Author:
Basan Elena,Peskova Olga,Silin Oleg,Basan Alexander,Abramov Evgeniy
Abstract
Today, issues related to ensuring the safety of UAVs are very relevant. Researchers need to develop new protection methods to detect attacks in a timely manner and implement mitigation measures. The authors propose a new concept of attack detection "from inside" the UAV. The idea is to analyze the cyber-physical parameters of the UAV, which may indicate an attack, and its possible consequences. It was determined that to detect an attack and determine the consequences to which it can lead, it is necessary to control not only the initial parameters, but also the internal cyber-physical parameters of the UAV. This will allow predicting the possible consequences of an attack and taking emergency measures. A scheme of the impact of an attack on UAVs and the relationship with security incidents, built using an ontological approach, has been worked out. Two main essences of the UAV are considered - the physical and digital aspects of the UAV. Examples of chains of attacks leading to various consequences are also shown. In the review part, the analysis of methods and algorithms for detecting spoofing attacks using data generators is carried out, based on which conclusions are drawn about their advantages and disadvantages. Further, based on the experiments performed, the authors propose a method for assessing the quality of data and a method for generating anomalous data sets similar to real attack data, which can be used to develop and test methods for detecting and blocking attacks. The architecture of the experimental stand, which was used in the framework of full-scale simulation, is described. At this stand, designed to parse GPS spoofing attacks (GPS spoofing), several scenarios of a normal flight, and then several attack scenarios, were tested. Based on the results of the experiments, a method has been proposed that allows simulating the data corresponding to the attack with the required accuracy. A method for assessing the quality of fake data has also been proposed.
Subject
Artificial Intelligence,Applied Mathematics,Computational Theory and Mathematics,Computational Mathematics,Computer Networks and Communications,Information Systems
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献