RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Informatics and Automation, 2022 Issue 21, volume 6, Pages 1290–1327 (Mi trspy1226)

This article is cited in 1 paper

Information Security

Data generation for modeling attacks on UAVs for the purpose of testing intrusion detection systems

E. Basan, O. Peskova, O. Silin, A. Basan, E. Abramov

Southern Federal University

Abstract: Today, issues related to ensuring the safety of UAVs are very relevant. Researchers need to develop new protection methods to detect attacks in a timely manner and implement mitigation measures. The authors propose a new concept of attack detection "from inside" the UAV. The idea is to analyze the cyber-physical parameters of the UAV, which may indicate an attack, and its possible consequences. It was determined that to detect an attack and determine the consequences to which it can lead, it is necessary to control not only the initial parameters, but also the internal cyber-physical parameters of the UAV. This will allow predicting the possible consequences of an attack and taking emergency measures. A scheme of the impact of an attack on UAVs and the relationship with security incidents, built using an ontological approach, has been worked out. Two main essences of the UAV are considered - the physical and digital aspects of the UAV. Examples of chains of attacks leading to various consequences are also shown. In the review part, the analysis of methods and algorithms for detecting spoofing attacks using data generators is carried out, based on which conclusions are drawn about their advantages and disadvantages. Further, based on the experiments performed, the authors propose a method for assessing the quality of data and a method for generating anomalous data sets similar to real attack data, which can be used to develop and test methods for detecting and blocking attacks. The architecture of the experimental stand, which was used in the framework of full-scale simulation, is described. At this stand, designed to parse GPS spoofing attacks (GPS spoofing), several scenarios of a normal flight, and then several attack scenarios, were tested. Based on the results of the experiments, a method has been proposed that allows simulating the data corresponding to the attack with the required accuracy. A method for assessing the quality of fake data has also been proposed.

Keywords: data analysis, statistics, attacks, risks, UAVs.

UDC: 004.056: 004.73

Received: 27.07.2022

DOI: 10.15622/ia.21.6.8



© Steklov Math. Inst. of RAS, 2024