Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on systems, man, and cybernetics. Systems man, and cybernetics. Systems, 2014-05, Vol.44 (5), p.593-604 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 604 |
---|---|
container_issue | 5 |
container_start_page | 593 |
container_title | IEEE transactions on systems, man, and cybernetics. Systems |
container_volume | 44 |
creator | Mitchell, Robert Ing-Ray Chen |
description | In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications. |
doi_str_mv | 10.1109/TSMC.2013.2265083 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_pascalfrancis_primary_28495421</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6573382</ieee_id><sourcerecordid>3376956841</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhoMoKOoPEC8BEby05mOTzR5r_QSLYFuvIZvMamSbrcluwX_vLi09eJph5pmX4UHogpIxpaS4Xcxn0zEjlI8Zk4IofoBOGJVqxBhnh_ueymN0ntI3IYQyJTmRJ6icOLNu_QbwS2hjl3wT8D20YNuhayo8M7W3vukSXoaVCQEcnviIP-DL2xr6afLhE9_Bl9n4JuL3rgY8X4P1lbdmCEln6KgydYLzXT1Fy8eHxfR59Pr29DKdvI4sF7IdlQIYE-DKsnCcUCUMqAIsKYklijpagisgzxyUubLCqsJVpWHS2CpjLuOSn6Kbbe46Nj8dpFavfLJQ1yZA_7-mkhFSKJIP6NU_9LvpYui_01RkQuVZL7Gn6JaysUkpQqXX0a9M_NWU6EG8HsTrQbzeie9vrnfJJllTV9EE69P-kKmsEBmjPXe55TwA7NdS5Jwrxv8AtrSMcQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1545874083</pqid></control><display><type>article</type><title>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</title><source>IEEE Electronic Library (IEL)</source><creator>Mitchell, Robert ; Ing-Ray Chen</creator><creatorcontrib>Mitchell, Robert ; Ing-Ray Chen</creatorcontrib><description>In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications.</description><identifier>ISSN: 2168-2216</identifier><identifier>EISSN: 2168-2232</identifier><identifier>DOI: 10.1109/TSMC.2013.2265083</identifier><identifier>CODEN: ITSMFE</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Actuators ; Adjustment ; Air transportation and traffic ; Applied sciences ; Behavior ; Computer information security ; Computer science; control theory; systems ; Continuity ; Control theory. Systems ; Cybernetics ; Exact sciences and technology ; Gears ; Ground, air and sea transportation, marine construction ; Intrusion ; Intrusion detection ; Intrusion detection systems ; Mathematical models ; Military aircraft ; Monitoring ; Pricing ; Robotics ; security ; Sensors ; Specifications ; Unmanned aerial vehicles ; unmanned air vehicles (UAVs) ; Weapons</subject><ispartof>IEEE transactions on systems, man, and cybernetics. Systems, 2014-05, Vol.44 (5), p.593-604</ispartof><rights>2015 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</citedby><cites>FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6573382$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6573382$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28495421$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Mitchell, Robert</creatorcontrib><creatorcontrib>Ing-Ray Chen</creatorcontrib><title>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</title><title>IEEE transactions on systems, man, and cybernetics. Systems</title><addtitle>TSMC</addtitle><description>In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications.</description><subject>Actuators</subject><subject>Adjustment</subject><subject>Air transportation and traffic</subject><subject>Applied sciences</subject><subject>Behavior</subject><subject>Computer information security</subject><subject>Computer science; control theory; systems</subject><subject>Continuity</subject><subject>Control theory. Systems</subject><subject>Cybernetics</subject><subject>Exact sciences and technology</subject><subject>Gears</subject><subject>Ground, air and sea transportation, marine construction</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>Intrusion detection systems</subject><subject>Mathematical models</subject><subject>Military aircraft</subject><subject>Monitoring</subject><subject>Pricing</subject><subject>Robotics</subject><subject>security</subject><subject>Sensors</subject><subject>Specifications</subject><subject>Unmanned aerial vehicles</subject><subject>unmanned air