GPS-Spoofing Attack Detection Technology for UAVs Based on Kullback–Leibler Divergence
نویسندگان
چکیده
Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positioning System (GPS) signal of an Unmanned Aerial Vehicle (UAV). Most methods UAV anomalies indicative attack use machine learning or other such that compare normal behavior with abnormal behavior. Such approaches require large amounts data and significant “training” time to prepare implement system. Instead, consider new approach based on mathematical without need first collect amount describe patterns. Doing so can simplify process creating anomaly detection system, which further facilitate easier implementation intrusion systems in UAVs. This article presents issues related ensuring information Development GPS UAVs is then described, preliminary study made it possible form apparatus solving problem. We explain necessary analysis parameters normalization, Kullback—Leibler divergence measure needed detect systems.
منابع مشابه
IP Spoofing Attack Detection using Route Based Information
IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have performed studies on online/offline network devices such as routers and IDS/IPS. While, the task of deep packet inspection is powerfully handled by IDS/IPS, the real time processing ...
متن کاملDetection and Mitigation of GPS Spoofing Based on Antenna Array Processing
In this article authors present an application of spatial processing methods for GPS spoofing detection and mitigation. In the first part of this article, a spoofing detection method, based on phase delay measurements, is proposed. Accuracy and precision of phase delay estimation is assessed for various qualities of received signal. Spoofing detection thresholds are determined. Efficiency of th...
متن کاملGPS Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule
In order to obtain higher detection probability of the GPS spoofing, a general identification scheme with decision fusion is proposed. Firstly, the singular values of the wavelet transformation coefficients of both spoofing and genuine signal are computed and formed as the feature vectors. Then, the feature vectors are input into three classifiers, which are the support vector machines (SVM), t...
متن کاملControlling UAVs with Sensor Input Spoofing Attacks
There has been a recent surge in interest in autonomous robots and vehicles. From the Google self-driving car, to autonomous delivery robots, to hobbyist UAVs, there is a staggering variety of proposed deployments for autonomous vehicles. Ensuring that such vehicles can plan and execute routes safely is crucial. The key insight of our paper is that the sensors that autonomous vehicles use to na...
متن کاملAttack Class: Address Spoofing
We present an analysis of a class of attacks we call address spoofing. Fundamentals of internetwork routing and communication are presented, followed by a discussion of the address spoofing class. The attack class is made concrete with a discussion of a well known incident. We conclude by dispelling several myths of purported security solutions including the security provided by one-time passwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Drones
سال: 2021
ISSN: ['2504-446X']
DOI: https://doi.org/10.3390/drones6010008