Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications

In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on systems, man, and cybernetics. Systems man, and cybernetics. Systems, 2014-05, Vol.44 (5), p.593-604
Hauptverfasser: Mitchell, Robert, Ing-Ray Chen
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 604
container_issue 5
container_start_page 593
container_title IEEE transactions on systems, man, and cybernetics. Systems
container_volume 44
creator Mitchell, Robert
Ing-Ray Chen
description In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications.
doi_str_mv 10.1109/TSMC.2013.2265083
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_pascalfrancis_primary_28495421</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6573382</ieee_id><sourcerecordid>3376956841</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhoMoKOoPEC8BEby05mOTzR5r_QSLYFuvIZvMamSbrcluwX_vLi09eJph5pmX4UHogpIxpaS4Xcxn0zEjlI8Zk4IofoBOGJVqxBhnh_ueymN0ntI3IYQyJTmRJ6icOLNu_QbwS2hjl3wT8D20YNuhayo8M7W3vukSXoaVCQEcnviIP-DL2xr6afLhE9_Bl9n4JuL3rgY8X4P1lbdmCEln6KgydYLzXT1Fy8eHxfR59Pr29DKdvI4sF7IdlQIYE-DKsnCcUCUMqAIsKYklijpagisgzxyUubLCqsJVpWHS2CpjLuOSn6Kbbe46Nj8dpFavfLJQ1yZA_7-mkhFSKJIP6NU_9LvpYui_01RkQuVZL7Gn6JaysUkpQqXX0a9M_NWU6EG8HsTrQbzeie9vrnfJJllTV9EE69P-kKmsEBmjPXe55TwA7NdS5Jwrxv8AtrSMcQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1545874083</pqid></control><display><type>article</type><title>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</title><source>IEEE Electronic Library (IEL)</source><creator>Mitchell, Robert ; Ing-Ray Chen</creator><creatorcontrib>Mitchell, Robert ; Ing-Ray Chen</creatorcontrib><description>In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications.</description><identifier>ISSN: 2168-2216</identifier><identifier>EISSN: 2168-2232</identifier><identifier>DOI: 10.1109/TSMC.2013.2265083</identifier><identifier>CODEN: ITSMFE</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Actuators ; Adjustment ; Air transportation and traffic ; Applied sciences ; Behavior ; Computer information security ; Computer science; control theory; systems ; Continuity ; Control theory. Systems ; Cybernetics ; Exact sciences and technology ; Gears ; Ground, air and sea transportation, marine construction ; Intrusion ; Intrusion detection ; Intrusion detection systems ; Mathematical models ; Military aircraft ; Monitoring ; Pricing ; Robotics ; security ; Sensors ; Specifications ; Unmanned aerial vehicles ; unmanned air vehicles (UAVs) ; Weapons</subject><ispartof>IEEE transactions on systems, man, and cybernetics. Systems, 2014-05, Vol.44 (5), p.593-604</ispartof><rights>2015 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</citedby><cites>FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6573382$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6573382$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=28495421$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Mitchell, Robert</creatorcontrib><creatorcontrib>Ing-Ray Chen</creatorcontrib><title>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</title><title>IEEE transactions on systems, man, and cybernetics. Systems</title><addtitle>TSMC</addtitle><description>In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications.</description><subject>Actuators</subject><subject>Adjustment</subject><subject>Air transportation and traffic</subject><subject>Applied sciences</subject><subject>Behavior</subject><subject>Computer information security</subject><subject>Computer science; control theory; systems</subject><subject>Continuity</subject><subject>Control theory. Systems</subject><subject>Cybernetics</subject><subject>Exact sciences and technology</subject><subject>Gears</subject><subject>Ground, air and sea transportation, marine construction</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>Intrusion detection systems</subject><subject>Mathematical models</subject><subject>Military aircraft</subject><subject>Monitoring</subject><subject>Pricing</subject><subject>Robotics</subject><subject>security</subject><subject>Sensors</subject><subject>Specifications</subject><subject>Unmanned aerial vehicles</subject><subject>unmanned air vehicles (UAVs)</subject><subject>Weapons</subject><issn>2168-2216</issn><issn>2168-2232</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhoMoKOoPEC8BEby05mOTzR5r_QSLYFuvIZvMamSbrcluwX_vLi09eJph5pmX4UHogpIxpaS4Xcxn0zEjlI8Zk4IofoBOGJVqxBhnh_ueymN0ntI3IYQyJTmRJ6icOLNu_QbwS2hjl3wT8D20YNuhayo8M7W3vukSXoaVCQEcnviIP-DL2xr6afLhE9_Bl9n4JuL3rgY8X4P1lbdmCEln6KgydYLzXT1Fy8eHxfR59Pr29DKdvI4sF7IdlQIYE-DKsnCcUCUMqAIsKYklijpagisgzxyUubLCqsJVpWHS2CpjLuOSn6Kbbe46Nj8dpFavfLJQ1yZA_7-mkhFSKJIP6NU_9LvpYui_01RkQuVZL7Gn6JaysUkpQqXX0a9M_NWU6EG8HsTrQbzeie9vrnfJJllTV9EE69P-kKmsEBmjPXe55TwA7NdS5Jwrxv8AtrSMcQ</recordid><startdate>20140501</startdate><enddate>20140501</enddate><creator>Mitchell, Robert</creator><creator>Ing-Ray