Unmanned Aerial Vehicle Attack Detection using Snort

Shahzad Mujeeb, S. Chowdhary, Abhishek Srivastava, R. Majumdar, M. Kumar
{"title":"Unmanned Aerial Vehicle Attack Detection using Snort","authors":"Shahzad Mujeeb, S. Chowdhary, Abhishek Srivastava, R. Majumdar, M. Kumar","doi":"10.5220/0010789700003167","DOIUrl":null,"url":null,"abstract":": In recent times, security issues relating to unmanned aerial vehicles (UAVs) and drones have anticipated a staid attention from research communities in various domains in the form of networking, communication, and civilian as well as in defence zone. It has its widespread functionality in the area of agriculture, commerce, and transportation, the use of unmanned aerial vehicles (UAVs)/ drones, is increasing. The ground control systems (GCS) are used to remotely monitor UAVs over the network. Since UAVs are vulnerable to security risk, they become the targets of various attacks such as GPS spoofing, jamming attack, network attacks and many other forms so to tackle with such issues the prime concern will be to identify these attacks followed by to prevent the UAVs or drones from UAV attacks. On contrary network-controlled UAVs however are equally vulnerable to threats like DOS attacks, GPS spoofing etc. In this work a network surveillance approach is projected for UAV attack detection system by means of Snort. Snort uses a set of guidelines and rules set by the user itself to help in identifying the malicious network behaviour and to locate packets that fit them and create user warnings with those rules. It is an open-source tool that records traffic analysis and packets in real time.","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0010789700003167","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

: In recent times, security issues relating to unmanned aerial vehicles (UAVs) and drones have anticipated a staid attention from research communities in various domains in the form of networking, communication, and civilian as well as in defence zone. It has its widespread functionality in the area of agriculture, commerce, and transportation, the use of unmanned aerial vehicles (UAVs)/ drones, is increasing. The ground control systems (GCS) are used to remotely monitor UAVs over the network. Since UAVs are vulnerable to security risk, they become the targets of various attacks such as GPS spoofing, jamming attack, network attacks and many other forms so to tackle with such issues the prime concern will be to identify these attacks followed by to prevent the UAVs or drones from UAV attacks. On contrary network-controlled UAVs however are equally vulnerable to threats like DOS attacks, GPS spoofing etc. In this work a network surveillance approach is projected for UAV attack detection system by means of Snort. Snort uses a set of guidelines and rules set by the user itself to help in identifying the malicious network behaviour and to locate packets that fit them and create user warnings with those rules. It is an open-source tool that records traffic analysis and packets in real time.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用Snort进行无人机攻击检测
近年来,与无人驾驶飞行器(uav)和无人机相关的安全问题引起了网络、通信、民用和防御区等各个领域研究团体的高度关注。它在农业,商业和运输领域具有广泛的功能,无人驾驶飞行器(uav)/无人机的使用正在增加。地面控制系统(GCS)用于通过网络远程监控无人机。由于无人机易受安全风险的影响,它们成为各种攻击的目标,如GPS欺骗、干扰攻击、网络攻击和许多其他形式的攻击,因此要解决这些问题,首要关注的是识别这些攻击,然后防止无人机或无人机受到无人机攻击。相反,网络控制的无人机同样容易受到DOS攻击、GPS欺骗等威胁。本文提出了一种基于Snort的无人机攻击检测系统的网络监控方法。Snort使用用户自己设置的一组指导方针和规则来帮助识别恶意网络行为,定位符合这些行为的数据包,并使用这些规则创建用户警告。它是一个实时记录流量分析和数据包的开源工具。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Review on the Application of Machine Learning Methods in Landslide Susceptibility Mapping Performance of Machine Learning and Big Data Analytics Paradigms in Cyber-security and Cloud Computing Platforms Survey on Mobile Banking and e-Wallet Usage and its Security Concerns Android TV App for Video Conferencing Post COVID 19 Pandemic Impacts on Socio-economic Development
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1