Intrusion detection system for CubeSats: a survey

被引:2
|
作者
Driouch, Otman [1 ,2 ]
Bah, Slimane [1 ]
Guennoun, Zouhair [1 ]
机构
[1] Mohammed 5 Univ Rabat, Smart Commun Res Team, Mohammadia Sch Engineers, Univ Ctr Res Space Technol, Rabat, Morocco
[2] Royal Ctr Space Res & Studies, Rabat, Morocco
来源
2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC | 2023年
关键词
Space mission; CubeSat; cybersecurity; intrusion detection; cyberthreats;
D O I
10.1109/IWCMC58020.2023.10182729
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The impressive growth in the number of CubeSats projects carried out over the past decade gives rise to a new segment in the space industry. Whether academic, military or commercial, CubeSats missions provide a wide range of low-cost space applications. This is due on the one hand to the evolution in the launch offer and on the other hand to the use of Components-Of-The-Shelf (COTS). Despite their advantages, these components are associated with many cybersecurity risks, making space segments more accessible targets for cyberattacks and intrusions. This paper provides a brief overview of intrusion detection approaches corresponding to cyber threats that may target CubeSats. We classify Intrusion Detection System (IDS) components according to a number of factors, such as data sources, architectures, detection mechanisms and modes, and intrusion forms. Then, we present challenges and potential areas for future research, with the goal of designing a CubeSat Intrusion Detection System that efficiently balances security performance and space missions' constraints.
引用
收藏
页码:596 / 601
页数:6
相关论文
共 50 条
  • [31] A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions
    Makris, Ioannis
    Karampasi, Aikaterini
    Radoglou-Grammatikis, Panagiotis
    Episkopos, Nikolaos
    Iturbe, Eider
    Rios, Erkuden
    Piperigkos, Nikos
    Lalos, Aris
    Xenakis, Christos
    Lagkas, Thomas
    Argyriou, Vasileios
    Sarigiannidis, Panagiotis
    COMPUTER SCIENCE REVIEW, 2025, 56
  • [32] Intrusion detection and Big Heterogeneous Data: a Survey
    Zuech R.
    Khoshgoftaar T.M.
    Wald R.
    J. Big Data, 1 (1):
  • [33] A survey of intrusion detection in wireless network applications
    Mitchell, Robert
    Chen, Ing-Ray
    COMPUTER COMMUNICATIONS, 2014, 42 : 1 - 23
  • [34] A Survey of Intrusion Detection for In-Vehicle Networks
    Wu, Wufei
    Li, Renfa
    Xie, Guoqi
    An, Jiyao
    Bai, Yang
    Zhou, Jia
    Li, Keqin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (03) : 919 - 933
  • [35] A survey of VoIP intrusions and intrusion detection systems
    Vuong, S
    Bai, Y
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 317 - 322
  • [36] Survey of Genetic Algorithm Effectiveness in Intrusion Detection
    Gnanaprasanambikai, L.
    Munusamy, Nagarajan
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [37] A survey of coordinated attacks and collaborative intrusion detection
    Zhou, Chenfeng Vincent
    Leckie, Christopher
    Karunasekera, Shanika
    COMPUTERS & SECURITY, 2010, 29 (01) : 124 - 140
  • [38] A Survey of Parallel Intrusion Detection on Graphical Processors
    Vokorokos, Liberios
    Ennert, Michal
    Hartinger, Miroslav
    Radusovsky, Jan
    INFORMATICS 2013: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS, 2013, : 50 - 55
  • [39] A Survey of parallel intrusion detection on graphical processors
    Vokorokos, Liberios
    Ennert, Michal
    Cajkovsky, Marek
    Radusovsky, Jan
    OPEN COMPUTER SCIENCE, 2014, 4 (04): : 222 - 230
  • [40] Literature Survey on Intrusion Detection Systems in MANETs
    Kundu, Pooja
    Kashyap, Neeti
    Yadav, Neha
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, INDIA 2016, 2016, 433 : 357 - 366