关注遇上无人机:低成本无人机 DDoS 检测综合评估

Ashish Sharma, SVSLN Surya Suhas Vaddhiparthy, Sai Usha Goparaju, Deepak Gangadharan, Harikumar Kandath
{"title":"关注遇上无人机:低成本无人机 DDoS 检测综合评估","authors":"Ashish Sharma, SVSLN Surya Suhas Vaddhiparthy, Sai Usha Goparaju, Deepak Gangadharan, Harikumar Kandath","doi":"arxiv-2406.19881","DOIUrl":null,"url":null,"abstract":"This paper explores the critical issue of enhancing cybersecurity measures\nfor low-cost, Wi-Fi-based Unmanned Aerial Vehicles (UAVs) against Distributed\nDenial of Service (DDoS) attacks. In the current work, we have explored three\nvariants of DDoS attacks, namely Transmission Control Protocol (TCP), Internet\nControl Message Protocol (ICMP), and TCP + ICMP flooding attacks, and developed\na detection mechanism that runs on the companion computer of the UAV system. As\na part of the detection mechanism, we have evaluated various machine learning,\nand deep learning algorithms, such as XGBoost, Isolation Forest, Long\nShort-Term Memory (LSTM), Bidirectional-LSTM (Bi-LSTM), LSTM with attention,\nBi-LSTM with attention, and Time Series Transformer (TST) in terms of various\nclassification metrics. Our evaluation reveals that algorithms with attention\nmechanisms outperform their counterparts in general, and TST stands out as the\nmost efficient model with a run time of 0.1 seconds. TST has demonstrated an F1\nscore of 0.999, 0.997, and 0.943 for TCP, ICMP, and TCP + ICMP flooding attacks\nrespectively. In this work, we present the necessary steps required to build an\non-board DDoS detection mechanism. Further, we also present the ablation study\nto identify the best TST hyperparameters for DDoS detection, and we have also\nunderscored the advantage of adapting learnable positional embeddings in TST\nfor DDoS detection with an improvement in F1 score from 0.94 to 0.99.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"34 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attention Meets UAVs: A Comprehensive Evaluation of DDoS Detection in Low-Cost UAVs\",\"authors\":\"Ashish Sharma, SVSLN Surya Suhas Vaddhiparthy, Sai Usha Goparaju, Deepak Gangadharan, Harikumar Kandath\",\"doi\":\"arxiv-2406.19881\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explores the critical issue of enhancing cybersecurity measures\\nfor low-cost, Wi-Fi-based Unmanned Aerial Vehicles (UAVs) against Distributed\\nDenial of Service (DDoS) attacks. In the current work, we have explored three\\nvariants of DDoS attacks, namely Transmission Control Protocol (TCP), Internet\\nControl Message Protocol (ICMP), and TCP + ICMP flooding attacks, and developed\\na detection mechanism that runs on the companion computer of the UAV system. As\\na part of the detection mechanism, we have evaluated various machine learning,\\nand deep learning algorithms, such as XGBoost, Isolation Forest, Long\\nShort-Term Memory (LSTM), Bidirectional-LSTM (Bi-LSTM), LSTM with attention,\\nBi-LSTM with attention, and Time Series Transformer (TST) in terms of various\\nclassification metrics. Our evaluation reveals that algorithms with attention\\nmechanisms outperform their counterparts in general, and TST stands out as the\\nmost efficient model with a run time of 0.1 seconds. TST has demonstrated an F1\\nscore of 0.999, 0.997, and 0.943 for TCP, ICMP, and TCP + ICMP flooding attacks\\nrespectively. In this work, we present the necessary steps required to build an\\non-board DDoS detection mechanism. Further, we also present the ablation study\\nto identify the best TST hyperparameters for DDoS detection, and we have also\\nunderscored the advantage of adapting learnable positional embeddings in TST\\nfor DDoS detection with an improvement in F1 score from 0.94 to 0.99.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"34 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2406.19881\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2406.19881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文探讨了如何加强基于 Wi-Fi 的低成本无人飞行器 (UAV) 的网络安全措施,以抵御分布式拒绝服务 (DDoS) 攻击这一关键问题。在当前工作中,我们探索了三种 DDoS 攻击变体,即传输控制协议 (TCP)、互联网控制消息协议 (ICMP) 和 TCP + ICMP 泛洪攻击,并开发了一种在无人机系统配套计算机上运行的检测机制。作为检测机制的一部分,我们对各种机器学习和深度学习算法进行了评估,如 XGBoost、Isolation Forest、LongShort-Term Memory (LSTM)、Bidirectional-LSTM (Bi-LSTM)、LSTM with attention、Bi-LSTM with attention 和 Time Series Transformer (TST)。我们的评估结果表明,具有注意力机制的算法总体上优于同类算法,而 TST 以 0.1 秒的运行时间成为最高效的模型。TST 对 TCP、ICMP 和 TCP + ICMP 泛洪攻击的 F1 分数分别为 0.999、0.997 和 0.943。在这项工作中,我们介绍了建立板载 DDoS 检测机制所需的必要步骤。此外,我们还进行了消融研究,以确定用于 DDoS 检测的最佳 TST 超参数,并发现了在 TST 中采用可学习位置嵌入进行 DDoS 检测的优势,F1 分数从 0.94 提高到了 0.99。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Attention Meets UAVs: A Comprehensive Evaluation of DDoS Detection in Low-Cost UAVs
This paper explores the critical issue of enhancing cybersecurity measures for low-cost, Wi-Fi-based Unmanned Aerial Vehicles (UAVs) against Distributed Denial of Service (DDoS) attacks. In the current work, we have explored three variants of DDoS attacks, namely Transmission Control Protocol (TCP), Internet Control Message Protocol (ICMP), and TCP + ICMP flooding attacks, and developed a detection mechanism that runs on the companion computer of the UAV system. As a part of the detection mechanism, we have evaluated various machine learning, and deep learning algorithms, such as XGBoost, Isolation Forest, Long Short-Term Memory (LSTM), Bidirectional-LSTM (Bi-LSTM), LSTM with attention, Bi-LSTM with attention, and Time Series Transformer (TST) in terms of various classification metrics. Our evaluation reveals that algorithms with attention mechanisms outperform their counterparts in general, and TST stands out as the most efficient model with a run time of 0.1 seconds. TST has demonstrated an F1 score of 0.999, 0.997, and 0.943 for TCP, ICMP, and TCP + ICMP flooding attacks respectively. In this work, we present the necessary steps required to build an on-board DDoS detection mechanism. Further, we also present the ablation study to identify the best TST hyperparameters for DDoS detection, and we have also underscored the advantage of adapting learnable positional embeddings in TST for DDoS detection with an improvement in F1 score from 0.94 to 0.99.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信