Fuzzing drones for anomaly detection: A systematic literature review

被引:0
|
作者
Malviya, Vikas K. [1 ]
Minn, Wei [1 ]
Shar, Lwin Khin [1 ]
Jiang, Lingxiao [1 ]
机构
[1] Singapore Management Univ, Sch Comp & Informat Syst, Singapore, Singapore
关键词
Drone; Fuzzing; Anomaly detection; MAVLink protocol; VEHICLES;
D O I
10.1016/j.cose.2024.104157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, also referred to as Unmanned Aerial Vehicles (UAVs), are becoming popular today due to their uses in different fields and recent technological advancements which provide easy control of UAVs via mobile apps. However, UAVs may contain vulnerabilities or software bugs that cause serious safety and security concerns. For example, the communication protocol used by the UAV may contain authentication and authorization vulnerabilities, which maybe exploited by attackers to gain remote access over the UAV. Drones must therefore undergo extensive testing before being released or deployed to identify and fix any software bugs or security vulnerabilities. Fuzzing is one commonly used technique for finding bugs and vulnerabilities in software programs and protocols. This article reviews various approaches where fuzzing is applied to detect bugs and vulnerabilities in UAVs. Our goal is to assess the current state-of-the-art fuzzing approaches for UAVs, which are yet to be explored in the literature. We identified open challenges that call for further research to improve the current state-of-the-art.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] A Stethoscope for Drones: Transformers-Based Methods for UAVs Acoustic Anomaly Detection
    Anidjar, Or Haim
    Barak, Alon
    Ben-Moshe, Boaz
    Hagai, Eyal
    Tuvyahu, Sahar
    IEEE ACCESS, 2023, 11 : 33336 - 33353
  • [32] Maritime anomaly detection: A review
    Riveiro, Maria
    Pallotta, Giuliana
    Vespe, Michele
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2018, 8 (05)
  • [33] Machine learning applications for anomaly detection in Smart Water Metering Networks: A systematic review
    Kanyama, M. N.
    Shava, F. Bhunu
    Gamundani, A. M.
    Hartmann, A.
    PHYSICS AND CHEMISTRY OF THE EARTH, 2024, 134
  • [34] IT Infrastructure Anomaly Detection and Failure Handling: A Systematic Literature Review Focusing on Datasets, Log Preprocessing, Machine & Deep Learning Approaches and Automated Tool
    Bhanage, Deepali Arun
    Pawar, Ambika Vishal
    Kotecha, Ketan
    IEEE ACCESS, 2021, 9 : 156392 - 156421
  • [35] Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
    Salo, Fadi
    Injadat, Mohammadnoor
    Nassif, Ali Bou
    Shami, Abdallah
    Essex, Aleksander
    IEEE ACCESS, 2018, 6 : 56046 - 56058
  • [36] Swarm Intelligence inspired Intrusion Detection Systems - A systematic literature review
    Nasir, Muhammad Hassan
    Khan, Salman A.
    Khan, Muhammad Mubashir
    Fatima, Mahawish
    COMPUTER NETWORKS, 2022, 205
  • [37] Multiview Deep Anomaly Detection: A Systematic Exploration
    Wang, Siqi
    Liu, Jiyuan
    Yu, Guang
    Liu, Xinwang
    Zhou, Sihang
    Zhu, En
    Yang, Yuexiang
    Yin, Jianping
    Yang, Wenjing
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (02) : 1651 - 1665
  • [38] Deep Learning for Anomaly Detection: A Review
    Pang, Guansong
    Shen, Chunhua
    Cao, Longbing
    Van den Hengel, Anton
    ACM COMPUTING SURVEYS, 2021, 54 (02)
  • [39] A Review of Neural Networks for Anomaly Detection
    de Albuquerque Filho, Jose Edson
    Brandao, Laislla C. P.
    Torres Fernandes, Bruno Jose
    Maciel, Alexandre M. A.
    IEEE ACCESS, 2022, 10 : 112342 - 112367
  • [40] A Review of Anomaly Detection in Automated Surveillance
    Sodemann, Angela A.
    Ross, Matthew P.
    Borghetti, Brett J.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (06): : 1257 - 1272