Detection of DDoS Attacks in UAV Communication Networks Using Machine Learning Models

Gregorius Airlangga(1*),

(1) Universitas Katolik Indonesia Atma Jaya, Indonesia
(*) Corresponding Author

Abstract


The increasing adoption of unmanned aerial vehicle (UAV) communication networks has introduced new cybersecurity challenges, particularly in detecting and mitigating distributed denial-of-service (DDoS) attacks. This study evaluates the effectiveness of multiple machine learning models, including Random Forest, Gradient Boosting, XGBoost, Logistic Regression, and Support Vector Machine (SVM), for DDoS attack detection in UAV networks. The dataset, derived from a simulated UAV communication network, incorporates key network parameters such as signal strength, packet loss rate, round-trip time, and base station load. Data preprocessing steps, including feature selection, normalization, and synthetic minority over-sampling (SMOTE), were applied to enhance model performance. Among the evaluated models, Random Forest demonstrated the highest classification accuracy with an F1-score of 0.839 and an AUC score of 0.912, outperforming other models in precision-recall trade-offs. Gradient Boosting and XGBoost exhibited moderate classification ability, whereas Logistic Regression and SVM struggled with capturing complex network patterns. The results highlight the effectiveness of ensemble learning in intrusion detection for UAV networks. This study provides valuable insights into optimizing machine learning-based intrusion detection systems and paves the way for further advancements in UAV cybersecurity. Future work will focus on integrating additional feature engineering techniques and validating models on real-time network traffic datasets.


Full Text:

PDF

References


S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif, and M. A. Khan, “Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends,” Intell. Serv. Robot., vol. 16, no. 1, pp. 109–137, 2023.

M. K. Banafaa et al., “A comprehensive survey on 5G-and-beyond networks with UAVs: Applications, emerging technologies, regulatory aspects, research trends and challenges,” IEEE access, vol. 12, pp. 7786–7826, 2024.

A. Khan, S. Gupta, and S. K. Gupta, “Emerging UAV technology for disaster detection, mitigation, response, and preparedness,” J. F. Robot., vol. 39, no. 6, pp. 905–955, 2022.

M. A. O. Rabah, H. Drid, Y. Medjadba, and M. Rahouti, “Detection and Mitigation of Distributed Denial of Service Attacks Using Ensemble Learning and Honeypots in a Novel SDN-UAV Network Architecture,” IEEE Access, 2024.

Z. Wang et al., “A survey on cybersecurity attacks and defenses for unmanned aerial systems,” J. Syst. Archit., vol. 138, p. 102870, 2023.

Z. Yu, Z. Wang, J. Yu, D. Liu, H. H. Song, and Z. Li, “Cybersecurity of unmanned aerial vehicles: A survey,” IEEE Aerosp. Electron. Syst. Mag., vol. 39, no. 9, pp. 182–215, 2023.

O. Ceviz, S. Sen, and P. Sadioglu, “A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions,” IEEE Commun. Surv. & