Data Generation for Modeling Attacks on UAVs for the Purpose of Testing Intrusion Detection Systems
نویسندگان
چکیده
Today, issues related to ensuring the safety of UAVs are very relevant. Researchers need develop new protection methods detect attacks in a timely manner and implement mitigation measures. The authors propose concept attack detection "from inside" UAV. idea is analyze cyber-physical parameters UAV, which may indicate an attack, its possible consequences. It was determined that determine consequences it can lead, necessary control not only initial parameters, but also internal This will allow predicting taking emergency A scheme impact on relationship with security incidents, built using ontological approach, has been worked out. Two main essences UAV considered - physical digital aspects Examples chains leading various shown. In review part, analysis algorithms for detecting spoofing data generators carried out, based conclusions drawn about their advantages disadvantages. Further, experiments performed, method assessing quality generating anomalous sets similar real data, be used test blocking attacks. architecture experimental stand, framework full-scale simulation, described. At this designed parse GPS (GPS spoofing), several scenarios normal flight, then scenarios, were tested. Based results experiments, proposed allows simulating corresponding required accuracy. fake proposed.
منابع مشابه
metrics for the detection of changed buildings in 3d old vector maps using als data (case study: isfahan city)
هدف از این تحقیق، ارزیابی و بهبود متریک های موجود جهت تایید صحت نقشه های قدیمی سه بعدی برداری با استفاده از ابر نقطه حاصل از لیزر اسکن جدید شهر اصفهان می باشد . بنابراین ابر نقطه حاصل از لیزر اسکنر با چگالی حدودا سه نقطه در هر متر مربع جهت شناسایی عوارض تغییر کرده در نقشه های قدیمی سه بعدی استفاده شده است. تمرکز ما در این تحقیق بر روی ساختمان به عنوان یکی از اصلی ترین عارضه های شهری می باشد. من...
“the effect of risk aversion on the demand for life insurance: the case of iranian life insurance market”
abstract: about 60% of total premium of insurance industry is pertained?to life policies in the world; while the life insurance total premium in iran is less than 6% of total premium in insurance industry in 2008 (sigma, no 3/2009). among the reasons that discourage the life insurance industry is the problem of adverse selection. adverse selection theory describes a situation where the inf...
15 صفحه اولEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملWindows NT Attacks for the Evaluation of Intrusion Detection Systems
Systems by Jonathan Korba Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degrees of Bachelor of Science in Computer Science and Engineering and Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2000 @ Jonathan Korba, MM. All rights reserved. The aut...
متن کاملislanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatika i avtomatizaciâ
سال: 2022
ISSN: ['2713-3192', '2713-3206']
DOI: https://doi.org/10.15622/ia.21.6.8