Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     In-vehicle intrusion detection systems         
        6.1     Functions of in-vehicle intrusion detection system      
 7     Identified threats to in‑vehicle networks     
        7.1     General          
        7.2     Threats to confidentiality        
        7.3     Threats to integrity    
        7.4     Threats to availability
 8     Implementation guidelines for in-vehicle intrusion detection System              
        8.1     Points of installation for in-vehicle intrusion detection system
        8.2     Intrusion detection methodology        
        8.3     Detection rule set      
        8.4     Detection report         
Appendix I – General architecture of and background information about in‑vehicle networks    
        I.1     General architectural framework of an intrusion detection system        
        I.2     In-vehicle network and its characteristics          
Bibliography