[go: up one dir, main page]

Skip to main content

Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2023)

Abstract

Over the last two decades, there has been significant growth in the drone industry with the emergence of Unmanned Aerial Vehicles (UAVs). Despite their affordability, the lack of security measures in commercial UAVs has led to numerous threats and vulnerabilities. In addition, software, and hardware complexity in UAVs also trigger privacy and security issues as well as cause critical challenges for government, industry and academia. Meanwhile, malicious activities have increased, including stealing confidential data from UAVs and hijacking UAVs. These attacks are not only illegitimate but also appear to be increasing in frequency and sophistication. In addition, the current defence mechanisms for counterattacks are not sustainable for two reasons: they either demand strict firmware updates for all of the system’s devices, or they demand the deployment of a variety of advanced hardware and software. This paper proposes a Medium Interaction Honeypot-Based Intrusion Detection System (MIHIDS) to protect UAVs. Our system assists in detecting active intruders in a specific range (radio frequency) and provides details of attacking technologies to exploit UAVs. Our system is a passive lightweight, signature-based MIHIDS that is simple to integrate into UAV without requiring changes in network configuration or replacement of current hardware or software. The performance assessment demonstrates that in a typical network situation, our proposed framework can identify MitM, Brute-force, and DE-authentication attacks with a maximum detection time of 60 s. Under normal network scenarios, a minimum True Positive Rate (TPR) and performance efficiency is 93% to 95% during a short-distance detector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993–994 (2016)

    Google Scholar 

  2. Pleban, J.-S., Band, R., Creutzburg, R.: Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Enabling Technologies, Algorithms, and Applications, Mobile Devices and Multimedia (2014)

    Google Scholar 

  3. Nawrocki, M., Wählisch, M., Schmidt, T.C., Keil, C., Schönfelder, J.: A survey on honeypot software and data analysis. arXiv preprint: arXiv:1608.06249 (2016)

  4. Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15) (2015)

    Google Scholar 

  5. Rist, L., Haslinger, D., Smith, J., Vestergaard, J., Pasquale, A.: Conpot honeypot (2013)

    Google Scholar 

  6. Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Pearson Education, London (2007)

    Google Scholar 

  7. Vasilomanolakis, E.: This network is infected: Hostage-a low-interaction honeypot for mobile devices. In: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (2013)

    Google Scholar 

  8. Vasilomanolakis, E., Srinivasa, S., Cordero, C.G., Mühlhäuser, M.: Multi-stage attack detection and signature generation with ICS honeypots. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium (2016)

    Google Scholar 

  9. Hadi, H.J., Sajjad, S.M., un Nisa, K.: BoDMitM: Botnet detection and mitigation system for home router base on MUD. In: 2019 International Conference on Frontiers of Information Technology (FIT) (2019)

    Google Scholar 

  10. Smith, A.: Bluepot: Bluetooth honeypot (2013). https://github.com/andrewmichaelsmith/bluepot

  11. johnnykv/heralding: Credentials catching honeypot. https://github.com/johnnykv/heralding

  12. foospidy/HoneyPy: A low to medium interaction honeypot. https://github.com/foospidy/HoneyPy

  13. CanadianJeff/honeywrt. https://github.com/CanadianJeff/honeywrt

  14. Michel Oosterhof. Cowrie honeypot. https://github.com/micheloosterhof/cowrie (2014)

  15. Klein, J.C.: Kojoney2 honeypot. https://github.com/madirish/kojoney2

  16. Dang, F.: Understanding fileless attacks on Linux-based IoT devices with HoneyCloud. In: Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (2019)

    Google Scholar 

  17. Wang, Y., Su, Z., Benslimane, A., Xu, Q., Dai, M., Li, R.: Collaborative Honeypot defence in UAV networks: a learning-based game approach. arXiv preprint: arXiv:2211 (2022). 01772

  18. Su, Z., et al.: Collaborative Honeypot defence in UAV Networks: a learning-based game approach (2022)

    Google Scholar 

  19. Hadi, H.J., Cao, Y., Nisa, K.U., Jamil, A.M., Ni, Q.: A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. J. Netw. Comput. Appl. 213, 103607 (2023). https://doi.org/10.1016/j.jnca.2023.103607

    Article  Google Scholar 

  20. Hadi, H.J., Cao, Y.: Cyber attacks and vulnerabilities assessment for unmanned aerial vehicles communication systems. In: 2022 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, pp. 213–218 (2022). https://doi.org/10.1109/FIT57066.2022.00047

Download references

Acknowledgement

The work is supported in part by the Wuhan Knowledge Innovation Program (2022010801010117) and Wuhan AI Innovation Program (2023010402040020) and Major Science and Technology Project of Zhejiang Province - Bilateral Industry Joint R &D Program Project (2021C04007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Majid Jamil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jamil, A.M. et al. (2024). Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle. In: Goel, S., Nunes de Souza, P.R. (eds) Digital Forensics and Cyber Crime. ICDF2C 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 571. Springer, Cham. https://doi.org/10.1007/978-3-031-56583-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56583-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56582-3

  • Online ISBN: 978-3-031-56583-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics