Analysis of the impact of a GPS spoofing attack on a UAV
The paper discusses scenarios of GPS spoofing attacks on UAVs. Three scenarios are proposed: when the attack is not carried out, when a low-intensity attack is carried out, and when an intense attack is carried out. After that, logs from the UAV are collected and the result of the attack is analyzed...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Статья |
Sprache: | English |
Veröffentlicht: |
CEUR-WS
2022
|
Schlagworte: | |
Online Zugang: | https://dspace.ncfu.ru/handle/20.500.12258/19387 |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
id |
ir-20.500.12258-19387 |
---|---|
record_format |
dspace |
spelling |
ir-20.500.12258-193872022-03-29T10:11:35Z Analysis of the impact of a GPS spoofing attack on a UAV Lapina, M. A. Лапина, М. А. Attack scenario Kalman filters Spoofing Attack GPS UAV The paper discusses scenarios of GPS spoofing attacks on UAVs. Three scenarios are proposed: when the attack is not carried out, when a low-intensity attack is carried out, and when an intense attack is carried out. After that, logs from the UAV are collected and the result of the attack is analyzed in relation to its impact on the cyber-physical parameters of the UAV. This analysis is carried out with the aim of further developing an intrusion detection and response system. It is necessary to understand which parameters change to what extent and under the influence of which attack scenario. 2022-03-29T10:11:00Z 2022-03-29T10:11:00Z 2022 Статья Basan, E., Makarevich, O., Lapina, M., Mecella, M. Analysis of the impact of a GPS spoofing attack on a UAV // CEUR Workshop Proceedings. - 2022. - Том 3094. - Стр.: 6 - 16 http://hdl.handle.net/20.500.12258/19387 en CEUR Workshop Proceedings application/pdf CEUR-WS |
institution |
СКФУ |
collection |
Репозиторий |
language |
English |
topic |
Attack scenario Kalman filters Spoofing Attack GPS UAV |
spellingShingle |
Attack scenario Kalman filters Spoofing Attack GPS UAV Lapina, M. A. Лапина, М. А. Analysis of the impact of a GPS spoofing attack on a UAV |
description |
The paper discusses scenarios of GPS spoofing attacks on UAVs. Three scenarios are proposed: when the attack is not carried out, when a low-intensity attack is carried out, and when an intense attack is carried out. After that, logs from the UAV are collected and the result of the attack is analyzed in relation to its impact on the cyber-physical parameters of the UAV. This analysis is carried out with the aim of further developing an intrusion detection and response system. It is necessary to understand which parameters change to what extent and under the influence of which attack scenario. |
format |
Статья |
author |
Lapina, M. A. Лапина, М. А. |
author_facet |
Lapina, M. A. Лапина, М. А. |
author_sort |
Lapina, M. A. |
title |
Analysis of the impact of a GPS spoofing attack on a UAV |
title_short |
Analysis of the impact of a GPS spoofing attack on a UAV |
title_full |
Analysis of the impact of a GPS spoofing attack on a UAV |
title_fullStr |
Analysis of the impact of a GPS spoofing attack on a UAV |
title_full_unstemmed |
Analysis of the impact of a GPS spoofing attack on a UAV |
title_sort |
analysis of the impact of a gps spoofing attack on a uav |
publisher |
CEUR-WS |
publishDate |
2022 |
url |
https://dspace.ncfu.ru/handle/20.500.12258/19387 |
work_keys_str_mv |
AT lapinama analysisoftheimpactofagpsspoofingattackonauav AT lapinama analysisoftheimpactofagpsspoofingattackonauav |
_version_ |
1760600158903468032 |