An Autonomous Self-Incremental Learning Approach for Detection of Cyber Attacks on Unmanned Aerial Vehicles (UAVs)

by   Yasir Ali Farrukh, et al.

As the technological advancement and capabilities of automated systems have increased drastically, the usage of unmanned aerial vehicles for performing human-dependent tasks without human indulgence has also spiked. Since unmanned aerial vehicles are heavily dependent on Information and Communication Technology, they are highly prone to cyber-attacks. With time more advanced and new attacks are being developed and employed. However, the current Intrusion detection system lacks detection and classification of new and unknown attacks. Therefore, for having an autonomous and reliable operation of unmanned aerial vehicles, more robust and automated cyber detection and protection schemes are needed. To address this, we have proposed an autonomous self-incremental learning architecture, capable of detecting known and unknown cyber-attacks on its own without any human interference. In our approach, we have combined signature-based detection along with anomaly detection in such a way that the signature-based detector autonomously updates its attack classes with the help of an anomaly detector. To achieve this, we have implemented an incremental learning approach, updating our model to incorporate new classes without forgetting the old ones. To validate the applicability and effectiveness of our proposed architecture, we have implemented it in a trial scenario and then compared it with the traditional offline learning approach. Moreover, our anomaly-based detector has achieved a 100


page 1

page 7


Detection of Stealthy Adversaries for Networked Unmanned Aerial Vehicles

A network of unmanned aerial vehicles (UAVs) provides distributed covera...

Stealthy Perception-based Attacks on Unmanned Aerial Vehicles

In this work, we study vulnerability of unmanned aerial vehicles (UAVs) ...

Intrusion Detection Systems for Flying Ad-hoc Networks

Unmanned Aerial Vehicles (UAVs) are becoming more dependent on mission s...

A Sequential Supervised Machine Learning Approach for Cyber Attack Detection in a Smart Grid System

Modern smart grid systems are heavily dependent on Information and Commu...

Anomaly Detection from Cyber Threats via Infrastructure to Automated Vehicle

Using Infrastructure-to-Vehicle (I2V) information can be of great benefi...

Towards a Framework for Certification of Reliable Autonomous Systems

A computational system is called autonomous if it is able to make its ow...

A Way to Facilitate Decision Making in a Mixed Group of Manned and Unmanned Aerial Vehicles

A mixed group of manned and unmanned aerial vehicles is considered as a ...

Please sign up or login with your details

Forgot password? Click here to reset