DOI QR코드

DOI QR Code

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data

HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템

  • 박대경 (한화시스템(주) 기반기술연구소) ;
  • 김병진 (한화시스템(주) 기반기술연구소)
  • Received : 2023.04.13
  • Accepted : 2023.05.11
  • Published : 2023.06.30

Abstract

In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.

최근 몇 년 동안 무인비행체는 다양한 산업 분야에서 널리 사용되고 있다. 그러나, 무인비행체에 대한 의존도가 급격하게 높아짐에 따라 무인비행체의 보안과 안전에 대한 우려가 커지고 있다. 현재 무인비행체의 제어권을 탈취하거나 웹 애플리케이션에서 무인비행체와 통신할 수 있는 권한을 탈취하는 등 다양한 취약점들이 공개되고 있다. 하지만, 무인비행체의 보안과 관련된 연구가 많이 부족한 실정이다. 따라서 본 논문에서는 실제 환경과 유사한 HITL 시뮬레이션 환경에서 무인비행체의 패킷 데이터를 수집하여 패킷 데이터가 정상 데이터인지 비정상 데이터인지 판단하는 연구를 진행하였다. 또한, 본 논문에서는 모델링 과정에서 Computation Cost를 줄이고 데이터 해석의 용이성을 높이는 방법과 정상 데이터만을 학습하여 비정상 데이터를 탐지하는 기계 학습 기반 이상 탐지 모델 및 최적화된 하이퍼 파라미터값을 제안한다.

Keywords

Acknowledgement

본 논문은 2023년 정부(방위사업청)의 재원으로 국방과학연구소의 지원을 받아 수행된 미래도전국방기술 연구개발사업임(No. 915024201)

References

  1. Restas, Agoston. "Drone applications for supporting disaster management." World Journal of Engineering and Technology 3.03 (2015): 316.
  2. Vashisht, Sahil, Sushma Jain, and Gagangeet Singh Aujla. "MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges." Computer Communications 160 (2020): 443-463. https://doi.org/10.1016/j.comcom.2020.06.011
  3. Culver, Kathleen Bartzen. "From battlefield to newsroom: Ethical implications of drone technology in journalism." Journal of mass media ethics 29.1 (2014): 52-64. https://doi.org/10.1080/08900523.2013.829679
  4. Alwateer, Majed, Seng W. Loke, and Niroshinie Fernando. "Enabling drone services: drone crowd sourcing and drone scripting." IEEE access 7 (2019): 110035-110049. https://doi.org/10.1109/ACCESS.2019.2933234
  5. Rodday, Nils Miro, Ricardo de O. Schmidt, and Aiko Pras. "Exploring security vulnerabilities of unmanned aerial vehicles." NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2016.
  6. 이우진, 서경덕, and 채병민. "오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking 을 이용한 군용 드론 공격 시나리오 연구." 융합보안논문지 20.4 (2020): 103-112. https://doi.org/10.33778/kcsa.2020.20.4.103
  7. Alladi, Tejasvi, et al. "Consumer IoT: Security vulnerability case studies and solutions." IEEE Consumer Electronics Magazine 9.2 (2020): 17-25. https://doi.org/10.1109/MCE.2019.2953740
  8. Choi, Yun-Jeong, and Seung-Soo Park. "Reinforcement mining method for anomaly detection and misuse detection using post-processing and training method." Proceedings of the Korean Information Science Society Conference. Korean Institute of Information Scientists and Engineers, 2006.
  9. 김태희, 강승호. "실시간 탐지를 위한 인공신경망 기반의 네트워크 침입탐지 시스템." 융합보안논문지 17.1 (2017): 31-38.
  10. Choi, S. O., and W. N. Kim. "Control system intrusion detection system technology research trend." Rev. KIISC 24.5 (2014): 7-14.
  11. Meier, Lorenz, Dominik Honegger, and Marc Pollefeys. "PX4: A node-based multithreaded open source robotics framework for deeply embedded platforms." 2015 IEEE international conference on robotics and automation (ICRA). IEEE, 2015.
  12. Lin, Tzu-Chiao, et al. "Realization of Intelligent-Inspection Functions of UAV in Transmission Grids Using Machine Learning." 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 2023.
  13. Dardoize, Tristan, et al. "Implementation of ground control system for autonomous multi-agents using qgroundcontrol." 2019 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED UAS). IEEE, 2019.
  14. Khan, Navid Ali, Sarfraz Nawaz Brohi, and N. Z. Jhanjhi. "UAV's applications, architecture, security issues and attack scenarios: A survey." Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2019. Springer Singapore, 2020.
  15. Marty, Joseph A. Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft. AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT, 2013.
  16. Bae, Myeong-Jin, and Seong-Il Kim. "항공 드론지상 제어 시스템 기술 동향." Korea Multimedia Society 20.1_2 (2016): 22-28.
  17. Wandarosanza, Rendy, Bambang Riyanto Trilaksono, and Egi Hidayat. "Hardware-In-the-Loop Simulation of UAV hexacopter for Chemical Hazard monitoring mission." 2016 6th International Conference on System Engineering and Technology (ICSET). IEEE, 2016.
  18. Hentati, Aicha Idriss, et al. "Simulation tools, environments and frameworks for UAV systems performance analysis." 2018 14th international wireless communications & mobile computing conference (iwcmc). IEEE, 2018.
  19. Bacic, Marko. "On hardware-in-the-loop simulation." Proceedings of the 44th IEEE Conference on Decision and Control. IEEE, 2005.
  20. 김한석, and 이수진. "기계학습 기반 랜섬웨어 공격 탐지를 위한 효과적인 특성 추출기법 비교분석." 융합보안논문지 23.1 (2023): 117-123.
  21. Muller, Matthew P., et al. "Can routine laboratory tests discriminate between severe acute respiratory syndrome and other causes of community-acquired pneumonia?." Clinical infectious diseases 40.8 (2005): 1079-1086. https://doi.org/10.1086/428577