2019 Network Intrusion Detection System For UAV Ad-Hoc Communication From Methodology Design To Real Test Validation
2019 Network Intrusion Detection System For UAV Ad-Hoc Communication From Methodology Design To Real Test Validation
com/science/article/pii/S1570870518306541
Manuscript_d3f9d14901284bbb9e1fb245838a35ee
Abstract
The use of a swarm of low-cost, mission-specific drones to form a Flying Ad-
hoc Network (FANET) has literally become a ’hotspot’ in the drone community.
A number of studies have been conducted on how to achieve a FANET, but few
have considered the security perspectives of this subject. FANET’s unique fea-
tures have made it difficult to strengthen its defense against ever-changing secu-
rity threats. Today, more and more FANET applications are implemented into
civil airspace, but the development of FANET security has remained unsatisfac-
tory. In this paper, we try to address this issue by proposing a new Intrusion
Detection System (IDS), an hybrid method based on both spectral traffic analysis
and a robust controller / observer for anomaly estimation inside UAV networks.
The proposed hybrid method considers, as a preliminary step, a statistical signa-
ture of the traffic exchanged in the network. By examining the resulted signatures,
the differences are used to select the accurate model for accurate estimation of that
abnormal traffic. The proposed IDS design has been successfully applied to some
relevant practical problems such as ad hoc networks for aerial vehicles, and the ef-
fectiveness is illustrated by using real traffic traces including Distributed Denial of
Service (DDoS) attacks. Our first results show promising perspectives for Intru-
sion Detection System (IDS) in UAV communication networks. Indeed, different
types of anomaly have been considered and they are all accurately detected by
the intrusion detection process we propose in this paper. Finally, both simulation-
based validation and real-time real-world based implementation of our IDS are
described in this article.
Keywords: UAV, FANET, Intrusion Detection System, Spectral Analysis, Robust
Estimator, Drone Ad Hoc Network
© 2018 published by Elsevier. This manuscript is made available under the Elsevier user license
https://www.elsevier.com/open-access/userlicense/1.0/
1. Introduction
During the past years, Unmanned Aerial Vehicles (UAVs) are attracting more
and more attention. The use of UAVs has many apparent advantages over conven-
tional maned aircrafts especially in terms of operational expense, operator’s safety,
operability in difficult/hazardous environments and accessibility for civil applica-
tions. Recent technical advancements have made it easier than ever to setup an
Unmanned Aerial System with complex topology to achieve sophisticated mis-
sions which were previously impossible without actual human involvements. The
rapid advancements and heavy involvement of Information Technology have huge
impacts on the path which drone communities take to develop future UAV sys-
tems. Today’s decentralized technology promotes distribution of mission and cor-
responding resources [1]. This approach allows redundancy in terms of critical
components and improve the overall robustness of the system. However, most of
today’s advancements in the domain of network-attached UAV fleet are focusing
on the path to achieve a drone network as described in [2, 3, 4]. Little has been
considered for the cyber security of the drone network approaches leaving even
the most state-of-art drone network systems vulnerable against various security
threats [5]. Several researches [6, 7, 8, 9] have been conducted describing in detail
the possible security threats a UAV fleet can be facing during its normal operation.
Here we address one type of FANET security issues which is network intrusion
in a wireless ad-hoc network. As described in [10, 11] there are multiple threat
models related to network intrusion such as overload, flash crowds, worms, port
scans and jamming attacks. Among these abnormal patterns, flash crowds have
the worst impact on the fleet of UAVs because they create congestion and reduce
significantly the Quality of Service (QoS) of the entire network. This is a major
adversity for UAV certification and integration into civil airspace. Consequently,
malicious anomaly detection is an important issue nowadays. In [12] an overview
is provided reviewing multiple research areas and application domains. Network
anomalies and security-related problems (such as Distributed Denial of Service
(DDoS) attacks) are important issues for the detection of active security threats.
