scholarly journals GPS-Spoofing Attack Detection Technology for UAVs Based on Kullback–Leibler Divergence

Drones ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 8
Author(s):  
Elena Basan ◽  
Alexandr Basan ◽  
Alexey Nekrasov ◽  
Colin Fidge ◽  
Nikita Sushkin ◽  
...  

Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positioning System (GPS) signal of an Unmanned Aerial Vehicle (UAV). Most methods for detecting UAV anomalies indicative of an attack use machine learning or other such methods that compare normal behavior with abnormal behavior. Such approaches require large amounts of data and significant “training” time to prepare and implement the system. Instead, we consider a new approach based on other mathematical methods for detecting UAV anomalies without the need to first collect a large amount of data and describe normal behavior patterns. Doing so can simplify the process of creating an anomaly detection system, which can further facilitate easier implementation of intrusion detection systems in UAVs. This article presents issues related to ensuring the information security of UAVs. Development of the GPS spoofing detection method for UAVs is then described, based on a preliminary study that made it possible to form a mathematical apparatus for solving the problem. We then explain the necessary analysis of parameters and methods of data normalization, and the analysis of the Kullback—Leibler divergence measure needed to detect anomalies in UAV systems.

2013 ◽  
Vol 427-429 ◽  
pp. 1903-1906
Author(s):  
Peng Wang ◽  
Zhi Qiang Liu

A system for detecting and evaluating drivers gaze behavior was proposed. A system for recognizing the drivers unsafe gaze behavior was established using multi-level information and fusion decision method as well. The driving environment and condition is complex as well as the gaze behavior characteristics, and given that, a solution consists of patten classification and the multi-information decision-level fusion were put forward to estimate the different kind model of the driver's gaze behavior. In order to test the proposed strategies,the real time driver's gaze behavior detection system was established. The T characteristic curve proposed through the abnormal behavior parameters of the transverse width between the eyes and the vertical distance between mouth and the midpoint of two eyes, combined with the driver's eyelid closure and the proportion and location characteristics of iris - sclera were studied to get the characterization of the drivers gaze status information. The simulation results indicate that the adaptability and accuracy as well as the intelligent level is significantly improved by using the pattern classification and decision-making technology through multi-source information fusion.


Author(s):  
Rawaa Ismael Farhan ◽  
Abeer Tariq Maolood ◽  
Nidaa Flaih Hassan

<p>The emergence of the Internet of Things (IOT) as a result of the development of the communications system has made the study of cyber security more important. Day after day, attacks evolve and new attacks are emerged. Hence, network anomaly-based intrusion detection system is become very important, which plays an important role in protecting the network through early detection of attacks. Because of the development in  machine learning and the emergence of deep learning field,  and its ability to extract high-level features with high accuracy, made these systems involved to be worked with  real network traffic CSE-CIC-IDS2018 with a wide range of intrusions and normal behavior is an ideal way for testing and evaluation . In this paper , we  test and evaluate our  deep model (DNN) which achieved good detection accuracy about  90% .</p>


Author(s):  
Suresh Adithya Nallamuthu ◽  

The security for cloud network systems is essential and significant to secure the data source from intruders and attacks. Implementing an intrusion detection system (IDS) for securing from those intruders and attacks is the best option. Many IDS models are presently based on different techniques and algorithms like machine learning and deep learning. In this research, IDS for the cloud computing environment is proposed. Here in this model, the genetic algorithm (GA) and back propagation neural network (BPNN) is used for attack detection and classification. The Canadian Institute for Cyber-security CIC-IDS 2017 dataset is used for the evaluation of performance analysis. Initially, from the dataset, the data are preprocessed, and by using the genetic algorithm, the attack was detected. The detected attacks are classified using the BPNN classifier for identifying the types of attacks. The performance analysis was executed, and the results are obtained and compared with the existing machine learning-based classifiers like FC-ANN, NB-RF, KDBN, and FCM-SVM techniques. The proposed GA-BPNN model outperforms all these classifying techniques in every performance metric, like accuracy, precision, recall, and detection rate. Overall, from the performance analysis, the best classification accuracy is achieved for Web attack detection with 97.90%, and the best detection rate is achieved for Brute force attack detection with 97.89%.


2020 ◽  
Vol 38 (1B) ◽  
pp. 6-14
Author(s):  
ٍٍSarah M. Shareef ◽  
Soukaena H. Hashim

Network intrusion detection system (NIDS) is a software system which plays an important role to protect network system and can be used to monitor network activities to detect different kinds of attacks from normal behavior in network traffics. A false alarm is one of the most identified problems in relation to the intrusion detection system which can be a limiting factor for the performance and accuracy of the intrusion detection system. The proposed system involves mining techniques at two sequential levels, which are: at the first level Naïve Bayes algorithm is used to detect abnormal activity from normal behavior. The second level is the multinomial logistic regression algorithm of which is used to classify abnormal activity into main four attack types in addition to a normal class. To evaluate the proposed system, the KDDCUP99 dataset of the intrusion detection system was used and K-fold cross-validation was performed. The experimental results show that the performance of the proposed system is improved with less false alarm rate.


2021 ◽  
Vol 13 ◽  
pp. 175682932110048
Author(s):  
Huajun Song ◽  
Yanqi Wu ◽  
Guangbing Zhou

With the rapid development of drones, many problems have arisen, such as invasion of privacy and endangering security. Inspired by biology, in order to achieve effective detection and robust tracking of small targets such as unmanned aerial vehicles, a binocular vision detection system is designed. The system is composed of long focus and wide-angle dual cameras, servo pan tilt, and dual processors for detecting and identifying targets. In view of the shortcomings of spatio-temporal context target tracking algorithm that cannot adapt to scale transformation and easy to track failure in complex scenes, the scale filter and loss criterion are introduced to make an improvement. Qualitative and quantitative experiments show that the designed system can adapt to the scale changes and partial occlusion conditions in the detection, and meets the real-time requirements. The hardware system and algorithm both have reference value for the application of anti-unmanned aerial vehicle systems.


2014 ◽  
Vol 530-531 ◽  
pp. 705-708
Author(s):  
Yao Meng

This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.


Sign in / Sign up

Export Citation Format

Share Document