Meet the Expert: Upstream Detectors Explained

Shachar Azriel, VP Data, explains Upstream’s unique approach to building and formulating detectors on the Upstream Platform. Drilling down to what detectors are exactly, who can build them, and why it’s so important to empower customers to build their own detectors on the platform for tailored cybersecurity detection and response.

 


 

Script

What’s a detector? 

A detector is a piece of logic. In practice, this means it’s pseudo code, a basic or advanced one that answers a defined use case. 

Anything in the world has a data signature – When we build these detectors, we need the ability to refine what these signatures are, and where to find them. Our expertise is translating a cyber attack scenario to a simple logic and understanding where we can find it in the data we receive from the OEMs.

Upstream aims to democratize detector creation – Based on our experience, some of the best detectors are built by our customers. The customer has the most valuable insights into their fleet features and the specific use they want to deal with.  The customer is sometimes part of the design process or has access to threat models that provide them with an understanding that we don’t have. 

Upstream helps our customers to translate this unique knowledge into signatures, then analyzes and validates them based on their data. 

How do we know what to look for? 

Based on the fact that we monitor more than 12 million vehicles around the world and collect automotive threat intelligence with AutoThreat we can determine the most common and severe attack vectors and threats in our ecosystem.

Based on that knowledge, we use our expertise to translate these threats to data signatures and extract them from the OEM’s data. 

For example, when a hacker tries to take over a vehicle via an API, there are several stages you need to be able to classify and detect, and if you don’t have the expertise, this kind of attack will stay at an abstract level that can’t be detected or lead to a detector that will generate a high false positives alerts.

Who can build detectors? Does it require any know-how or training?

Upstream’s platform is built and designed to enable customers to build their own use cases, therefore it’s user-friendly and intuitive. With the basic training we provide our customers and partners, almost anyone can build their own detectors!

The user needs to understand which threat he wants to mitigate and which data is collected from their vehicles and servers. From that point he can use our platform to build any kind of pseudo code he desires and validate it.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Sécuriser et renforcer l’avenir de la mobilité et de l’IoT

Upstream libère le potentiel des véhicules connectés, de l’IoT et des données de la mobilité intelligente. 
 Sa plateforme de gestion des données est spécialement…

More Details

Études de cas : Comment l’IA permet de détecter plus tôt les problèmes de qualité véhicule

La détection proactive de la qualité (PQD) d’Upstream en action, accélérant l’analyse des causes premières (RCA), l’évaluation de la gravité et la priorisation des problèmes…

More Details

Beyond the Cyber Resilience Act: Building
Cyber Resilience for the EV Charging Ecosystem

The CRA places broad obligations on manufacturers, including those who design, develop, or brand charge points, backend systems, and embedded communication software used throughout the…

More Details

Beyond the Cyber Resilience Act: Building Holistic Cyber Resilience

A decade ago, the value of connected vehicle data was associated with new revenue streams for OEMs. Fast forward to today, a more effective and…

More Details

Tech Talk: Securing the Commercial Fleet Ecosystem with IVECO’s CISO

The commercial vehicle industry is undergoing a seismic shift. The convergence of connectivity, electrification, and software-defined vehicles is unlocking unprecedented efficiency but also exposing f

More Details

Unmasking the Blind Spot: Why API Security Is the Weak Link in Automotive Cybersecurity

In this session, recorded during the Auto ISAC Partners Week, Upstream's Dr. Matthias Lenk and Fabian Stahl explain why API security remains a critical yet…

More Details
Skip to content