vehicles (UAVs)</subject><subject>Weapons</subject><issn>2168-2216</issn><issn>2168-2232</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhoMoKOoPEC8BEby05mOTzR5r_QSLYFuvIZvMamSbrcluwX_vLi09eJph5pmX4UHogpIxpaS4Xcxn0zEjlI8Zk4IofoBOGJVqxBhnh_ueymN0ntI3IYQyJTmRJ6icOLNu_QbwS2hjl3wT8D20YNuhayo8M7W3vukSXoaVCQEcnviIP-DL2xr6afLhE9_Bl9n4JuL3rgY8X4P1lbdmCEln6KgydYLzXT1Fy8eHxfR59Pr29DKdvI4sF7IdlQIYE-DKsnCcUCUMqAIsKYklijpagisgzxyUubLCqsJVpWHS2CpjLuOSn6Kbbe46Nj8dpFavfLJQ1yZA_7-mkhFSKJIP6NU_9LvpYui_01RkQuVZL7Gn6JaysUkpQqXX0a9M_NWU6EG8HsTrQbzeie9vrnfJJllTV9EE69P-kKmsEBmjPXe55TwA7NdS5Jwrxv8AtrSMcQ</recordid><startdate>20140501</startdate><enddate>20140501</enddate><creator>Mitchell, Robert</creator><creator>Ing-Ray Chen</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>H8D</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20140501</creationdate><title>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</title><author>Mitchell, Robert ; Ing-Ray Chen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Actuators</topic><topic>Adjustment</topic><topic>Air transportation and traffic</topic><topic>Applied sciences</topic><topic>Behavior</topic><topic>Computer information security</topic><topic>Computer science; control theory; systems</topic><topic>Continuity</topic><topic>Control theory. Systems</topic><topic>Cybernetics</topic><topic>Exact sciences and technology</topic><topic>Gears</topic><topic>Ground, air and sea transportation, marine construction</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>Intrusion detection systems</topic><topic>Mathematical models</topic><topic>Military aircraft</topic><topic>Monitoring</topic><topic>Pricing</topic><topic>Robotics</topic><topic>security</topic><topic>Sensors</topic><topic>Specifications</topic><topic>Unmanned aerial vehicles</topic><topic>unmanned air vehicles (UAVs)</topic><topic>Weapons</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mitchell, Robert</creatorcontrib><creatorcontrib>Ing-Ray Chen</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on systems, man, and cybernetics. Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mitchell, Robert</au><au>Ing-Ray Chen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</atitle><jtitle>IEEE transactions on systems, man, and cybernetics. Systems</jtitle><stitle>TSMC</stitle><date>2014-05-01</date><risdate>2014</risdate><volume>44</volume><issue>5</issue><spage>593</spage><epage>604</epage><pages>593-604</pages><issn>2168-2216</issn><eissn>2168-2232</eissn><coden>ITSMFE</coden><abstract>In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TSMC.2013.2265083</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2168-2216 |
ispartof | IEEE transactions on systems, man, and cybernetics. Systems, 2014-05, Vol.44 (5), p.593-604 |
issn | 2168-2216 2168-2232 |
language | eng |
recordid | cdi_pascalfrancis_primary_28495421 |
source | IEEE Electronic Library (IEL) |
subjects | Actuators Adjustment Air transportation and traffic Applied sciences Behavior Computer information security Computer science control theory systems Continuity Control theory. Systems Cybernetics Exact sciences and technology Gears Ground, air and sea transportation, marine construction Intrusion Intrusion detection Intrusion detection systems Mathematical models Military aircraft Monitoring Pricing Robotics security Sensors Specifications Unmanned aerial vehicles unmanned air vehicles (UAVs) Weapons |
title | Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T14%3A34%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Adaptive%20Intrusion%20Detection%20of%20Malicious%20Unmanned%20Air%20Vehicles%20Using%20Behavior%20Rule%20Specifications&rft.jtitle=IEEE%20transactions%20on%20systems,%20man,%20and%20cybernetics.%20Systems&rft.au=Mitchell,%20Robert&rft.date=2014-05-01&rft.volume=44&rft.issue=5&rft.spage=593&rft.epage=604&rft.pages=593-604&rft.issn=2168-2216&rft.eissn=2168-2232&rft.coden=ITSMFE&rft_id=info:doi/10.1109/TSMC.2013.2265083&rft_dat=%3Cproquest_RIE%3E3376956841%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1545874083&rft_id=info:pmid/&rft_ieee_id=6573382&rfr_iscdi=true |