A variety of tools for anomaly detection are principally based on data packet sig-
nature. This behavior is known to be very effective for dealing with well-known
DDoS attacks. However, this mechanism is inefficient when a new type of attack
is performed. For this reason, we outline in this paper a new type of IDS able
to detect different types of DDoS. Our proposed intrusion detection model is a
two-step mechanism which first characterize the traffic by using a statistical sig-
nature and then select a precise estimator model to reconstruct the attack traffic.
2
All types of attack which do not follow the initial characteristics trigger an alarm
and, consequently, the malicious traffic can be analyzed in depth. This approach
has the major advantage that it is not associated with a specific type of attack.
Any attacks which do not follow the initial model can be detected, analyzed and
managed. Consequently, the security and performance of the entire network can
be improved. This traffic characterization is performed thanks to a statistical sig-
nature of the traffic exchanged in the network. Note that, statistical signatures,
based on wavelet analysis, have been selected because they offer a wide spec-
tral characterization of the entire traffic process. Each signature provides us an
unique identification of the current traffic. By looking up this signature in a bank
of signatures, it is possible to characterize and make a model of the anomaly in
the UAV network. Subsequently, attack will be analyzed by using a robust control
estimation to reconstruct the attack traffic. This is the first time that both spectral
analysis and robust control estimation have been coupled and used on a UAV ad
hoc network traffic.
The main contribution of this paper is to propose a new hybrid method which
is able to detect traffic anomalies (i.e. DDoS). Tests with real network conditions
have been performed to evaluate the characteristics of this method and to explore
the possibilities of future integration. The preliminary design of our new IDS pro-
cess and its theoretical assessment have been faced with real traffic traces. These
traces have been generated using a hybrid UAV network simulator. Consequently,
the validation of the new IDS system is improved by testing its performances faced
with real DDoS attacks, real UAV trajectories, real UAV background traffic, and
real UAV fleet topology in real-time. Finally, different types of anomaly have been
considered and they are all accurately detected by the intrusion detection process
we propose in this paper. First results for the proposed Intrusion Detection System
(IDS) in a fleet of UAVs are promising.
In the sequel, Section 2 addresses the state of the art of FANET and the new
challenges risen with this new topic, Then we present the characterization tools
described in the literature to extract network traffic signatures and the theoretical
background of our proposed controller / observer system. Section 3 presents the
basics of the characterization and the modeling adopted to tackle the time-delay
linear estimation problem of determining the state vector components of a fluid-
flow model fitted out with a TCP model. Section 3 also introduces the principles
of our IDS methodology which combines spectral analysis and traffic reconstruc-
tion. Section 4 gathers all the results obtained after solving the time-delay linear
estimation problem in real conditions. Finally, Section 5 describes the details
about the proposed hybrid IDS implementation in real-time real-world environ-
3
ments, and introduces different test methods that we have examined and results
we have obtained before we draw the conclusion.
2. Related Work
The intrusion detection methodology proposed in this paper is the result of
a collaboration between two scientific fields. The first one is related to traffic
characterization. It uses spectral analysis in order to generate a specific traffic
signature. The second is related to automatic control methods applied for traffic
reconstruction. It uses robust controller / observer methods to analyze the traf-
fic and rebuild its characteristics and behavior. In the next subsections, we will
summarize the latest research on the related fields.
4
safety of UAV fleets, but it is more important to ensure the safety of the overall
system even if the network is compromised. Hence, existing network security
strategies for fixed-topology is deemed no longer effective. The new network se-
curity strategies must be implemented to ensure the safety of the system by also
taking into account the mobility of the network, various possible attacks and the
risk of attacks from within the network.
