Skip to main content

2024 | OriginalPaper | Buchkapitel

Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle

verfasst von : Abdul Majid Jamil, Hassan Jalil Hadi, Sifan Li, Yue Cao, Naveed Ahmed, Faisal Bashir Hussain, Chakkaphong Suthaputchakun, Xinyuan Wang

Erschienen in: Digital Forensics and Cyber Crime

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Over the last two decades, there has been significant growth in the drone industry with the emergence of Unmanned Aerial Vehicles (UAVs). Despite their affordability, the lack of security measures in commercial UAVs has led to numerous threats and vulnerabilities. In addition, software, and hardware complexity in UAVs also trigger privacy and security issues as well as cause critical challenges for government, industry and academia. Meanwhile, malicious activities have increased, including stealing confidential data from UAVs and hijacking UAVs. These attacks are not only illegitimate but also appear to be increasing in frequency and sophistication. In addition, the current defence mechanisms for counterattacks are not sustainable for two reasons: they either demand strict firmware updates for all of the system’s devices, or they demand the deployment of a variety of advanced hardware and software. This paper proposes a Medium Interaction Honeypot-Based Intrusion Detection System (MIHIDS) to protect UAVs. Our system assists in detecting active intruders in a specific range (radio frequency) and provides details of attacking technologies to exploit UAVs. Our system is a passive lightweight, signature-based MIHIDS that is simple to integrate into UAV without requiring changes in network configuration or replacement of current hardware or software. The performance assessment demonstrates that in a typical network situation, our proposed framework can identify MitM, Brute-force, and DE-authentication attacks with a maximum detection time of 60 s. Under normal network scenarios, a minimum True Positive Rate (TPR) and performance efficiency is 93% to 95% during a short-distance detector.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993–994 (2016) Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993–994 (2016)
2.
Zurück zum Zitat Pleban, J.-S., Band, R., Creutzburg, R.: Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Enabling Technologies, Algorithms, and Applications, Mobile Devices and Multimedia (2014) Pleban, J.-S., Band, R., Creutzburg, R.: Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Enabling Technologies, Algorithms, and Applications, Mobile Devices and Multimedia (2014)
3.
Zurück zum Zitat Nawrocki, M., Wählisch, M., Schmidt, T.C., Keil, C., Schönfelder, J.: A survey on honeypot software and data analysis. arXiv preprint: arXiv:1608.06249 (2016) Nawrocki, M., Wählisch, M., Schmidt, T.C., Keil, C., Schönfelder, J.: A survey on honeypot software and data analysis. arXiv preprint: arXiv:​1608.​06249 (2016)
4.
Zurück zum Zitat Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15) (2015) Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15) (2015)
5.
Zurück zum Zitat Rist, L., Haslinger, D., Smith, J., Vestergaard, J., Pasquale, A.: Conpot honeypot (2013) Rist, L., Haslinger, D., Smith, J., Vestergaard, J., Pasquale, A.: Conpot honeypot (2013)
6.
Zurück zum Zitat Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Pearson Education, London (2007) Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Pearson Education, London (2007)
7.
Zurück zum Zitat Vasilomanolakis, E.: This network is infected: Hostage-a low-interaction honeypot for mobile devices. In: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (2013) Vasilomanolakis, E.: This network is infected: Hostage-a low-interaction honeypot for mobile devices. In: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (2013)
8.
Zurück zum Zitat Vasilomanolakis, E., Srinivasa, S., Cordero, C.G., Mühlhäuser, M.: Multi-stage attack detection and signature generation with ICS honeypots. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium (2016) Vasilomanolakis, E., Srinivasa, S., Cordero, C.G., Mühlhäuser, M.: Multi-stage attack detection and signature generation with ICS honeypots. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium (2016)
9.
Zurück zum Zitat Hadi, H.J., Sajjad, S.M., un Nisa, K.: BoDMitM: Botnet detection and mitigation system for home router base on MUD. In: 2019 International Conference on Frontiers of Information Technology (FIT) (2019) Hadi, H.J., Sajjad, S.M., un Nisa, K.: BoDMitM: Botnet detection and mitigation system for home router base on MUD. In: 2019 International Conference on Frontiers of Information Technology (FIT) (2019)
16.
Zurück zum Zitat Dang, F.: Understanding fileless attacks on Linux-based IoT devices with HoneyCloud. In: Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (2019) Dang, F.: Understanding fileless attacks on Linux-based IoT devices with HoneyCloud. In: Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (2019)
17.
Zurück zum Zitat Wang, Y., Su, Z., Benslimane, A., Xu, Q., Dai, M., Li, R.: Collaborative Honeypot defence in UAV networks: a learning-based game approach. arXiv preprint: arXiv:2211 (2022). 01772 Wang, Y., Su, Z., Benslimane, A., Xu, Q., Dai, M., Li, R.: Collaborative Honeypot defence in UAV networks: a learning-based game approach. arXiv preprint: arXiv:​2211 (2022). 01772
18.
Zurück zum Zitat Su, Z., et al.: Collaborative Honeypot defence in UAV Networks: a learning-based game approach (2022) Su, Z., et al.: Collaborative Honeypot defence in UAV Networks: a learning-based game approach (2022)
20.
Metadaten
Titel
Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle
verfasst von
Abdul Majid Jamil
Hassan Jalil Hadi
Sifan Li
Yue Cao
Naveed Ahmed
Faisal Bashir Hussain
Chakkaphong Suthaputchakun
Xinyuan Wang
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-56583-0_11

Premium Partner