{"title":"无人机系统入侵检测系统的开发与测试","authors":"J. Straub","doi":"10.1109/DASC.2017.8102146","DOIUrl":null,"url":null,"abstract":"This paper discusses the development, testing and prospective use of an intrusion detection system (IDS) for unmanned aerial vehicles (UAVs) and systems (UASs). Intrusion detection systems are typically used in computer networking and other applications to detect and respond to attempts to compromise computers, servers, firewalls and other network resources. In the context of the development of an IDS for UAV/UAS applications, several topics are considered. These include what an IDS is and how it is used, why do UAVs/UASs need an IDS and attack detection expectations for IDSs used in UAV/UAS applications. Because UAVs and UASs operate in the real world, with numerous and varied sensory inputs, testing and validation of these systems is particularly problematic. IDS Training challenges and the use of automated training to validate UAV/UAS IDS systems is, thus, a major consideration and also covered. The use of adaptive testing, in particular, is discussed.","PeriodicalId":130890,"journal":{"name":"2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC)","volume":"47 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Development and testing of an intrusion detection system for unmanned aerial systems\",\"authors\":\"J. Straub\",\"doi\":\"10.1109/DASC.2017.8102146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses the development, testing and prospective use of an intrusion detection system (IDS) for unmanned aerial vehicles (UAVs) and systems (UASs). Intrusion detection systems are typically used in computer networking and other applications to detect and respond to attempts to compromise computers, servers, firewalls and other network resources. In the context of the development of an IDS for UAV/UAS applications, several topics are considered. These include what an IDS is and how it is used, why do UAVs/UASs need an IDS and attack detection expectations for IDSs used in UAV/UAS applications. Because UAVs and UASs operate in the real world, with numerous and varied sensory inputs, testing and validation of these systems is particularly problematic. IDS Training challenges and the use of automated training to validate UAV/UAS IDS systems is, thus, a major consideration and also covered. The use of adaptive testing, in particular, is discussed.\",\"PeriodicalId\":130890,\"journal\":{\"name\":\"2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC)\",\"volume\":\"47 6\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DASC.2017.8102146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DASC.2017.8102146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Development and testing of an intrusion detection system for unmanned aerial systems
This paper discusses the development, testing and prospective use of an intrusion detection system (IDS) for unmanned aerial vehicles (UAVs) and systems (UASs). Intrusion detection systems are typically used in computer networking and other applications to detect and respond to attempts to compromise computers, servers, firewalls and other network resources. In the context of the development of an IDS for UAV/UAS applications, several topics are considered. These include what an IDS is and how it is used, why do UAVs/UASs need an IDS and attack detection expectations for IDSs used in UAV/UAS applications. Because UAVs and UASs operate in the real world, with numerous and varied sensory inputs, testing and validation of these systems is particularly problematic. IDS Training challenges and the use of automated training to validate UAV/UAS IDS systems is, thus, a major consideration and also covered. The use of adaptive testing, in particular, is discussed.