Development and testing of an intrusion detection system for unmanned aerial systems

This paper discusses the development, testing and prospective use of an intrusion detection system (IDS) for unmanned aerial vehicles (UAVs) and systems (UASs). Intrusion detection systems are typically used in computer networking and other applications to detect and respond to attempts to compromise computers, servers, firewalls and other network resources. In the context of the development of an IDS for UAV/UAS applications, several topics are considered. These include what an IDS is and how it is used, why do UAVs/UASs need an IDS and attack detection expectations for IDSs used in UAV/UAS applications. Because UAVs and UASs operate in the real world, with numerous and varied sensory inputs, testing and validation of these systems is particularly problematic. IDS Training challenges and the use of automated training to validate UAV/UAS IDS systems is, thus, a major consideration and also covered. The use of adaptive testing, in particular, is discussed.

[1]  Zhengyou Xia,et al.  An adaptive adjusting mechanism for agent distributed blackboard architecture , 2005, Microprocess. Microsystems.

[2]  Amir Hossein Gandomi,et al.  Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems , 2011, Engineering with Computers.

[3]  Jeremy Straub,et al.  Consideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others , 2016 .

[4]  Franz Stetter,et al.  A hierarchical blackboard architecture for distributed AI systems , 1992, Proceedings Fourth International Conference on Software Engineering and Knowledge Engineering.

[5]  Jiang Wu,et al.  Novel intelligent water drops optimization approach to single UCAV smooth trajectory planning , 2009 .

[6]  Victor W. Marek,et al.  Computing with Default Logic , 1999, Artif. Intell..

[7]  Norman Sadeh,et al.  A Blackboard Architecture for Integrating Process Planning and Production Scheduling , 1998 .

[8]  Dong Seong Kim,et al.  INTRUSION DETECTION SYSTEM , 2013 .

[9]  Mark Harman,et al.  The role of Artificial Intelligence in Software Engineering , 2012, 2012 First International Workshop on Realizing AI Synergies in Software Engineering (RAISE).

[10]  Stuart Harvey Rubin,et al.  A blackboard architecture for countering terrorism , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[11]  Huey-Der Chu,et al.  A Blackboard-based Decision Support Framework for Testing Client/Server Applications , 2012, 2012 Third World Congress on Software Engineering.

[12]  Bharti Suri,et al.  Analyzing test case selection & prioritization using ACO , 2011, SOEN.

[13]  Franz Wotawa,et al.  Debugging and test case generation using constraints and mutations , 2011, 2011 Proceedings of the Ninth International Workshop on Intelligent Solutions in Embedded Systems.

[14]  Victor R. Lesser,et al.  A Retrospective View of the Hearsay-II Architecture , 1977, IJCAI.

[15]  Rodney A. Brooks,et al.  Elephants don't play chess , 1990, Robotics Auton. Syst..

[16]  Radovan R. Bulatović,et al.  Cuckoo Search algorithm: A metaheuristic approach to solving the problem of optimum synthesis of a six-bar double dwell linkage , 2013 .

[17]  Fred Glover,et al.  Tabu Search: A Tutorial , 1990 .

[18]  Kenneth Morgan,et al.  Modified cuckoo search: A new gradient free optimisation algorithm , 2011 .

[19]  Jeremy Straub,et al.  Testing automation for an intrusion detection system , 2017, 2017 IEEE AUTOTESTCON.

[20]  Kristiina Jokinen,et al.  Distributed Dialogue Management in a Blackboard Architecture , 2003 .

[21]  Praveen Ranjan Srivastava,et al.  Test Case Optimization Using Artificial Bee Colony Algorithm , 2011, ACC.

[22]  Jeremy Straub,et al.  A Characterization of the Utility of Using Artificial Intelligence to Test Two Artificial Intelligence Systems , 2013, Comput..

[23]  Paul C. Jorgensen,et al.  Software Testing: A Craftsman's Approach , 1995 .

[24]  Gilbert Laporte,et al.  A Tabu Search Heuristic for the Vehicle Routing Problem , 1991 .

[25]  Jeremy Straub Cybersecurity methodology for a multi-tier mission and its application to multiple mission paradigms , 2016, 2016 IEEE Aerospace Conference.

[26]  Kerrie L. Mengersen,et al.  A proposed validation framework for expert elicited Bayesian Networks , 2013, Expert Syst. Appl..

[27]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[28]  Rodney A. Brooks,et al.  Artificial Life and Real Robots , 1992 .

[29]  Miguel A. Redondo,et al.  Blackboard architecture to integrate components and agents in heterogeneous distributed eLearning systems: An application for learning to program , 2012, J. Syst. Softw..

[30]  Jeremy Straub A Distributed Blackboard Approach Based Upon a Boundary Node Concept , 2016, J. Intell. Robotic Syst..

[31]  Wamberto Weber Vasconcelos,et al.  Managing ontology versions with a distributed blackboard architecture , 2004, SGAI Conf..

[32]  Glenis Moore,et al.  The art of artificial intelligence , 1987 .

[33]  Hong Xu,et al.  A behaviour-based blackboard architecture for reactive and efficient task execution of an autonomous robot , 1997, Robotics Auton. Syst..

[34]  Kanad K. Biswas,et al.  Knowledge Representation in Distributed Blackboard Architecture - Some Issues , 1989, KBCS.

[35]  Ioan Salomie,et al.  A Hybrid Firefly-inspired Approach for Optimal Semantic Web Service Composition , 2011, Scalable Comput. Pract. Exp..

[36]  Alex Goodall,et al.  The guide to expert systems , 1985 .

[37]  Rodney A. Brooks,et al.  Intelligence Without Reason , 1991, IJCAI.

[38]  Victor Lesser,et al.  Organization of the Hearsay II speech understanding system , 1975 .

[39]  B. Chandrasekaran On Evaluating Artificial Intelligence Systems for Medical Diagnosis , 1983, AI Mag..

[40]  Peng Dai,et al.  Artificial Intelligence for Artificial Artificial Intelligence , 2011, AAAI.

[41]  Barbara Hayes-Roth,et al.  A Blackboard Architecture for Control , 1985, Artif. Intell..

[42]  Hamed Shah-Hosseini,et al.  Problem solving by intelligent water drops , 2007, 2007 IEEE Congress on Evolutionary Computation.

[43]  F. Glover HEURISTICS FOR INTEGER PROGRAMMING USING SURROGATE CONSTRAINTS , 1977 .

[44]  Wamberto Vasconcelos,et al.  The Ontology Versioning Manifold at its genesis: a distributed blackboard architecture for reasoning with and about ontology versions , 2004 .

[45]  Walter D. Potter,et al.  A Blackboard-Based Learning Intrusion Detection System: A New Approach , 2003, IEA/AIE.

[46]  Matthew M. Huntbach,et al.  The Art in Artificial Intelligence , 1999 .

[47]  Jonathan Schaeffer,et al.  The challenge of poker , 2002, Artif. Intell..