5
while enhancing the intrinsic flight handling qualities of a fleet of UAVs. Among
the non-linear methods [22] described in the literature, the Super-Twisting Algo-
rithm (STA) [23, 24, 25] is the most widely used for chattering avoidance while
detecting anomalies. Its principles rely firstly on the non-linear fluid model ap-
plied on TCP dynamics and secondly on sliding modes [26] which are often used
to design robust non-linear observers or control laws. Unfortunately, building
upon this peculiar observer provides for bounded input-bounded state (BIBS),
finite-time stability only [27]. Consequently, this statement restricts the applica-
tion of this observer to the class of the systems for which the upper bound of the
initial condition might be estimated in advance. Such an approach can be very
non-systematic for complex dynamic systems such as the TCP model for a fleet
of UAVs. Another relevant method proposed in the literature is based on time-
delay linear state estimation. Such an approach [28] draws on both Lyapunov-
Krasovskii functional and dynamic behavior of TCP/AQM (Transmission Control
protocol/ Active Queue Management) to use a Luenberger observer to cope with
anomaly detection. An Active Queue Management consists of adjusting data flow
rates sent by the UAV through the network. The principle consists of dropping
(or marking when the ECN (Explicit Congestion Notification) [29] option is en-
abled) some packets before the buffer saturates. Consequently, the estimator must
be associated with a robust AQM in order to perform its diagnosis. The study
of congestion control in a time-delay system framework is not new and has been
successfully demonstrated in [30, 31, 32, 33]. A relevant constructive algorithm
[34] has been proposed.
6
Figure 1: General two-step framework of the proposed IDS system
tool to analyze this type of traffic. Wavelet coefficient and wavelet leader analy-
sis are common tools to analyze self-similarity and scaling properties. Here we
adapted a Wavelet Leader Multifractal (WLM) method introduced in [18, 19, 20,
21]. This method was first introduced to study hydrodynamic turbulence data
which is also regarded as a good example of a signal containing scale invariance
properties.
The WLM analysis is used to quantify the variability of any time series (in
this paper we focus on network traffic) we want to characterize. It considers mul-
tifractality of a signal by computing not only the wavelet coefficients of power
law at the 2nd order, but also other arbitrary orders. This toolbox is well defined
and proven by various applications.[19, 36, 37] This process produces a graphical
result (called a spectral signature) which is used to find the differences between
legitimate traffic and traffic which contains an anomaly. To best capture the com-
plexity of the traffic, we also consider the different statistic moments of analysis.
The result is a set of 3-dimensional curves that represent the dynamic of the traffic
at different moments and time scales.
There is an initial theoretical assumption to verify each time you want to use
the WLM method on any specific time series. Indeed, any data series need to
verify scale invariance in order to justify the self-similarity feature. This feature
is also observed in the analyzed data when a power law is observed when the
static signature is plotted (by a log-log diagram) for specific time scales of this
7
Figure 2: Example of WLM signature of a data series at statistic moment q = 2
data. We show in Figure 2 an example of the power law we can observe for
one of the network traffic series analyzed. Section 4 will present in detail the
different attacks we have analyzed and the different signatures we obtained for
each one. Based on the WLM methodology we can quantify the variability of
any time series according to two complementary parameters: the time scale and
the moment of analysis. Time scale allows us to see any repetition in the process
over time. Moment of analysis allows us to analyze traffic data in different spectral
representations. This second metric quantifies the variation of the traffic according
to, for instance, q = 1 (average), q = 2 (variance) and so on. An example of
spectral signature for regular traffic (i.e. not containing any attacks) is shown in
8
Figure 3. This figure represents the spectral characteristics of the data (i.e. the zeta
parameter) according to the time scale of analysis and the moment of observation.
We will illustrate in Section 4 how this signature can be different according to the
type of attack we wish to analyze and detect.
These differences are useful for traffic characterization but can also be very
helpful in selecting a dedicated robust estimation model. This is the topic of the
next subsection where we will describe the automatic control modeling we have
performed based on an controller / observer robust estimation.
9
Figure 4: sources / receivers connection in a fleet of UAVs
In the first differential equation, W (t) represents the TCP window size, τ (t) the
round trip time (RTT) which can be modeled using parameters associated to the
network configuration C, Tp as τ = q/C +Tp . The latter quantity C represents the
transmission capacity of the router, Tp the propagation delay and N the number
of TCP sessions. The variable p(t) is the marking / dropping probability of a
packet and can be seen as known measured input. This quantity relies on the
explicit congestion notification to regulate the queue size of the router buffer. In
the second differential equation, q(t) is the queue length of the router.