Chen</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>H8D</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20140501</creationdate><title>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</title><author>Mitchell, Robert ; Ing-Ray Chen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-b5e225edbb9d30185ae89ec0b0c081d1bed9e74deb78c5c89dfba26acf42d4363</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Actuators</topic><topic>Adjustment</topic><topic>Air transportation and traffic</topic><topic>Applied sciences</topic><topic>Behavior</topic><topic>Computer information security</topic><topic>Computer science; control theory; systems</topic><topic>Continuity</topic><topic>Control theory. Systems</topic><topic>Cybernetics</topic><topic>Exact sciences and technology</topic><topic>Gears</topic><topic>Ground, air and sea transportation, marine construction</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>Intrusion detection systems</topic><topic>Mathematical models</topic><topic>Military aircraft</topic><topic>Monitoring</topic><topic>Pricing</topic><topic>Robotics</topic><topic>security</topic><topic>Sensors</topic><topic>Specifications</topic><topic>Unmanned aerial vehicles</topic><topic>unmanned air vehicles (UAVs)</topic><topic>Weapons</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mitchell, Robert</creatorcontrib><creatorcontrib>Ing-Ray Chen</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on systems, man, and cybernetics. Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mitchell, Robert</au><au>Ing-Ray Chen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications</atitle><jtitle>IEEE transactions on systems, man, and cybernetics. Systems</jtitle><stitle>TSMC</stitle><date>2014-05-01</date><risdate>2014</risdate><volume>44</volume><issue>5</issue><spage>593</spage><epage>604</epage><pages>593-604</pages><issn>2168-2216</issn><eissn>2168-2232</eissn><coden>ITSMFE</coden><abstract>In this paper, we propose an adaptive specification-based intrusion detection system (IDS) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning normally or are operating under malicious attacks. We investigate the impact of reckless, random, and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness of our behavior rule-based UAV IDS (BRUIDS) which bases its audit on behavior rules to quickly assess the survivability of the UAV facing malicious attacks. Through a comparative analysis with the multiagent system/ant-colony clustering model, we demonstrate a high detection accuracy of BRUIDS for compliant performance. By adjusting the detection strength, BRUIDS can effectively trade higher false positives for lower false negatives to cope with more sophisticated random and opportunistic attackers to support ultrasafe and secure UAV applications.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TSMC.2013.2265083</doi><tpages>12</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2168-2216
ispartof IEEE transactions on systems, man, and cybernetics. Systems, 2014-05, Vol.44 (5), p.593-604
issn 2168-2216
2168-2232
language eng
recordid cdi_pascalfrancis_primary_28495421
source IEEE Electronic Library (IEL)
subjects Actuators
Adjustment
Air transportation and traffic
Applied sciences
Behavior
Computer information security
Computer science
control theory
systems
Continuity
Control theory. Systems
Cybernetics
Exact sciences and technology
Gears
Ground, air and sea transportation, marine construction
Intrusion
Intrusion detection
Intrusion detection systems
Mathematical models
Military aircraft
Monitoring
Pricing
Robotics
security
Sensors
Specifications
Unmanned aerial vehicles
unmanned air vehicles (UAVs)
Weapons
title Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T14%3A34%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Adaptive%20Intrusion%20Detection%20of%20Malicious%20Unmanned%20Air%20Vehicles%20Using%20Behavior%20Rule%20Specifications&rft.jtitle=IEEE%20transactions%20on%20systems,%20man,%20and%20cybernetics.%20Systems&rft.au=Mitchell,%20Robert&rft.date=2014-05-01&rft.volume=44&rft.issue=5&rft.spage=593&rft.epage=604&rft.pages=593-604&rft.issn=2168-2216&rft.eissn=2168-2232&rft.coden=ITSMFE&rft_id=info:doi/10.1109/TSMC.2013.2265083&rft_dat=%3Cproquest_RIE%3E3376956841%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1545874083&rft_id=info:pmid/&rft_ieee_id=6573382&rfr_iscdi=true