Abstract
Over the last two decades, there has been significant growth in the drone industry with the emergence of Unmanned Aerial Vehicles (UAVs). Despite their affordability, the lack of security measures in commercial UAVs has led to numerous threats and vulnerabilities. In addition, software, and hardware complexity in UAVs also trigger privacy and security issues as well as cause critical challenges for government, industry and academia. Meanwhile, malicious activities have increased, including stealing confidential data from UAVs and hijacking UAVs. These attacks are not only illegitimate but also appear to be increasing in frequency and sophistication. In addition, the current defence mechanisms for counterattacks are not sustainable for two reasons: they either demand strict firmware updates for all of the system’s devices, or they demand the deployment of a variety of advanced hardware and software. This paper proposes a Medium Interaction Honeypot-Based Intrusion Detection System (MIHIDS) to protect UAVs. Our system assists in detecting active intruders in a specific range (radio frequency) and provides details of attacking technologies to exploit UAVs. Our system is a passive lightweight, signature-based MIHIDS that is simple to integrate into UAV without requiring changes in network configuration or replacement of current hardware or software. The performance assessment demonstrates that in a typical network situation, our proposed framework can identify MitM, Brute-force, and DE-authentication attacks with a maximum detection time of 60 s. Under normal network scenarios, a minimum True Positive Rate (TPR) and performance efficiency is 93% to 95% during a short-distance detector.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993–994 (2016)
Pleban, J.-S., Band, R., Creutzburg, R.: Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Enabling Technologies, Algorithms, and Applications, Mobile Devices and Multimedia (2014)
Nawrocki, M., Wählisch, M., Schmidt, T.C., Keil, C., Schönfelder, J.: A survey on honeypot software and data analysis. arXiv preprint: arXiv:1608.06249 (2016)
Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15) (2015)
Rist, L., Haslinger, D., Smith, J., Vestergaard, J., Pasquale, A.: Conpot honeypot (2013)
Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Pearson Education, London (2007)
Vasilomanolakis, E.: This network is infected: Hostage-a low-interaction honeypot for mobile devices. In: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (2013)
Vasilomanolakis, E., Srinivasa, S., Cordero, C.G., Mühlhäuser, M.: Multi-stage attack detection and signature generation with ICS honeypots. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium (2016)
Hadi, H.J., Sajjad, S.M., un Nisa, K.: BoDMitM: Botnet detection and mitigation system for home router base on MUD. In: 2019 International Conference on Frontiers of Information Technology (FIT) (2019)
Smith, A.: Bluepot: Bluetooth honeypot (2013). https://github.com/andrewmichaelsmith/bluepot
johnnykv/heralding: Credentials catching honeypot. https://github.com/johnnykv/heralding
foospidy/HoneyPy: A low to medium interaction honeypot. https://github.com/foospidy/HoneyPy
CanadianJeff/honeywrt. https://github.com/CanadianJeff/honeywrt
Michel Oosterhof. Cowrie honeypot. https://github.com/micheloosterhof/cowrie (2014)
Klein, J.C.: Kojoney2 honeypot. https://github.com/madirish/kojoney2
Dang, F.: Understanding fileless attacks on Linux-based IoT devices with HoneyCloud. In: Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (2019)
Wang, Y., Su, Z., Benslimane, A., Xu, Q., Dai, M., Li, R.: Collaborative Honeypot defence in UAV networks: a learning-based game approach. arXiv preprint: arXiv:2211 (2022). 01772
Su, Z., et al.: Collaborative Honeypot defence in UAV Networks: a learning-based game approach (2022)
Hadi, H.J., Cao, Y., Nisa, K.U., Jamil, A.M., Ni, Q.: A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. J. Netw. Comput. Appl. 213, 103607 (2023). https://doi.org/10.1016/j.jnca.2023.103607
Hadi, H.J., Cao, Y.: Cyber attacks and vulnerabilities assessment for unmanned aerial vehicles communication systems. In: 2022 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, pp. 213–218 (2022). https://doi.org/10.1109/FIT57066.2022.00047
Acknowledgement
The work is supported in part by the Wuhan Knowledge Innovation Program (2022010801010117) and Wuhan AI Innovation Program (2023010402040020) and Major Science and Technology Project of Zhejiang Province - Bilateral Industry Joint R &D Program Project (2021C04007).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Jamil, A.M. et al. (2024). Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle. In: Goel, S., Nunes de Souza, P.R. (eds) Digital Forensics and Cyber Crime. ICDF2C 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 571. Springer, Cham. https://doi.org/10.1007/978-3-031-56583-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-56583-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-56582-3
Online ISBN: 978-3-031-56583-0
eBook Packages: Computer ScienceComputer Science (R0)