The malicious anomalies are modeled by an additional signal d(t) mixed with
the regular traffic passing through the router and filling the buffer. The non-linear
10
+ Malicious
Delay traffics
+
W (t)
TCP Queue
Dynamic Dynamic
δq(t)
O(L)
Delay
K Observer
p(t)
+ - Ŵ (t)
q̂(t)
p0 AQM W0
ˆ
d(t)
11
With
− τN2 C 1
0 τ02 C 0
N
Ā = − τ10 1
τ0
0 0 0
− τN2 C − τ 21C
0
0 0
Ād = 0
0 0 (3)
0 0 0
C 2 τ0
− 2N 2
B̄ = 0
0
C̄ = 0 1 0
where the perturbed variables δx̃(t)T = [δW (t) δq(t) d(t)]T around the desired
equilibrium (W0 , τ0 , q0 ) represents the augmented state. Practically, the objective
is to reconstruct d(t) from any attack modeled by wavelet analysis from Step 1,
and design an output feedback AQM. In this paper, the malicious intrusion d(t) ˙
˙
has been chosen constant (i.e d(t) = 0) due to the assumption of flash crowd
attack which can be mathematically represented by a step function. Consequently,
we are looking for gain controller K and gain observer L defined as (see [46], for
details of proof):
δu(t − τ (t)) = −Ky(t) = −KCδx(t)
O(L) ˙
δ x̂(t) = Āδx̂(t) + Ād δx̂(t − τ (t)) + B̄δu(t − τ (t)) (4)
+ L (y(t) − Cδx̂(t))
The first equation corresponds to the dynamics of the AQM. The second equation
corresponds to the estimation of the state vector δx̂ and describe the dynamics of
the observer. We recognize the typical mathematical expression of a linear state
estimator with correction terms L. The idea is to build an additive correction
term based on linear gains L which keeps stabling the dynamics of the estimation
error e(t). Such an approach is systematic for more complex dynamical systems
than the ones represented by a single router.
12
4. Intrusion Detection System Validation
4.1. UAV ad hoc network hybrid platform
In order to validate our new traffic estimator in real traffic conditions, we use
a hybrid experimental system to take advantage of the low cost of a simulation
while still obtaining the accuracy of a real protocol stack. We have been using
virtual machine implementations to deal with the entire complexity of the Linux
operating system. The traces used to generate UAV mobility patterns were ex-
tracted from real traces so that physical related factors could be as realistic as
possible. The system we have been using to evaluate protocols is divided into
several parts. It includes a set of tools that can deal with several scenarios: a hy-
pervisor to run the virtual machines, measurement tools and a framework to allow
virtual machines to communicate through a virtual wireless medium. We chose
to use VirtualBox as a visualization tool because it is an easy-to-use and efficient
hypervisor. The virtualized system is a 12.04 version Ubuntu, working with the
2.6.38 version of the Linux kernel. Our testbed architecture uses a Virtualmesh
framework. It is a framework that interfaces a Linux-based system with an OM-
NeT++ simulation. OMNeT++ is a powerful network simulator which simulates
several systems and normalized protocols. An illustration of this system is shown
in Figure 6. In [45], more details about this hybrid tool can be found. The main
advantage of using such a hybrid simulator is to extract any characteristics from
the simulation and to inject them into the Simulink design directly. The theoretical
model is then used under real traffic conditions and not only theoretical stimulus.
13
The advantage of such an evaluation is to take into account the huge variability
and complexity of real traffic. Consequently, we have been able to generate DDoS
between the different virtual machines by taking into account the exact UAV en-
vironment of the drone mission we have considered in this research. First, we
captured the network traffic generated (both regular traffic and the DDoS traffic)
and then, we injected this traffic into the Simulink design.
