordpresssecurity
Top 5 Security Features Of Imunify360 - VPS Hosting Blog | Dedicated Servers | Reseller Hosting

You now know the top 5 security features of Imunify360.

RadWeb, LLC