Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks

The Internet of Things (IoT) plays an important role to connect people, data, processes, and things. From linked supply chains to big data produced by a large number of IoT devices to industrial control systems where cybersecurity has become a critical problem in IoT-powered systems. Denial of Service (DoS), distributed denial of service (DDoS), and ping of death attacks are significant threats to flying networks. This paper presents an intrusion detection system (IDS) based on attack probability using the Markov chain to detect flooding attacks. While the paper includes buffer queue length by using queuing theory concept to evaluate the network safety. Also, the network scenario will change due to the dynamic nature of flying vehicles. Simulation describes the queue length when the ground station is under attack. The proposed IDS utilizes the optimal threshold to make a tradeoff between false positive and false negative states with Markov binomial and Markov chain distribution stochastic models. However, at each time slot, the results demonstrate maintaining queue length in normal mode with less packet loss and high attack detection.

[1]  Gaurav Raj,et al.  Surveillance drone for disaster management and military security , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[2]  Shalini Batra,et al.  Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks , 2019, IEEE Consumer Electronics Magazine.

[3]  Tommaso Melodia,et al.  Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking , 2018, IEEE Internet of Things Journal.

[4]  Thomas Lagkas,et al.  A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics , 2020, IEEE Communications Surveys & Tutorials.

[5]  Ekram Khan,et al.  Aerial surveillance system using UAV , 2016, 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN).

[6]  Lui Sha,et al.  A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems , 2018, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[7]  Mohammad Fathi,et al.  An Intrusion Detection System on Ping of Death Attacks in IoT Networks , 2020, Wireless Personal Communications.

[8]  Umit Karabiyik,et al.  Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs) , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[9]  Mohiuddin Ahmed,et al.  False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure , 2020, Complex Adapt. Syst. Model..

[10]  Thomas Lagkas,et al.  UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things” , 2018, Sensors.

[11]  Inam Ullah Khan,et al.  Smart IoT Control-Based Nature Inspired Energy Efficient Routing Protocol for Flying Ad Hoc Network (FANET) , 2020, IEEE Access.

[12]  Houbing Song,et al.  Data Security and Privacy Issues in Swarms of Drones , 2019, 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS).

[13]  Lei Yang,et al.  Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information , 2018, Sensors.

[14]  Anis Laouiti,et al.  Multipoint relaying for flooding broadcast messages in mobile wireless networks , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[15]  Frank L. Lewis,et al.  Security of unmanned aerial vehicle systems against cyber-physical attacks , 2016 .

[16]  Ali Safaa Sadiq,et al.  Comprehensive Review of Cybercrime Detection Techniques , 2020, IEEE Access.

[17]  Calvin Coopmans,et al.  Improving communication security of open source UAVs: Encrypting radio control link , 2017, 2017 International Conference on Unmanned Aircraft Systems (ICUAS).

[18]  Rao R. Bhavani,et al.  UAV based security system for prevention of harassment against woman , 2017, 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).