Intrusion Detection Systems for Flying Ad-hoc Networks

06/08/2023
by   Jordan Quinn, et al.
0

Unmanned Aerial Vehicles (UAVs) are becoming more dependent on mission success than ever. Due to their increase in demand, addressing security vulnerabilities to both UAVs and the Flying Ad-hoc Networks (FANET) they form is more important than ever. As the network traffic is communicated through open airwaves, this network of UAVs relies on monitoring applications known as Intrusion Detection Systems (IDS) to detect and mitigate attacks. This paper will survey current IDS systems that include machine learning techniques when combating various vulnerabilities and attacks from bad actors. This paper will be concluded with research challenges and future research directions in finding an effective IDS system that can handle cyber-attacks while meeting performance requirements.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/02/2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey

Unmanned Aerial Vehicles (UAV)-based civilian or military applications b...
research
11/01/2017

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

Nowadays, the Security Information and Event Management (SIEM) systems t...
research
03/19/2019

Spline Based Intrusion Detection in Vehicular Ad Hoc Networks (VANET)

Intrusion detection systems (IDSs) play a crucial role in the identifica...
research
03/14/2023

An Intrusion Detection Mechanism for MANETs Based on Deep Learning Artificial Neural Networks (ANNs)

Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of...
research
07/17/2022

RSU-Based Online Intrusion Detection and Mitigation for VANET

Secure vehicular communication is a critical factor for secure traffic m...
research
02/02/2019

Application Specific Drone Simulators: Recent Advances and Challenges

Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonl...
research
12/18/2021

An Autonomous Self-Incremental Learning Approach for Detection of Cyber Attacks on Unmanned Aerial Vehicles (UAVs)

As the technological advancement and capabilities of automated systems h...

Please sign up or login with your details

Forgot password? Click here to reset