Intrusion detection system for CubeSats: a survey

被引:2
|
作者
Driouch, Otman [1 ,2 ]
Bah, Slimane [1 ]
Guennoun, Zouhair [1 ]
机构
[1] Mohammed 5 Univ Rabat, Smart Commun Res Team, Mohammadia Sch Engineers, Univ Ctr Res Space Technol, Rabat, Morocco
[2] Royal Ctr Space Res & Studies, Rabat, Morocco
关键词
Space mission; CubeSat; cybersecurity; intrusion detection; cyberthreats;
D O I
10.1109/IWCMC58020.2023.10182729
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The impressive growth in the number of CubeSats projects carried out over the past decade gives rise to a new segment in the space industry. Whether academic, military or commercial, CubeSats missions provide a wide range of low-cost space applications. This is due on the one hand to the evolution in the launch offer and on the other hand to the use of Components-Of-The-Shelf (COTS). Despite their advantages, these components are associated with many cybersecurity risks, making space segments more accessible targets for cyberattacks and intrusions. This paper provides a brief overview of intrusion detection approaches corresponding to cyber threats that may target CubeSats. We classify Intrusion Detection System (IDS) components according to a number of factors, such as data sources, architectures, detection mechanisms and modes, and intrusion forms. Then, we present challenges and potential areas for future research, with the goal of designing a CubeSat Intrusion Detection System that efficiently balances security performance and space missions' constraints.
引用
收藏
页码:596 / 601
页数:6
相关论文
共 50 条
  • [21] Survey: Intrusion Detection System in Software-Defined Networking
    Janabi, Ahmed H.
    Kanakis, Triantafyllos
    Johnson, Mark
    IEEE ACCESS, 2024, 12 : 164097 - 164120
  • [22] Data Mining Based Network Intrusion Detection System: A Survey
    Helali, Rasha G. Mohammed
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 501 - 505
  • [23] A Survey on Intrusion Detection System Using Machine Learning Algorithms
    Gulghane, Shital
    Shingate, Vishal
    Bondgulwar, Shivani
    Awari, Gaurav
    Sagar, Parth
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 670 - 675
  • [24] Role of swarm and evolutionary algorithms for intrusion detection system: A survey
    Thakkar, Ankit
    Lohiya, Ritika
    SWARM AND EVOLUTIONARY COMPUTATION, 2020, 53
  • [25] Survey and taxonomy of feature selection algorithms in intrusion detection system
    Chen, You
    Li, Yang
    Cheng, Xue-Qi
    Guo, Li
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 153 - +
  • [26] Survey of intrusion detection techniques
    Lunt, Teresa F.
    Computers and Security, 1993, 12 (04): : 405 - 418
  • [27] A Survey on Intrusion Detection Tools
    Bhati, Bhoopesh Singh
    Rai, C. S.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 806 - 810
  • [28] Taxonomy and Survey of Collaborative Intrusion Detection System using Federated Learning
    Wardana, Aulia arif
    Sukarno, Parman
    ACM COMPUTING SURVEYS, 2025, 57 (04)
  • [29] Deep Learning Techniques for Anomaly based Intrusion Detection System: A Survey
    Kumar, Yogendra
    Chouhan, Lokesh
    Subba, Basant
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 915 - 920
  • [30] A Survey of Intrusion Detection System using Case StudyKuwait Governments Entiteis
    Al-Enezi, Khalid Abdulkareem
    Al-shaikhli, Imad Fakhri
    Al-kandari, Abdul Rahman
    AL-Tayyar, Lulwa Ziad
    3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 37 - 43