Deep Attention Recognition for Attack Identification in 5G UAV
scenarios: Novel Architecture and End-to-End Evaluation
- URL: http://arxiv.org/abs/2303.12947v1
- Date: Fri, 3 Mar 2023 17:10:35 GMT
- Title: Deep Attention Recognition for Attack Identification in 5G UAV
scenarios: Novel Architecture and End-to-End Evaluation
- Authors: Joseanne Viana, Hamed Farkhari, Pedro Sebastiao, Luis Miguel Campos,
Katerina Koutlia, Biljana Bojovic, Sandra Lagen, Rui Dinis
- Abstract summary: Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations.
We propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs.
- Score: 3.3253720226707992
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Despite the robust security features inherent in the 5G framework, attackers
will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations
and decrease UAV control communication performance in Air-to-Ground (A2G)
links. Operating under the assumption that the 5G UAV communications
infrastructure will never be entirely secure, we propose Deep Attention
Recognition (DAtR) as a solution to identify attacks based on a small deep
network embedded in authenticated UAVs. Our proposed solution uses two
observable parameters: the Signal-to-Interference-plus-Noise Ratio (SINR) and
the Reference Signal Received Power (RSSI) to recognize attacks under
Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination
of the two conditions. In the tested scenarios, a number of attackers are
located in random positions, while their power is varied in each simulation.
Moreover, terrestrial users are included in the network to impose additional
complexity on attack detection. To improve the systems overall performance in
the attack scenarios, we propose complementing the deep network decision with
two mechanisms based on data manipulation and majority voting techniques. We
compare several performance parameters in our proposed Deep Network. For
example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in
terms of their overall accuracy, the window size effect, and test the accuracy
when only partial data is available in the training process. Finally, we
benchmark our deep network with six widely used classifiers regarding
classification accuracy. Our algorithms accuracy exceeds 4% compared with the
eXtreme Gradient Boosting (XGB) classifier in LoS condition and around 3% in
the short distance NLoS condition. Considering the proposed deep network, all
other classifiers present lower accuracy than XGB.
Related papers
- Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks [9.86830550255822]
Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) make them vulnerable to increasing vectors of security and privacy attacks.
We propose in this paper a novel detection mechanism that leverages the ability of the deep auto-encoder method to detect attacks relying only on the benign network traffic pattern.
Using federated learning, the proposed intrusion detection system can be trained with large and diverse benign network traffic, while preserving the CAVs privacy, and minimizing the communication overhead.
arXiv Detail & Related papers (2024-07-03T12:42:31Z) - DT-DDNN: A Physical Layer Security Attack Detector in 5G RF Domain for
CAVs [11.15939066175832]
jamming attacks pose substantial risks to the 5G network.
This work presents a novel deep learning-based technique for detecting jammers in CAV networks.
Results show that the proposed method achieves 96.4% detection rate in extra low jamming power.
arXiv Detail & Related papers (2024-03-05T04:29:31Z) - Critical Analysis of 5G Networks Traffic Intrusion using PCA, t-SNE and
UMAP Visualization and Classifying Attacks [0.0]
We use a recently published 5G traffic dataset, 5G-NIDD, to detect network traffic anomalies using machine and deep learning approaches.
We reduce data dimensionality using mutual information and PCA techniques.
We solve the class imbalance issue by inserting synthetic records of minority classes.
arXiv Detail & Related papers (2023-12-08T06:43:19Z) - A Geometrical Approach to Evaluate the Adversarial Robustness of Deep
Neural Networks [52.09243852066406]
Adversarial Converging Time Score (ACTS) measures the converging time as an adversarial robustness metric.
We validate the effectiveness and generalization of the proposed ACTS metric against different adversarial attacks on the large-scale ImageNet dataset.
arXiv Detail & Related papers (2023-10-10T09:39:38Z) - A Convolutional Attention Based Deep Network Solution for UAV Network
Attack Recognition over Fading Channels and Interference [3.1230069539161405]
This research offers a deep learning (DL) approach for detecting attacks in UAVs equipped with multiplexing (OFDM) receivers on Clustered Delay Line (CDL) channels.
The prospective algorithm is generalizable regarding attack identification, which does not occur during training.
A deeper investigation into the timing requirements for recognizing attacks show that after training, the minimum time necessary after the attack begins is 100 ms.
arXiv Detail & Related papers (2022-07-16T22:08:12Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Multi-Discriminator Sobolev Defense-GAN Against Adversarial Attacks for
End-to-End Speech Systems [78.5097679815944]
This paper introduces a defense approach against end-to-end adversarial attacks developed for cutting-edge speech-to-text systems.
First, we represent speech signals with 2D spectrograms using the short-time Fourier transform.
Second, we iteratively find a safe vector using a spectrogram subspace projection operation.
Third, we synthesize a spectrogram with such a safe vector using a novel GAN architecture trained with Sobolev integral probability metric.
arXiv Detail & Related papers (2021-03-15T01:11:13Z) - Uncertainty-Aware Deep Calibrated Salient Object Detection [74.58153220370527]
Existing deep neural network based salient object detection (SOD) methods mainly focus on pursuing high network accuracy.
These methods overlook the gap between network accuracy and prediction confidence, known as the confidence uncalibration problem.
We introduce an uncertaintyaware deep SOD network, and propose two strategies to prevent deep SOD networks from being overconfident.
arXiv Detail & Related papers (2020-12-10T23:28:36Z) - Enabling certification of verification-agnostic networks via
memory-efficient semidefinite programming [97.40955121478716]
We propose a first-order dual SDP algorithm that requires memory only linear in the total number of network activations.
We significantly improve L-inf verified robust accuracy from 1% to 88% and 6% to 40% respectively.
We also demonstrate tight verification of a quadratic stability specification for the decoder of a variational autoencoder.
arXiv Detail & Related papers (2020-10-22T12:32:29Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Multi-stage Jamming Attacks Detection using Deep Learning Combined with
Kernelized Support Vector Machine in 5G Cloud Radio Access Networks [17.2528983535773]
This research focuses on deploying a multi-stage machine learning-based intrusion detection (ML-IDS) in 5G C-RAN.
It can detect and classify four types of jamming attacks: constant jamming, random jamming, jamming, and reactive jamming.
The final classification accuracy of attacks is 94.51% with a 7.84% false negative rate.
arXiv Detail & Related papers (2020-04-13T17:21:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.