2021
DOI: 10.1007/978-3-030-78811-7_22
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Intrusion Detection System for a Group of UAVs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…The study and analysis of the scenarios of active, passive, and multi-stage attacks for an intelligent group control system for UAVs were carried out, and based on them a template for describing attacks and general scenarios for influencing the information system of a UAV was proposed, and probable attacks through communication channels (deauthentication and connection, eavesdropping, Blueprinting, Replay, Interception of "handshake", brute-force and others) were described [27].…”
Section: Methodsmentioning
confidence: 99%
“…The study and analysis of the scenarios of active, passive, and multi-stage attacks for an intelligent group control system for UAVs were carried out, and based on them a template for describing attacks and general scenarios for influencing the information system of a UAV was proposed, and probable attacks through communication channels (deauthentication and connection, eavesdropping, Blueprinting, Replay, Interception of "handshake", brute-force and others) were described [27].…”
Section: Methodsmentioning
confidence: 99%
“…The intrusion detection approach developed [17], called Attention-based Spatio-Temporal Graph Convolutional Network (ATGCN), integrates a graph convolutional network and a gated recursive unit to form a spatio-temporal graph convolutional network to address the temporal and spatial dynamic properties of UAV networks. The work carried out in [18] aims to identify suspicious behavior in UAV groups and classify the attack accordingly. To achieve this goal, the authors built an experimental setup by imitating traffic transmission among a fleet of UAVs and focused on analyzing how the transmission of traffic changes both when it is operating normally and when it encounters an attack.…”
Section: Related Workmentioning
confidence: 99%
“…In our study, we need to detect the rare occurrence of cyber-physical parameter peak values that do not occur during normal operation of a UAV. Therefore, we also used the Poisson distribution [16,41]. The Poisson model usually describes a scheme of rare events [40,41].…”
mentioning
confidence: 99%
“…Therefore, we also used the Poisson distribution [16,41]. The Poisson model usually describes a scheme of rare events [40,41]. Under certain assumptions about the nature of random events, the number of events that occur over a fixed period or in a fixed region of space can obey the following Poisson distributions,…”
mentioning
confidence: 99%
See 1 more Smart Citation