Securing of Unmanned Aerial Systems (UAS) against security threats using
human immune system
- URL: http://arxiv.org/abs/2003.04984v1
- Date: Sun, 1 Mar 2020 19:05:16 GMT
- Title: Securing of Unmanned Aerial Systems (UAS) against security threats using
human immune system
- Authors: Reza Fotohi
- Abstract summary: An Intrusion Detection System (IDS) has been proposed to protect against the security problems using the human immune system (HIS)
The IDSs are used to detect and respond to attempts to compromise the target system.
- Score: 1.2691047660244335
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: UASs form a large part of the fighting ability of the advanced military
forces. In particular, these systems that carry confidential information are
subject to security attacks. Accordingly, an Intrusion Detection System (IDS)
has been proposed in the proposed design to protect against the security
problems using the human immune system (HIS). The IDSs are used to detect and
respond to attempts to compromise the target system. Since the UASs operate in
the real world, the testing and validation of these systems with a variety of
sensors is confronted with problems. This design is inspired by HIS. In the
mapping, insecure signals are equivalent to an antigen that are detected by
antibody-based training patterns and removed from the operation cycle. Among
the main uses of the proposed design are the quick detection of intrusive
signals and quarantining their activity. Moreover, SUAS-HIS method is evaluated
here via extensive simulations carried out in NS-3 environment. The simulation
results indicate that the UAS network performance metrics are improved in terms
of false positive rate, false negative rate, detection rate, and packet
delivery rate.
Related papers
- Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS [2.632261166782093]
We propose the first framework of IDS that is robust against joint poisoning and evasion attacks.
We verify the robustness of our method on the IEEE-13 bus feeder model against a diverse set of poisoning and evasion attack scenarios.
arXiv Detail & Related papers (2024-05-05T16:24:30Z) - Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks [2.479074862022315]
SCADA systems are prone to cyberattacks, posing risks to critical infrastructure.
This work proposes a host-based intrusion detection system tailored for SCADA systems in smart grids.
arXiv Detail & Related papers (2024-02-22T14:47:42Z) - A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks [2.686686221415684]
Intrusion detection is a traditional practice of security experts, however, there are several issues which still need to be tackled.
We present an architecture for a hybrid Intrusion Detection System (IDS) for an adaptive and incremental detection of both known and unknown attacks.
arXiv Detail & Related papers (2023-10-26T14:37:54Z) - Mixture GAN For Modulation Classification Resiliency Against Adversarial
Attacks [55.92475932732775]
We propose a novel generative adversarial network (GAN)-based countermeasure approach.
GAN-based aims to eliminate the adversarial attack examples before feeding to the DNN-based classifier.
Simulation results show the effectiveness of our proposed defense GAN so that it could enhance the accuracy of the DNN-based AMC under adversarial attacks to 81%, approximately.
arXiv Detail & Related papers (2022-05-29T22:30:32Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Towards robust sensing for Autonomous Vehicles: An adversarial
perspective [82.83630604517249]
It is of primary importance that the resulting decisions are robust to perturbations.
Adversarial perturbations are purposefully crafted alterations of the environment or of the sensory measurements.
A careful evaluation of the vulnerabilities of their sensing system(s) is necessary in order to build and deploy safer systems.
arXiv Detail & Related papers (2020-07-14T05:25:15Z) - Investigating Robustness of Adversarial Samples Detection for Automatic
Speaker Verification [78.51092318750102]
This work proposes to defend ASV systems against adversarial attacks with a separate detection network.
A VGG-like binary classification detector is introduced and demonstrated to be effective on detecting adversarial samples.
arXiv Detail & Related papers (2020-06-11T04:31:56Z) - Identifying Vulnerabilities of Industrial Control Systems using
Evolutionary Multiobjective Optimisation [1.8275108630751844]
We identify vulnerabilities in real-world industrial control systems (ICS) using evolutionary multiobjective optimisation (EMO) algorithms.
Our approach is evaluated on a benchmark chemical plant simulator, the Tennessee Eastman (TE) process model.
A defence against these attacks in the form of a novel intrusion detection system was developed.
arXiv Detail & Related papers (2020-05-27T00:22:48Z) - Adversarial vs behavioural-based defensive AI with joint, continual and
active learning: automated evaluation of robustness to deception, poisoning
and concept drift [62.997667081978825]
Recent advancements in Artificial Intelligence (AI) have brought new capabilities to behavioural analysis (UEBA) for cyber-security.
In this paper, we present a solution to effectively mitigate this attack by improving the detection process and efficiently leveraging human expertise.
arXiv Detail & Related papers (2020-01-13T13:54:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.