UASs form a large part of the fighting ability of the advanced military forces. In particular, these systems that carry confidential information are subject to security attacks. Accordingly, an Intrusion Detection System (IDS) has been proposed in the proposed design to protect against the security problems using the human immune system (HIS). The IDSs are used to detect and respond to attempts to compromise the target system. Since the UASs operate in the real world, the testing and validation of these systems with a variety of sensors is confronted with problems. This design is inspired by HIS. In the mapping, insecure signals are equivalent to an antigen that are detected by antibody-based training patterns and removed from the operation cycle. Among the main uses of the proposed design are the quick detection of intrusive signals and quarantining their activity. Moreover, SUAS-HIS method is evaluated here via extensive simulations carried out in NS-3 environment. The simulation results indicate that the UAS network performance metrics are improved in terms of false positive rate, false negative rate, detection rate, and packet delivery rate. detection methods to track and to eliminate. In specific, to increase the chance of successfully intercepting a ballistic missile, it is essential to have swift detection and tracking system, capable of detecting and tracking the missile right after it is launched. The designers working on ballistic missile defense networks are aiming the system to be capable of intercepting the missiles during their initial 2 to 5 minutes of flight, which is called the boost phase. During the boost phase, if the trajectory of the missile is directly away from the trajectory of the UAV, it will easily recede from the range of the sensors on the UAV. Hence, the routing of the information used in the network of the sensors of the ballistic missile should be addressed using networks of hybrid wireless sensors capable of complying with high availability and requirements mandated due to security. To demonstrate the UAVs' applications that have an innate time sensitivity, and to signify the urgency of providing security in communication channels, this case is discussed in the following paper [2,3]. However, despite the advantage's UAVs provide through various applications, since there are situations where no pilot monitors the activities, they are potentially vulnerable against cyber threats. This intensifies the emergence to design secure and reliable UASs and overcome the challenges to avoid damage and destruction to other systems as well as human lives [2,3].A number of attacks, such as Wormhole (WH), Black hole (BH), Gray hole (GH), and Fake Information Dissemination (FID), illegally penetrate the system. Once an unmanned system is affected by an attack, removing the threat and bringing the system back online is a laborious task. It should be mentioned that the common methods to secure information, such as encryption or intrusion detection [4], are inadequate when dealing with such risks. T...