UAVCAN Dataset Description

12/19/2022
by   Dongsung Kim, et al.
0

We collected attack data from unmanned vehicles using the UAVCAN protocol, and public and described technical documents. A testbed was built with a drone using PX4, and a total of three attacks, Flooding, Fuzzy, and Replay, were performed. The attack was carried out in a total of 10 scenarios. We expect that the attack data will help develop technologies such as anomaly detection to solve the security threat problem of drones.

READ FULL TEXT

page 3

page 6

page 10

page 13

page 15

page 17

page 18

research
09/12/2023

Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol

This research paper entails an examination of the Enhanced Wi-Fi protoco...
research
04/05/2020

Security Analysis and Fault Detection Against Stealthy Replay Attacks

This paper investigates the security issue of the data replay attacks on...
research
04/07/2022

Adversarial Machine Learning Attacks Against Video Anomaly Detection Systems

Anomaly detection in videos is an important computer vision problem with...
research
12/24/2021

A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks

The emerging 5G network is a new global wireless standard after 1G, 2G, ...
research
07/11/2020

Anomaly Detection-Based Unknown Face Presentation Attack Detection

Anomaly detection-based spoof attack detection is a recent development i...
research
06/18/2021

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

Graph-based Anomaly Detection (GAD) is becoming prevalent due to the pow...
research
06/16/2022

Adversarial Robustness of Graph-based Anomaly Detection

Graph-based anomaly detection is becoming prevalent due to the powerful ...

Please sign up or login with your details

Forgot password? Click here to reset