We will analyze the traffic in the face of different DDoS (Distributed Denial of
Service) attacks. Two types of DDoS attacks are considered: a Constant Flash-
Crowd (CFC) and a Progressive Flash-Crowd (PFC) attack. These anomalies have
been generated using the HPing31 tool. This software is run on the hacker node
1
http://www.hping.org/hping3.html
14
(see Figure 7 for details about the network topology which has been considered)
and can run different types of attack but mainly flooding attacks for our experi-
ments. Indeed, in our scenario, HPing3 exchanges thousands of small TCP flows
in order to generate a SYN flood attack on the receiver node. The resulting mali-
cious traffic is much more significant than the regular traffic. Figure 8a shows the
features of the traffic which has been generated through the hybrid network simu-
lation tool. This traffic includes 4 different CFCs of the same magnitude but with
different durations and, consequently, different impacts for the UAV network.
15
(a)
(b) (c)
Figure 8: (a) Waveform and (b,c) signature comparison between normal and CFC flooded traffics
Indeed, these two steps (characterization and anomaly reconstruction) are per-
formed separately. It is worth noting that the whole process is considered as a
work-in-progress task. In the rest of this paper, we are going to present addi-
tional results related to the second step of this process: anomaly reconstruction
and detection using robust controller / observer.
16
(a)
(b) (c)
Figure 9: (a) Waveform and (b,c) signature comparison between normal and PFC flooded traffics
queue length at the equilibrium point of the system: W0 and q0 . They have been
selected by considering the mean value for N sessions around which W (t) and
q(t) oscillate respectively. The proposed observer has been tested with the state
feedback AQM in [28] and observer gains are L = [1.2338538, 5.2445906, 2.24 ∗
e + 3, 1.94 ∗ e + 2]. This observer is synthesized to construct the state of CFC and
PFC attacks.
17
W0 15 packets
q0 37.5 packets/s
p0 0.0089
R0 0.06 s
Table 1: Equilibrium point
generated by our hybrid UAV network simulator has been injected into Simulink
to compare our IDS model to the real traffic traces. This is depicted in Figure
12 where regular traffic is around 30 pkt/s when, for the malicious traffic, the
throughput is increased to 150 pkt/s. Moreover, the real traffic (blue) and es-
timated intrusion (red) are plotted on the same figure for comparison purposes.
Figure 11 shows the time response of the estimated queue q(t) calculated by the
time-delay linear observer method. As expected, the queue is stabilized above the
desired level and the intrusion does not affect the different steady states of the sys-
tem. Figure 10 shows the time response of the TCP congestion windows W (t).
As expected, the TCP congestion window evolution is reconstructed with great
accuracy.
18
Figure 11: Queue length q(t) - CFC attack
19
serve that the estimator is able to reproduce the shape of the anomaly quickly and
make an accurate distinction between the normal traffic and the intrusion traffic
(see Figure 15). In addition to this, our controller / observer is able to estimate the
states of system W (t) and q(t) with accuracy (see Figures 13 and 14 for details).
20
Figure 15: Estimation with real traffic replay - PFC attack
21
5.1. Real test environment: Paparazzi software
The overall Paparazzi UAS (Unmaned Aerial System) can be decomposed into
three segments (Figure 16):
• Communication segment (red and blue lines) : all the communication links
and protocols between the ground and airborne segments. It mostly consists
in defining the communication links to define bandwidth, frequency, type of
communication (unidirectional, bidirectional), transmission protocols, mes-
sage content and the structure of the communication network (centralized,
dynamic point-to-point, ad-hoc, etc.).
22
Autopilot and ground control station (a part of ground segment) are closely
bonded, and usually developed and proposed by the same provider. The au-
topilot uses an onboard GPS receiver for navigation and returns this information
to the ground station. In an autonomous flight phase, the pilot can monitor in
real time the device and intervene if a deviation from the preset mission is de-
tected. Thus, the ground control station is dedicated to visualizations for flight
preparation, monitoring, control, and engineering tasks (flight tuning, logs post-
processing). Onboard and ground systems cannot be mixed, consequently, there
are two types of control system. Moreover, the first available systems were pro-
prietary closed. Today they are challenged by the open source community that
proposed opened hardware and source code solutions (cf. Paparazzi project at:
https://wiki.paparazziuav.org/). Open source autopilots are mainly
used by universities, laboratories for research and development activities such as
our IDS system proposed by ENAC. These systems are constantly improved by
its community members.
