Affiliation:
1. Department of Software Convergence and Communication Engineering, Sejong Campus, Hongik University, 2639, Sejong-ro, Jochiwon-eup, Sejong City 30016, Republic of Korea
Abstract
Recently, methods to detect DoS and spoofing attacks on In-Vehicle Networks via the CAN protocol have been studied using deep learning models, such as CNN, RNN, and LSTM. These studies have produced significant results in the field of In-Vehicle Network attack detection using deep learning models. However, these studies have typically addressed studies on single-model intrusion detection verification in drone networks. This study developed an ensemble model that can detect multiple types of intrusion simultaneously. In preprocessing, the patterns within the payload using the measure of Feature Importance are distinguished from the attack and normal data. As a result, this improved the accuracy of the ensemble model. Through the experiment, both the accuracy score and the F1-score were verified for practical utility through 97% detection performance measurement.
Reference48 articles.
1. OpenCyphal (2024, April 26). DS-015 UAVCAN Drone Standard v1.0.1. Available online: https://legacy.uavcan.org/Specification/4._CAN_bus_transport_layer/.
2. Autonomous unmanned aerial vehicles filming in dynamic unstructured outdoor environments;Mademlis;IEEE Signal Process. Mag.,2018
3. Unmanned aerial vehicles in agriculture: A review of perspective of platform, control, and applications;Kim;IEEE Access,2019
4. Gargalakos, M. (2021). The role of unmanned aerial vehicles in military communications: Application scenarios, current trends, and beyond. J. Def. Model. Simul., 15485129211031668.
5. Security, privacy, and safety aspects of civilian drones: A survey;Altawy;ACM Trans. Cyber-Phys. Syst.,2016