Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.1.39

Sequence Based Anomaly Detection System for Unmanned Aerial Vehicle  

Seo, Kang Uk (School of Cybersecurity, Korea University)
Kim, Huy Kang (School of Cybersecurity, Korea University)
Abstract
In this paper, we propose an anomaly detection system (ADS) to detect anomalies of the in-vehicle network for unmanned aerial vehicle (UAV). The proposed ADS detects the anomalies by measuring the similarity of status messages sequences periodically sent by the UAV to the ground control system. We defined three types of malicious message injection attacks that can be performed on the in-vehicle network of UAV and simulated those attack techniques in the Pixhawk4 quadcopter. The proposed ADS can detect abnormal sequences with accuracy of higher than 96%.
Keywords
Anomaly detection system; Sequence data; Unmanned aerial vehicle;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Hayat, S., Yanmaz, E., Muzaffar, R., "Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint," IEEE Communications Surveys Tutorials, 18(4), pp. 2624-2661, 2016.   DOI
2 Meier, L., "Dynamic Robot Architecture for Robust Realtime Computer Vision," Ph.D. thesis ETH Zurich, 2017.
3 Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D., "Cloud-based cyberphysical intrusion detection for vehicles using deep learning," IEEE Access, 6, pp. 3491-3508, 2018.   DOI
4 Kim, K.H., Nalluri, S., Kashinath, A., Wang, Y., Mohan, S., Pajic, M., Li, B., "Security analysis against spoofing attacks for distributed uavs," In: Decentralized IoT Systems and Security, 2020.
5 Panice, G., Luongo, S., Gigante, G., Pascarella, D., Di Benedetto, C., Vozella, A., Pescap'e, A., "A svm-based detection approach for gps-spoofing attacks to uav," In: 2017 23rd International Conference on Automation and Computing (ICAC), pp. 1-11, 2017.
6 Birnbaum, Z., Dolgikh, A., Skormin, V., O'Brien, E., Muller, D., "Unmanned aerial vehicle security using recursive parameter estimation,"In: 2014 International Conference on Unmanned Aircraft Systems (ICUAS), pp. 692-702, 2014.
7 Jaro, M. A., "Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida," Journal of the American Statistical Association, 84(406), pp. 414-420, 1989.   DOI
8 Gomaa, W. H., & Fahmy, A. A., "A survey of text similarity approaches," international journal of Computer Applications, 68(13), pp. 13-18, 2013.   DOI
9 Chandola, V., Banerjee, A., & Kumar, V., "Anomaly detection for discrete sequences: A survey," IEEE transactions on knowledge and data engineering, 24(5), pp. 823-839, 2010.   DOI
10 Jaccard, P. "Etude comparative de la distribution florale dans une portiondes Alpes et des Jura," Bull Soc Vaudoise Sci Nat, 37, pp. 547-579, 1901.
11 Meng, L., Ren, S., Tang, G., Yang, C., & Yang, W.," Uav sensor spoofing detection algorithm based on gps and optical flow fusion," In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 146-151, Jan. 2020.
12 Bozdal, M., Samie, M., & Jennions, I., "A survey on can bus protocol: Attacks, challenges, and potential solutions," In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), pp. 201-205, Aug. 2018.
13 Kapoor, P., Vora, A., Kang, K.D., "Detecting and mitigating spoofing attack against an automotive radar," In: 2018 IEEE 88th Vehicular Technology Conference (VTCFall). pp. 1-6, 2018.
14 Ebeid, E., Skriver, M., & Jin, J., "A survey on open-source flight control platforms of unmanned aerial vehicle," In 2017 Euromicro Conference on Digital System Design (DSD), pp. 396-402, Aug. 2017.
15 Koubaa, A., Allouch, A., Alajlan, M., Javed, Y., Belghith, A., & Khalgui, M., "Micro air vehicle link (mavlink) in a nutshell: A survey," IEEE Access, 7, pp. 87658-87680, 2019.   DOI
16 Uncomplicated application-layer vehicular computing and Networking. Uncomplicated Application-layer Vehicular Computing And Networking, https://uavcan.org/, November 5. 2021.
17 Wikimedia Foundation. "Iran-U.S. RQ-170 incident". https://en.wikipedia.org/wiki/Iran%E2%80%93U.S._RQ-170_incident, October 19. 2021.
18 Olufowobi, H., Young, C., Zambreno, J., Bloom, G., "Saiducant: Specificationbased automotive intrusion detection using controller area network (can) timing," IEEE Transactions on Vehicular Technology, 69(2), pp. 1484-1494, 2020.   DOI
19 Tariq, S., Lee, S., Kim, H.K., Woo, S.S., "Can-adf: The controller area network attac kdetection framework," Computers & Security, 94, pp. 101857, 2020.   DOI
20 Sun, H., Lee, S.Y., Joo, K., Jin, H., Lee, D.H., "Catch id if you can: Dynamic id virtualization mechanism for the controller area network," IEEE Access, 7, pp. 158237-158249, 2019.   DOI
21 Wang, Q., Lu, Z., Qu, G., "An entropy analysis based intrusion detection system for controller area network in vehicles," In 2018 31st IEEE International System-on-Chip Conference (SOCC), pp. 90-95, 2018.
22 Sedjelmaci, H., Senouci, S.M., Ansari, N., "Ahierarchical detection and response system to enhance security against lethal cyber-attacks in uav networks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, 48(9), pp. 1594-1606, 2018.   DOI
23 Levenshtein, V. I., "Binary codes capable of correcting deletions, insertions, and reversals," In Soviet physics doklady, 10(8), pp. 707-710, Feb. 1966.
24 Pant, S., & Lee, S., "Design and Implementation of a CAN Data Analysis Test Bench based on Raspberry Pi," Journal of Multimedia Information System, 6(4), pp. 239-244, 2019.   DOI