Unmanned aerial vehicle intrusion detection: Deep-meta-heuristic system

被引:2
|
作者
Miao, Shangting [1 ]
Pan, Quan [1 ]
Zheng, Dongxiao [2 ]
Mohi-ud-din, Ghulam [3 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710129, Peoples R China
[2] Luoyang Res Inst Electroopt Equipment China AVIC, Luoyang, Peoples R China
[3] Univ Florida, Coll Engn, Gainesville, FL 32611 USA
关键词
Unmanned aerial vehicle; Intrusion detection system; Bi-directional long short term memory; Deep convolutional neural network; Greedy based genetic algorithm;
D O I
10.1016/j.vehcom.2024.100726
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The UAV (Unmanned Aerial Vehicles) is an automatic aircraft, widely used several applications like emergency management, wildlife conservation, forestry, aerial photography, etc. The communication among the UAV is susceptible to security threats with several diverse attacks. The data sharing among the UAV and other vehicles is vulnerable to jamming and suspicious activities that disturbs the communication. To tackle the issue, IDS (Intrusion Detection System) is the significant system that monitors and identifies the suspicious activities in the communication network. To attain this, several conventional researchers attempted to accomplish better intrusion detection. However, classical models are limited by accuracy, noise and computation. To overcome the limitation, proposed method employs particular set of procedures for the intrusion detection in UAV with Intrusion UAV dataset. The dataset comprise of features like drone speed, height, width, velocity etc. Initially, in the respective approach, GG (Greedy based Genetic) algorithm for feature selection, which maintains the exact balance between the greediness and diversified population. Greedy approach enhances Genetic algorithm in combinatorial optimisation problems. Further, the study proposes Modified Deep CNNBiLSTM (Deep Convolutional Neural Network and Bi-Long Short Term Memory) with attention mechanism for classification of intrusion in UAV. The deep CNN is utilized for the ability of handling larger datasets and accuracy. Conversely, it is limited by computation and speed. To tackle the problem, Bi-LSTM is used for the capability of enhancing the computation and speed. Moreover, attention mechanism is used for handle the complexity and to permit the presented system to focus on the significant and relevant data. Correspondingly, proposed approach performance is calculated using performance metrics such as accuracy, specificity, sensitivity, ������2 (R -Squared), execution time, RMSE and precision. Furthermore, comparative analysis of the proposed method and classical model exposes the efficacy of the respective system.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] A modified nature-inspired meta-heuristic methodology for heterogeneous unmanned aerial vehicle system task assignment problem
    Chenchen Fan
    Song Han
    Xinbin Li
    Tao Zhang
    Yi Yuan
    Soft Computing, 2021, 25 : 14227 - 14243
  • [22] A modified nature-inspired meta-heuristic methodology for heterogeneous unmanned aerial vehicle system task assignment problem
    Fan, Chenchen
    Han, Song
    Li, Xinbin
    Zhang, Tao
    Yuan, Yi
    SOFT COMPUTING, 2021, 25 (22) : 14227 - 14243
  • [23] Implementation GStreamer framework with face detection system for Unmanned Aerial Vehicle
    Yesmagambet, N. A.
    BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2016, 82 (02): : 121 - 127
  • [24] UAVData: A dataset for unmanned aerial vehicle detection
    Yuni Zeng
    Qianwen Duan
    Xiangru Chen
    Dezhong Peng
    Yao Mao
    Ke Yang
    Soft Computing, 2021, 25 : 5385 - 5393
  • [25] Maximizing feature detection in aerial unmanned aerial vehicle datasets
    Byrne, Jonathan
    Laefer, Debra F.
    O'Keeffe, Evan
    JOURNAL OF APPLIED REMOTE SENSING, 2017, 11
  • [26] UAVData: A dataset for unmanned aerial vehicle detection
    Zeng, Yuni
    Duan, Qianwen
    Chen, Xiangru
    Peng, Dezhong
    Mao, Yao
    Yang, Ke
    SOFT COMPUTING, 2021, 25 (07) : 5385 - 5393
  • [27] Landmine detection utilizing an unmanned aerial vehicle
    Goad, Aaron
    Schorer, Daniel
    Sullenberger, Jezeree
    Yousuf, Farooq
    Yu, Amy
    2008 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2008, : 231 - 236
  • [28] A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution
    Chen, Jiangchuan
    He, Junjiang
    Li, Wenshan
    Fang, Wenbo
    Lan, Xiaolong
    Ma, Wengang
    Li, Tao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33312 - 33325
  • [29] A new unmanned aerial vehicle intrusion detection method based on belief rule base with evidential reasoning
    Xie, Yawen
    He, Wei
    Zhu, Hailong
    Yang, Ruohan
    Mu, Quanqi
    HELIYON, 2022, 8 (09)
  • [30] Realization of Detection Algorithms for Key Parts of Unmanned Aerial Vehicle Based on Deep Learning
    Wang, Guangya
    Hong, Hanyu
    Zhang, Yaozong
    Wu, Jinmeng
    Wang, Yunfei
    Li, Shiyang
    2020 12TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2020, : 137 - 142