UAV Security Analysis Framework

被引:0
作者
Basan, Elena [1 ]
Abramov, Evgeny [1 ]
Gladkov, Nikita [1 ]
Lapina, Maria [2 ]
Lapin, Vitalii [3 ]
Anita, E. A. Mary [4 ]
Kumar, Sandeep [4 ]
机构
[1] Southern Fed Univ, Taganrog 347922, Russia
[2] North Caucasian Fed Univ, Stavropol 355017, Russia
[3] Stavropol Reg Clin Advisory & Diagnost Ctr, Stavropol 355000, Russia
[4] CHRIST, Bangalore 560074, Karnataka, India
来源
FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 3, CIS 2023 | 2024年 / 865卷
关键词
Attacks; Threats; Vulnerabilities; Database; Neural network; UAV;
D O I
10.1007/978-981-99-9043-6_31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study presents a framework that allows for various types of checks to detect weaknesses in UAV subsystems. The UAV testing process is automated and allows the operator only to select the types of checks or types of structural and functional characteristics that the operator wants to test. To ensure the possibility of automated verification, implemented databases are used, which include a catalog of structural characteristics, threats, vulnerabilities, and attacks. These catalogs are many-to-many related, and thanks to these links, it is possible to identify threats or vulnerabilities specific to a particular structural characteristic. In essence, such an architecture is a knowledge base based on an ontological model. Thanks to this architecture of the system, it is enough for the operator to determine what types of structural characteristics need to be checked and the system will give him information about the vulnerabilities of the UAV.
引用
收藏
页码:379 / 391
页数:13
相关论文
共 22 条
  • [1] RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
    Al-Sa'd, Mohammad F.
    Al-Ali, Abdulla
    Mohamed, Amr
    Khattab, Tamer
    Erbad, Aiman
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 86 - 97
  • [2] Altawy R, 2017, ACM TRANS CYBER-PHYS, V1, DOI 10.1145/3001836
  • [3] Astashkin DG, 2017, COLL REP ART BAS MAT, P183
  • [4] Basan A, 2020, CEUR Works Proc, V2667, P30
  • [5] Basan Elena, 2019, 2019 International Conference on Information Systems and Computer Science (INCISCOS). Proceedings, P354, DOI 10.1109/INCISCOS49368.2019.00062
  • [6] Basan E, 2019, P 2019 19 INT C COMM, P1275
  • [7] A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes
    Basan, Elena
    Basan, Alexandr
    Nekrasov, Alexey
    Fidge, Colin
    Gamec, Jan
    Gamcova, Maria
    [J]. SENSORS, 2021, 21 (02) : 1 - 17
  • [8] Best KL, 2020, How to analyze the cyber threat from drones background, analysis frameworks, and analysis tools
  • [9] Bishop M, 2004, Introduction to computer security
  • [10] Horton Eric, 2018, Journal of Global Positioning Systems, V16, DOI 10.1186/s41445-018-0018-3