Page 234 - Cyber Defense eMagazine June 2024
P. 234

The lifecycle of an autonomous vehicle is in three stages: Pre-Mission, Mission Operation, and Post-
            Mission.  As  one  might expect,  pre-mission  routines  are  focused  on  defining  the  assets  and mission
            objective. The vehicle will need to pass a pre-mission checklist for it to be authorized for operation. From
            a cybersecurity perspective, we need to ensure that each boot-up process is from an expected state to
            mitigate the potential for unauthorized software or malware usage.

            Another example is to ensure that all OS and software is patched and up to date before the mission
            begins. Post-mission routines are focused primarily on reporting notable events and maintenance. All
            cybersecurity anomalies, events, and responses will be reported via an analytics dashboard within Neya’s
            Mission Planning and Management System (MPMS). Additionally, bulk forensic data is captured and
            made available for authorized personnel. Securely updating the OS and software is also a crucial step in
            the post-mission routine, as the time to perform this task may cause significant delays when performed
            during the pre-mission routine.

            Mission  operation  is  the  most  complex  stage  of  the  autonomous  vehicle  lifecycle.  Consider  how  an
            autonomous vehicle operates using perception and sensing to determine a path of least resistance. The
            perception and planning systems work to identify anomalous objects that serve as obstacles that cause
            the vehicle to change direction or operation for optimal traversal. Conceptually, cyber anomaly detection
            is remarkably similar. Sensors are placed within the vehicle network and its endpoints to detect digital
            signals  of  anomalous  activity,  instead  of  detecting  a  physical  anomaly  using  RADAR  or  LiDAR  as
            sensors.

            Relevant data is an absolute necessity for anomaly detection to be successful. It needs to be structured,
            categorized,  and  labeled  for  effective  aggregation  and  consistency  to  ensure  data  integrity  for  the
            subsystem responsible for processing it. An analytic baseline to determine what is normal or expected is
            required once the data is understood and organized. A simple example is measuring the network flow
            volume (i.e., could be bytes, packets, transactions) between two nodes within a vehicle. An anomaly will
            be reported if the network flow volume increases or decreases an order of magnitude away from what is
            recorded as normal in the established baseline for that analytic. After extensive testing to determine
            specific analytics to measure and to improve baseline accuracy, it is ready to begin field operations. The
            confidence  threshold  for  positively  identifying  a  cyber  threat  should  also  improve  as  more  data  and
            telemetry is collected and processed with each mission.

            Furthermore, just as the vehicle autonomy system determines a response to physical anomalies, the
            autonomous system also will need to respond accordingly to a perceived cyber threat. For example, a
            threat actor attempts to establish unauthorized command and control of an autonomous vehicle using a
            rogue  Operator  Control  Unit  (OCU).  There  are  several  methods  of  protection,  including  defensive
            hardening to mitigate this attack vector, but in the case of a breach of defense, a standard operating
            procedure needs to exist to respond to this detected threat. In enterprise environments, this is handled
            by a person or group of people. An autonomous vehicle, on the other hand, is not expected to have
            trained personnel to respond.










            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          234
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   229   230   231   232   233   234   235   236   237   238   239