This content is not included in your SAE MOBILUS subscription, or you are not logged in.
UAS Behaviour and Consistency Monitoring System for Countering Cyber Security Threats
ISSN: 0148-7191, e-ISSN: 2688-3627
Published September 16, 2014 by SAE International in United States
Annotation ability available
Upon their arrival, Unmanned Autonomous Systems (UAS) brought with them many benefits for those involved in a military campaign. They can use such systems to reconnoiter dangerous areas, provide 24-hr aerial security surveillance for force protection purposes or even attack enemy targets all the while avoiding friendly human losses in the process. Unfortunately, these platforms also carry the inherent risk of being built on innately vulnerable cybernetic systems. From software which can be tampered with to either steal data, damage or even outright steal the aircraft, to the data networks used for communications which can be jammed or even eavesdropped on to gain access to sensible information. All this has the potential to turn the benefits of UAS into liabilities and although the last decade has seen great advances in the development of protection and countermeasures against the described threats and beyond the risk still endures.
With this in mind the present work will describe a monitoring system whose purpose is to monitor UAS mission profile implementation at both high level mission execution and at lower level software code operation to tackle the specific threats of malicious code and possible spurious commands received over the vehicle's data links. All this is achieved by using intelligent and machine learning algorithms to monitor that the system's behavior matches or follows the overall concept of the mission, whilst also verifying that each software module is not engaging in apparent legitimate operation, but which could be the result of malicious code attempting to negatively affect the aircraft.
This paper will describe the algorithms employed together with the architectural concept to later discuss simulation results where the advantages of the proposed monitoring system will be elaborated upon.
|Technical Paper||Self-Affinity of an Aircraft Pilot’s Gaze Direction as a Marker of Visual Tunneling|
|Technical Paper||Training of Neural Networks with Automated Labeling of Simulated Sensor Data|
CitationFelix, R., Economou, J., and Knowles, K., "UAS Behaviour and Consistency Monitoring System for Countering Cyber Security Threats," SAE Technical Paper 2014-01-2131, 2014, https://doi.org/10.4271/2014-01-2131.
- Perkinson , Paul , Lessons learned from and active cyber defense deployment pilot program Integrated Communications, Navigation and Surveillance Conference (ICNS) 2012 1 15 24-26 April 2012 10.1109/ICNSurv.2012.6218456
- Javaid , Ahmad Y. , Sun Weiqin , Devabhaktuni Vijay K. and Alam Mansoor , Cyber security threat analysis and modeling of an unmanned aerial vehicle system Homeland Security (HST), 2012 IEEE Conference on Technologies for 585 590 IEEE 2012
- Kwon , Cheolhyeon , Liu Weiyi and Hwang Inseok Security analysis for Cyber-Physical Systems against stealthy deception attacks American Control Conference (ACC) 2013 3344 3349 IEEE 2013
- Valette , Nicolas , Torres Lionel , Sassatelli Gilles and Bancel Frédéric Securing embedded programmable gate arrays in secure circuits Parallel and Distributed Processing Symposium 2006 IPDPS 2006. 20 th International 4 IEEE 2006
- Reece , T. Detection of malicious hardware in integrated circuits and field programmable gate arrays MSc. Thesis Vanderbilt University 2009
- Kim , Alan. Wampler Brandon , Goppert James , Hwang Inseok and Aldridge Hal Cyber attack vulnerabilities analysis for unmanned aerial vehicles The American Institute of Aeronautics and Astronautics: Reston, VA, USA 2012
- Banerjee , Ayan , Venkatasubramanian Krishna K. , Mukherjee Tridib , and Gupta Sandeep KS. Ensuring safety, security and sustainability of mission-critical cyber-physical systems Proceeding of the IEEE 100 1 2012 283 299