2
http://mathgl.sourceforge.net
3
http://www.fltk.org
23
is injected into the communication, before the actual acquisition of the bank of
signatures.
Once we verified the steady performance of our WLM analysis module, the bank
of signatures can be acquired by feeding the tool with collected packets from
known normal or malicious traffics and recording the resulted signatures. To have
a more general understanding of different traffics, we consider an extra degree of
freedom: acquisition period, in addition to moments of analysis and time scales
(sampling frequencies). This is because the duration of an attack is actually an
important parameter to distinguish the type and intensity of the attack.
In the end, the IDS software module will provide us, in real-time, an animated
window updating the signatures of current traffic, an alert when the signatures of
current traffic are matched in the bank of signatures; some detailed information
on the nature of the attack; the model to represent the attack; and the figure of the
simulated attack from the observer.
4
https://www.wireshark.org
24
type of real application use case, we will be able to test and validate the software
communication architecture proposed in this paper within a real environment.
The real-world performance testings of the WLM analysis tool have been per-
formed on traffic collected on the aforementioned test scenario. The packet rate
is extracted from Wireshark recordings split into segments each contained 12,500
samples. Then the segmented samples are fed continuously into the WLM toolbox
to simulate a real-time application scenario. The resulted signatures of the whole
test period are plotted in the same figure to better demonstrate the characteristics
of this analyze method.
It is shown in Figure 18 and 19, that for normal traffic, the signatures are more
uniform and stay in a relatively small range of zeta. Meanwhile, when the traffic
is under CFC attack, the signatures are clearly disturbed and lowered significantly
especially at the negative moments.
25
Figure 18: WLM Wavelet Leader analysis result on normal traffic(left) and flooded traffic(right)
Figure 19: WLM Discrete Wavelet analysis result on normal traffic(left) and flooded traffic(right)
26
the UAV’s vital information. The network part of the emulation is realistic and it
is done through sockets on the local host. Our IDS demonstration program takes
advantage of this setup and by altering the reception port of the simulated Linker
module, we can achieve the interception of packets transmitted between the GCS
and the simulated UAV. The sums of packets’ length during a given sample period
are then collected in a ring buffer and fed into the WLM toolbox in batch. This
implementation performs packet forwarding upon the reception of each packet to
keep the emulation in the right order.
27
(a) (b)
(c)
Figure 21: Real-time Signatures of (a) Normal Traffic (b) Traffic flooded with default packet
payload data size=0 (c) Traffic flooded with packet payload data size=100
because this current implementation only takes into account message size of the
packets received on the socket. The malicious empty packets will not impact the
calculation directly but they hinder the normal packet transmission, hence result in
a set of very different signatures. When the socket is subject to an attack which is
filled with data, the signatures (shown in Figure 21c) show a more inclined pattern
w.r.t. moment axis compare to the signatures of a normal traffic.
The real-time testings have provided us an intuitive knowledge of how WLM
28
analysis can help us to distinguish different types of attack. But how to tune the
tool remains to be an open question. Especially, to best preserve the Long Range
Dependency (LRD) characteristic of WLM analysis, a bigger sampling window
must be chosen. But that will cost the real-time performance of the IDS system.
29
pattern recognition on the different signatures. This is a crucial step to realize
our methodology. There are already some well defined methods to achieve an
accurate waveform / surface comparison including analytical methods as well as
machine learning algorithms. A further step will be taken to test different methods
in our specific case. At current stage, as a result of incompletion of development
of the first designed step, we have found difficulties in defining the false positive
rate of our proposed method, especially in the case of DDoS attack. New DDoS
attack models, stealth/silent attacks described in [47] for instance, have made it
increasingly difficult to distinguish DDoS attacks from normal traffic congestions.
