TY - GEN
T1 - Autonomous detection of malicious events using machine learning models in drone networks
AU - Moustafa, Nour
AU - Jolfaei, Alireza
PY - 2020/9/25
Y1 - 2020/9/25
N2 - Drone systems, the so-called Unmanned Autonomous Vehicles (UAVs), have been widely employed in military and civilian sectors. Drone systems have been used for cyber warfare, warfighting and surveillance purposes of modern military and civilian applications. However, they have increasingly suffered from sophisticated malicious activities that exploit their vulnerabilities through network communications. As drones comprise a complex infrastructure as piloted aircraft but without operators, they still need a reliable security control to assert their safe operations. This paper proposes an autonomous intrusion detection scheme for discovering advanced and sophisticated cyberattacks that exploit drone networks. A testbed was configured to launch malicious events against a drone network for collecting legitimate and malicious observations and evaluate the performances of machine learning in real-time. Machine learning algorithms, including decision tree, k-nearest neighbors, naive Bayes, support vector machine and deep learning multi-layer perceptron, were trained and evaluated using the data collections, with promising results in terms of detection accuracy, false alarm rates, and processing times.
AB - Drone systems, the so-called Unmanned Autonomous Vehicles (UAVs), have been widely employed in military and civilian sectors. Drone systems have been used for cyber warfare, warfighting and surveillance purposes of modern military and civilian applications. However, they have increasingly suffered from sophisticated malicious activities that exploit their vulnerabilities through network communications. As drones comprise a complex infrastructure as piloted aircraft but without operators, they still need a reliable security control to assert their safe operations. This paper proposes an autonomous intrusion detection scheme for discovering advanced and sophisticated cyberattacks that exploit drone networks. A testbed was configured to launch malicious events against a drone network for collecting legitimate and malicious observations and evaluate the performances of machine learning in real-time. Machine learning algorithms, including decision tree, k-nearest neighbors, naive Bayes, support vector machine and deep learning multi-layer perceptron, were trained and evaluated using the data collections, with promising results in terms of detection accuracy, false alarm rates, and processing times.
KW - Drones
KW - Intrusion detection
KW - Machine and deep learning algorithms
KW - Network systems
UR - http://www.scopus.com/inward/record.url?scp=85097130044&partnerID=8YFLogxK
U2 - 10.1145/3414045.3415951
DO - 10.1145/3414045.3415951
M3 - Conference contribution
AN - SCOPUS:85097130044
T3 - DroneCom 2020 - Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond
SP - 61
EP - 66
BT - DroneCom 2020 - Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond
PB - Association for Computing Machinery, Inc
CY - Online
T2 - 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, DroneCom 2020
Y2 - 25 September 2020
ER -