Intrusion detection system for CubeSats: a survey

被引:2
|
作者
Driouch, Otman [1 ,2 ]
Bah, Slimane [1 ]
Guennoun, Zouhair [1 ]
机构
[1] Mohammed 5 Univ Rabat, Smart Commun Res Team, Mohammadia Sch Engineers, Univ Ctr Res Space Technol, Rabat, Morocco
[2] Royal Ctr Space Res & Studies, Rabat, Morocco
关键词
Space mission; CubeSat; cybersecurity; intrusion detection; cyberthreats;
D O I
10.1109/IWCMC58020.2023.10182729
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The impressive growth in the number of CubeSats projects carried out over the past decade gives rise to a new segment in the space industry. Whether academic, military or commercial, CubeSats missions provide a wide range of low-cost space applications. This is due on the one hand to the evolution in the launch offer and on the other hand to the use of Components-Of-The-Shelf (COTS). Despite their advantages, these components are associated with many cybersecurity risks, making space segments more accessible targets for cyberattacks and intrusions. This paper provides a brief overview of intrusion detection approaches corresponding to cyber threats that may target CubeSats. We classify Intrusion Detection System (IDS) components according to a number of factors, such as data sources, architectures, detection mechanisms and modes, and intrusion forms. Then, we present challenges and potential areas for future research, with the goal of designing a CubeSat Intrusion Detection System that efficiently balances security performance and space missions' constraints.
引用
收藏
页码:596 / 601
页数:6
相关论文
共 50 条
  • [31] Cryptographic and Intrusion Detection System for automotive CAN bus: Survey and contributions
    Gmiden, Mabrouka
    Gmiden, Mohamed Hedi
    Trabelsi, Hafedh
    2019 16TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2019, : 158 - 163
  • [32] A Survey on Various Intrusion Detection System Tools and Methods in Cloud Computing
    Akshaya, Swathy M.
    Padmavathi, G.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 439 - 445
  • [33] A Survey of Intrusion Detection System (IDS) using Openstack Private Cloud
    Gajjar, Himali
    Malek, Zakiya
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 162 - 168
  • [34] Taxonomy and Survey of Collaborative Intrusion Detection
    Vasilomanolakis, Emmanouil
    Karuppayah, Shankar
    Muehlhaeuser, Max
    Fischer, Mathias
    ACM COMPUTING SURVEYS, 2015, 47 (04)
  • [35] A survey of intrusion detection techniques in Cloud
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Hiren
    Patel, Avi
    Rajarajan, Muttukrishnan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 42 - 57
  • [36] Swarm intelligence in intrusion detection: A survey
    Kolias, C.
    Kambourakis, G.
    Maragoudakis, M.
    COMPUTERS & SECURITY, 2011, 30 (08) : 625 - 642
  • [37] A Survey on Intrusion Detection and Prevention Systems
    Gupta N.
    Jindal V.
    Bedi P.
    SN Computer Science, 4 (5)
  • [38] A comprehensive survey on intrusion detection algorithms
    Li, Yang
    Li, Zhengming
    Li, Mengyao
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 121
  • [39] Survey of anomaly intrusion detection research
    Yang, Hong-Yu
    Zhu, Dan
    Xie, Feng
    Xie, Li-Xia
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (05): : 587 - 596
  • [40] A survey of intrusion detection in Internet of Things
    Zarpelao, Bruno Bogaz
    Miani, Rodrigo Sanches
    Kawakani, Claudio Toshio
    de Alvarenga, Sean Carlisto
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 : 25 - 37