Our proposed method will have the benefit of exploiting information of the traffic
in detail to aid future development of defense against DDoS attacks. Moreover,
we plan to analyze different types of attack: not only DDoS but also intrusion
where the traffic generated in the network is significantly lower and therefore,
more difficult to detect. A proposed solution would be to consider one bank of
models in order to detect, with different signatures, DDoS and other types of at-
tack (Wireless signal jamming for example). Finally, we plan to investigate a way
to implement and test this new generation intrusion detection system operating in
a more complex real environment. To address this last objective, we would like to
consider additional real experiments with an higher number of UAVs. Each UAV
could embed its specific bank of models. Consequently, by conducting a collabo-
rative mission, in the context of one UAV fleet, we will be able to test and validate
the theoretical estimators which, until now, have only been studied in a separated
and isolated approach. We plan to perform this part of the research in the near
future in the recently constructed UAV flight arena in ENAC, Toulouse, France.
[2] İ. Bekmezci, O. K. Sahingoz and Ş. Temel, ”Flying Ad-Hoc Networks
(FANETs): A survey,” Ad Hoc Networks, vol. 11, pp. 1254-1270, 2013.
30
[5] R. Altawy and A. M. Youssef, ”Security, Privacy, and Safety Aspects of
Civilian Drones: A Survey,” ACM Trans. Cyber-Phys. Syst., vol. 1, pp. 7:1–
7:25, 11 2016.
[6] C. Rani, H. Modares, R. Sriram, D. Mikulski and F. L. Lewis, ”Security of
unmanned aerial vehicle systems against cyber-physical attacks,” The Jour-
nal of Defense Modeling and Simulation, vol. 13, pp. 331-342, 2016.
[7] K. Hartmann and C. Steup, ”The vulnerability of UAVs to cyber attacks -
An approach to the risk assessment,” in 2013 5th International Conference
on Cyber Conflict (CYCON 2013), 2013.
[8] A. Kim, B. Wampler, J. Goppert, I. Hwang and H. Aldridge, ”Cyber Attack
Vulnerabilities Analysis for Unmanned Aerial Vehicles,” American Institute
of Aeronautics and Astronautics, 2018.
[9] İ. Bekmezci, E. Şentürk and T. Türker, ”SECURITY ISSUES IN FLY-
ING AD-HOC NETWORKS (FANETs),” Journal of Aeronautics and Space
Technologies; Vol 9 No 2 (2016), 2016.
[10] A. Lakhina, M. Crovella and C. Diot, ”Diagnosing Network-wide Traffic
Anomalies,” SIGCOMM Comput. Commun. Rev., vol. 34, pp. 219-230, 8
2004.
[11] A. Hussain ans al. ”A framework for classifying denial of service attacks,”
in SIGCOMM, Karlsruhe, Germany, Aug 2003, pp. 99110.
[12] V. Chandola, A. Banerjee and V. Kumar, ”Anomaly Detection: A Survey,”
ACM Comput. Surv., vol. 41, pp. 15:1–15:58, 7 2009.
[13] A. Jøsang and G. Sanderud, ”Security in Mobile Communications: Chal-
lenges and Opportunities,” in Proceedings of the Australasian Information
Security Workshop Conference on ACSW Frontiers 2003 - Volume 21, Dar-
linghurst, 2003.
[14] R. N. Akram, P. F. Bonnefoi, S. Chaumette, K. Markantonakis and D.
Sauveron, ”Secure Autonomous UAVs Fleets by Using New Specific Em-
bedded Secure Elements,” in 2016 IEEE Trustcom/BigDataSE/ISPA, 23-2.
[15] H. Sedjelmaci, S. M. Senouci and M. A. Messous,”How to Detect Cyber-
Attacks in Unmanned Aerial Vehicles Network?,” in 2016 IEEE Global
Communications Conference (GLOBECOM), 4-8 .
31
[16] P. Borgnat, G. Dewaele, K. Fukuda, P. Abry and K. Cho, ”Seven Years and
One Day: Sketching the Evolution of Internet Traffic,” in IEEE INFOCOM
2009, 2009, pp. 711-719.
[21] H. Wendt, S. G. Roux, S. Jaffard and P. Abry, ”Wavelet Leaders and Boot-
strap for Multifractal Analysis of Images,” Signal Process., vol. 89, pp. 1100-
1114, 6 2009.
