Fuzzing drones for anomaly detection: A systematic literature review

被引:0
|
作者
Malviya, Vikas K. [1 ]
Minn, Wei [1 ]
Shar, Lwin Khin [1 ]
Jiang, Lingxiao [1 ]
机构
[1] Singapore Management Univ, Sch Comp & Informat Syst, Singapore, Singapore
关键词
Drone; Fuzzing; Anomaly detection; MAVLink protocol; VEHICLES;
D O I
10.1016/j.cose.2024.104157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, also referred to as Unmanned Aerial Vehicles (UAVs), are becoming popular today due to their uses in different fields and recent technological advancements which provide easy control of UAVs via mobile apps. However, UAVs may contain vulnerabilities or software bugs that cause serious safety and security concerns. For example, the communication protocol used by the UAV may contain authentication and authorization vulnerabilities, which maybe exploited by attackers to gain remote access over the UAV. Drones must therefore undergo extensive testing before being released or deployed to identify and fix any software bugs or security vulnerabilities. Fuzzing is one commonly used technique for finding bugs and vulnerabilities in software programs and protocols. This article reviews various approaches where fuzzing is applied to detect bugs and vulnerabilities in UAVs. Our goal is to assess the current state-of-the-art fuzzing approaches for UAVs, which are yet to be explored in the literature. We identified open challenges that call for further research to improve the current state-of-the-art.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Unmanned aerial vehicles/drones in vehicle routing problems: a literature review
    Rojas Viloria, Daniela
    Solano-Charris, Elyn L.
    Munoz-Villamizar, Andres
    Montoya-Torres, Jairo R.
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2021, 28 (04) : 1626 - 1657
  • [42] Prevention and Fighting against Web Attacks through Anomaly Detection Technology. A Systematic Review
    Sureda Riera, Tomas
    Bermejo Higuera, Juan-Ramon
    Bermejo Higuera, Javier
    Martinez Herraiz, Jose-Javier
    Sicilia Montalvo, Juan-Antonio
    SUSTAINABILITY, 2020, 12 (12)
  • [43] Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques
    Gelgi, Metehan
    Guan, Yueting
    Arunachala, Sanjay
    Rao, Maddi Samba Siva
    Dragoni, Nicola
    SENSORS, 2024, 24 (11)
  • [44] Anti-money laundering and financial fraud detection: A systematic literature review
    Goecks, Lucas Schmidt
    Korzenowski, Andre Luis
    Goncalves Terra Neto, Platao
    de Souza, Davenilcio Luiz
    Mareth, Taciana
    INTELLIGENT SYSTEMS IN ACCOUNTING FINANCE & MANAGEMENT, 2022, 29 (02) : 71 - 85
  • [45] GAN-based anomaly detection: A review
    Xia, Xuan
    Pan, Xizhou
    Li, Nan
    He, Xing
    Ma, Lin
    NEUROCOMPUTING, 2022, 493 : 497 - 535
  • [46] A Comprehensive Review of Anomaly Detection in Web Logs
    Majd, Mehryar
    Najafi, Pejman
    Alhosseini, Seyed Ali
    Cheng, Feng
    Meinel, Christoph
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
  • [47] A Unifying Review of Deep and Shallow Anomaly Detection
    Ruff, Lukas
    Kauffmann, Jacob R.
    Vandermeulen, Robert A.
    Montavon, Gregoire
    Samek, Wojciech
    Kloft, Marius
    Dietterich, Thomas G.
    Mueller, Klaus-Robert
    PROCEEDINGS OF THE IEEE, 2021, 109 (05) : 756 - 795
  • [48] Review of Anomaly Detection Algorithms for Data Streams
    Lu, Tianyuan
    Wang, Lei
    Zhao, Xiaoyong
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [49] A Comprehensive Review for Video Anomaly Detection on Videos
    Abbas, Zainab K.
    Al-Ani, Ayad A.
    PROCEEDING OF THE 2ND 2022 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (CSASE 2022), 2022, : 30 - 35
  • [50] Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review
    Mutembei, Leonard L.
    Senekane, Makhamisa C.
    van Zyl, Terence
    ARTIFICIAL INTELLIGENCE RESEARCH, SACAIR 2024, 2025, 2326 : 207 - 234