{"title":"关注遇上无人机:低成本无人机 DDoS 检测综合评估","authors":"Ashish Sharma, SVSLN Surya Suhas Vaddhiparthy, Sai Usha Goparaju, Deepak Gangadharan, Harikumar Kandath","doi":"arxiv-2406.19881","DOIUrl":null,"url":null,"abstract":"This paper explores the critical issue of enhancing cybersecurity measures\nfor low-cost, Wi-Fi-based Unmanned Aerial Vehicles (UAVs) against Distributed\nDenial of Service (DDoS) attacks. In the current work, we have explored three\nvariants of DDoS attacks, namely Transmission Control Protocol (TCP), Internet\nControl Message Protocol (ICMP), and TCP + ICMP flooding attacks, and developed\na detection mechanism that runs on the companion computer of the UAV system. As\na part of the detection mechanism, we have evaluated various machine learning,\nand deep learning algorithms, such as XGBoost, Isolation Forest, Long\nShort-Term Memory (LSTM), Bidirectional-LSTM (Bi-LSTM), LSTM with attention,\nBi-LSTM with attention, and Time Series Transformer (TST) in terms of various\nclassification metrics. Our evaluation reveals that algorithms with attention\nmechanisms outperform their counterparts in general, and TST stands out as the\nmost efficient model with a run time of 0.1 seconds. TST has demonstrated an F1\nscore of 0.999, 0.997, and 0.943 for TCP, ICMP, and TCP + ICMP flooding attacks\nrespectively. In this work, we present the necessary steps required to build an\non-board DDoS detection mechanism. Further, we also present the ablation study\nto identify the best TST hyperparameters for DDoS detection, and we have also\nunderscored the advantage of adapting learnable positional embeddings in TST\nfor DDoS detection with an improvement in F1 score from 0.94 to 0.99.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"34 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attention Meets UAVs: A Comprehensive Evaluation of DDoS Detection in Low-Cost UAVs\",\"authors\":\"Ashish Sharma, SVSLN Surya Suhas Vaddhiparthy, Sai Usha Goparaju, Deepak Gangadharan, Harikumar Kandath\",\"doi\":\"arxiv-2406.19881\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explores the critical issue of enhancing cybersecurity measures\\nfor low-cost, Wi-Fi-based Unmanned Aerial Vehicles (UAVs) against Distributed\\nDenial of Service (DDoS) attacks. In the current work, we have explored three\\nvariants of DDoS attacks, namely Transmission Control Protocol (TCP), Internet\\nControl Message Protocol (ICMP), and TCP + ICMP flooding attacks, and developed\\na detection mechanism that runs on the companion computer of the UAV system. As\\na part of the detection mechanism, we have evaluated various machine learning,\\nand deep learning algorithms, such as XGBoost, Isolation Forest, Long\\nShort-Term Memory (LSTM), Bidirectional-LSTM (Bi-LSTM), LSTM with attention,\\nBi-LSTM with attention, and Time Series Transformer (TST) in terms of various\\nclassification metrics. Our evaluation reveals that algorithms with attention\\nmechanisms outperform their counterparts in general, and TST stands out as the\\nmost efficient model with a run time of 0.1 seconds. TST has demonstrated an F1\\nscore of 0.999, 0.997, and 0.943 for TCP, ICMP, and TCP + ICMP flooding attacks\\nrespectively. In this work, we present the necessary steps required to build an\\non-board DDoS detection mechanism. Further, we also present the ablation study\\nto identify the best TST hyperparameters for DDoS detection, and we have also\\nunderscored the advantage of adapting learnable positional embeddings in TST\\nfor DDoS detection with an improvement in F1 score from 0.94 to 0.99.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"34 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2406.19881\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2406.19881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Attention Meets UAVs: A Comprehensive Evaluation of DDoS Detection in Low-Cost UAVs
This paper explores the critical issue of enhancing cybersecurity measures
for low-cost, Wi-Fi-based Unmanned Aerial Vehicles (UAVs) against Distributed
Denial of Service (DDoS) attacks. In the current work, we have explored three
variants of DDoS attacks, namely Transmission Control Protocol (TCP), Internet
Control Message Protocol (ICMP), and TCP + ICMP flooding attacks, and developed
a detection mechanism that runs on the companion computer of the UAV system. As
a part of the detection mechanism, we have evaluated various machine learning,
and deep learning algorithms, such as XGBoost, Isolation Forest, Long
Short-Term Memory (LSTM), Bidirectional-LSTM (Bi-LSTM), LSTM with attention,
Bi-LSTM with attention, and Time Series Transformer (TST) in terms of various
classification metrics. Our evaluation reveals that algorithms with attention
mechanisms outperform their counterparts in general, and TST stands out as the
most efficient model with a run time of 0.1 seconds. TST has demonstrated an F1
score of 0.999, 0.997, and 0.943 for TCP, ICMP, and TCP + ICMP flooding attacks
respectively. In this work, we present the necessary steps required to build an
on-board DDoS detection mechanism. Further, we also present the ablation study
to identify the best TST hyperparameters for DDoS detection, and we have also
underscored the advantage of adapting learnable positional embeddings in TST
for DDoS detection with an improvement in F1 score from 0.94 to 0.99.