Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles

被引:3
作者
Mughal, Umair Ahmad [1 ]
Hassler, Samuel Chase [1 ]
Ismail, Muhammad [1 ]
机构
[1] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
来源
2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS | 2023年
关键词
UAV swarms; cyber-attacks; machine learning; and intrusion detection systems; DATA-INJECTION ATTACK;
D O I
10.1109/CNS59707.2023.10288962
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Swarms of unmanned aerial vehicles (UAVs) are widely adopted in civilian and military applications. However, this cyber-physical system is threatened by cyber-attacks. Recently, machine learning-based intrusion detection systems have been successfully adopted to detect cyber-attacks. Yet, the following questions remain unanswered: (a) Can the fusion of cyber and physical features collected from the attacked UAV improve the detection performance? (b) Can the fusion of cyber and physical features collected from unattacked UAVs in the swarm help to detect the attack? (c) Can the fusion of cyber and physical features collected from all UAVs in the swarm (attacked and unattacked) improve the detection performance? To answer the aforementioned questions, and due to the absence of practical datasets, we develop a preliminary testbed of two UAVs flying in coordination. We launch a range of cyber-attacks on one of the UAVs including false data injection (FDI), denial-of-service (DoS), replay, and evil twin attacks. Then, we collect cyber and physical features from the UAVs under normal operation and attack conditions. Next, we develop a set of intrusion detection systems based on shallow and deep machine learning models including support vector machine (SVM), feedforward neural networks (FNN), recurrent neural networks (RNN), and convolutional neural networks (CNN). The developed models are trained using cyber-only, physical-only, and cyber-physical features collected from the attacked UAV, the unattacked UAV, and both UAVs in the swarm. The extensive studies carried out herein provide answers to the aforementioned questions and pave the way toward effective intrusion detection systems in UAV swarms.
引用
收藏
页数:9
相关论文
共 20 条
[1]   Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network [J].
Abbaspour, Alireza ;
Yen, Kang K. ;
Noei, Shirin ;
Sargolzaei, Arman .
COMPLEX ADAPTIVE SYSTEMS, 2016, 95 :193-200
[2]   Learning-Based Anomaly Detection and Monitoring for Swarm Drone Flights [J].
Ahn, Hyojung ;
Choi, Han-Lim ;
Kang, Minguk ;
Moon, SungTae .
APPLIED SCIENCES-BASEL, 2019, 9 (24)
[3]  
[Anonymous], 2022, Awus036ach
[4]   Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning [J].
Bozkurt, Alper Kamil ;
Wang, Yu ;
Pajic, Miroslav .
2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021), 2021, :10656-10662
[5]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[6]  
DJI, Tello edu
[7]  
Khanapuri EshaanM., 2022, AIAA SCITECH 2022 FO, P2543
[8]  
Lee HC, 2019, AIAA SCITECH 2019 FORUM
[9]   Fuzzy-Model-Based Lateral Control for Networked Autonomous Vehicle Systems Under Hybrid Cyber-Attacks [J].
Lian, Zhi ;
Shi, Peng ;
Lim, Cheng-Chew ;
Yuan, Xin .
IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (04) :2600-2609
[10]   A Novel Cyber Attack Detection Method in Networked Control Systems [J].
Mousavinejad, Eman ;
Yang, Fuwen ;
Han, Qing-Long ;
Vlacic, Ljubo .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (11) :3254-3264