Development and Testing of An Intrusion Detection System For Unmanned Aerial Systems
Development and Testing of An Intrusion Detection System For Unmanned Aerial Systems
Abstract—This paper discusses the development, testing and If the attacker is able to gain control of the craft (instead of
prospective use of an intrusion detection system (IDS) for just influencing or impairing it), he or she has the potential to
unmanned aerial vehicles (UAVs) and systems (UASs). Intrusion be able to turn the craft into a targeted munition.
detection systems are typically used in computer networking and
other applications to detect and respond to attempts to In addition to the obvious safety and mission implications,
compromise computers, servers, firewalls and other network breaches will erode public trust in UASs and deny society
resources. In the context of the development of an IDS for some or all of the benefits that they can offer.
UAV/UAS applications, several topics are considered. These
Intrusion detection systems (IDSs) have historically been
include what an IDS is and how it is used, why do UAVs/UASs
need an IDS and attack detection expectations for IDSs used in used to identify prospective attacks on networks and networked
UAV/UAS applications. Because UAVs and UASs operate in the resources. To do this, they identify attacks by signature, by
real world, with numerous and varied sensory inputs, testing and sensing the presence of an abnormal behavior or by sensing the
validation of these systems is particularly problematic. IDS absence of a desired normal behavior. More recently, IDSs
Training challenges and the use of automated training to validate have been proposed for use by cyber-physical systems, which
UAV/UAS IDS systems is, thus, a major consideration and also interact with the real-world environment. These systems
covered. The use of adaptive testing, in particular, is discussed. introduce a multitude of new types of data to prospectively
process to detect attacks and other undesirable behavior. The
Keywords—unmanned aerial vehicle, unmanned aerial system, introduction of this wealth of data, while necessary for system
UAV, UAS, intrusion detection systems, automated testing, testing functionality, increases the complexity of the systems
automation, adaptive testing, autonomous testing exponentially and makes the assurance of the system’s
performance problematic.
I. INTRODUCTION Intrusion Detection Systems (IDSs) have been used in
In [1], work on an the development of an intrusion network security for some time to detect security breaches. In
detection system and its automated testing was presented. This this context, they look for suspect patterns of network traffic,
paper builds upon this previous work (while re-presenting a server loads and other tell-tale signs that something is amiss.
significant amount of it to provide context) and discusses its These same symptoms are relevant to UAS applications;
application to the domain of unmanned aerial systems. however, they represent only a part of the data that an IDS is
able to consider.
Unmanned aerial systems (UASs) provide significant
capabilities in numerous application areas. They have been With any cyber-physical system (a software-hardware
used to capture real estate photographs, study wildlife and system that interacts with the real world), the nature of these
survey fields. In these applications, a malfunction or command interactions can be taken into account when looking for
or control failure poses minimal danger. However, in prospective attacks. Instead of just analyzing traffic data,
numerous other applications (such as sports photography, law commands, mission expectations, UAV behavior and other
enforcement uses, military applications and even recreation), factors can be juxtaposed. The system can search for
drone failure can result in the potential for significant injury. symptoms of particular attacks, the presence of unexpected
behaviors and/or the absence of expected behaviors.
In addition to the potential for an accidental mishap or
inadvertent or negligence-attributable failure, there is a very This paper proposes the use of intrusion detection systems
real potential for the command systems to be attacked. These for UAVs and UASs and discusses how to test these systems,
attacks may target the command and control software and building off previous work related to UAV/UAS testing
system onboard the unmanned aerial vehicle (UAV), ground presented in [2]. Formal verification is not possible, as the
control (or, in the longer term, traffic coordination) stations or systems must consume real-world data from sensors (which
the data link between the craft and the ground. Breaching (or may have their own idiosyncrasies, failure modes and other
denying access to) any of these points could potentially have limitations). Given the multitude of types of data that the
catastrophic results. system may be subjected to and a very real potential that an