[22] M. Fliess and al., Advances in Communication Control Networks, ser. Lec-
ture notes in Control and Information Sciences. Springer, 2005, ch. An In-
troduction to Nonlinear Fault Diagnosis with an Application to a Congested
Internet Router, pp. 393395.
[23] S. Rahm, Y. Labit and F. Gouaisbaut, ”Sliding Mode Observer for Anomaly
Detection in TCP/AQM Networks,” in 2009 Second International Confer-
ence on Communication Theory, Reliability, and Quality of Service, 20-2.
[24] S. Rahm, Y. Labit, F. Gouaisbaut and T. Floquet, ”Second order sliding mode
observer for anomaly detection in TCP networks: From theory to practice,”
in 49th IEEE Conference on Decision and Control (CDC), 15-1.
32
[26] T. Floquet, C. Edwards and S. K. Spurgeon, ”On Sliding Mode Observers
for Systems with Unknown Inputs,” in International Workshop on Variable
Structure Systems, 2006. VSS’06., 5-7 .
[27] C. Edwards, and al., ”Advances in Variable Structure and Sliding Mode Con-
trol”, Lecture Notes in Control and Information Science, Springer-Verlag,
Berlin (2006), pp. 271292
[30] C.-K. Chen, Y.-C. Hung, T.-L. Liao and J.-J. Yan, ”Design of robust active
queue management controllers for a class of TCP communication networks,”
Information Sciences, vol. 177, pp. 4059-4071, 10 2007.
[32] D. Wang and C. V. Hollot, ”Robust analysis and design of controllers for a
single TCP flow,” in International Conference on Communication Technol-
ogy Proceedings, 2003. ICCT 2003., 9-11.
33
[36] E. A. F. Ihlen, ”Multifractal analyses of response time series: A comparative
study,” Behavior Research Methods, vol. 45, pp. 928-945, 12 2013.
[37] A. Lakhina, M. Crovella and C. Diot, ”Diagnosing Network-wide Traffic
Anomalies,” SIGCOMM Comput. Commun. Rev., vol. 34, pp. 219-230, 8
2004.
[38] S. H. Low, F. Paganini and J. C. Doyle, ”Internet congestion control,” IEEE
Control Systems, vol. 22, pp. 28-43, Feb .
[39] R. Srikant, ”The Mathematics of Internet Congestion Control”. Birkhauser,
2004.
[40] S. Tarbouriech and al., ”Advances in communication Control Networks”.
Springer, 2005.
[41] S. Floyd and V. Jacobson, ”Random early detection gateways for congestion
avoidance,” IEEE/ACM Transactions on Networking, vol. 1, pp. 397-413,
Aug .
[42] S. Athuraliya and al., ”An enhanced random early marking algorithm for
internet flow control”, in IEEE INFOCOM, Dec. 2000, pp. 14251434.
[43] C. V. Hollot, V. Misra, D. Towsley and W. Gong, ”Analysis and design of
controllers for AQM routers supporting TCP flows,” IEEE Transactions on
Automatic Control, vol. 47, pp. 945-959, Jun .
[44] Y. Ariba and Y. Labit,”Congestion control of a single router with an active
queue management”, International Journal on Advances in Internet Technol-
ogy,2009.
[45] J.-A. Maxa, G. Roudire and N. Larrieu, ”Emulation-Based Performance
Evaluation of Routing Protocols for Uaanets,” in Nets4Aircraft 2015,
Sousse, 2015.Nets4Cars/Nets4Trains/Nets4Aircraft 2015.
[46] T. Miquel, J.-P. Condomines, R. Chemali and N. Larrieu, ”Design of a robust
Controller/Observer for TCP/AQM network: First application to intrusion
detection systems for drone fleet,” in IROS 2017, EEE/RSJ International
Conference on Intelligent Robots and Systems, Vancouver, 2017.
[47] A. Shevtekar and N. Ansari, ”Is it congestion or a DDoS attack?,” IEEE
Communications Letters, vol. 13, pp. 546-548, July.
34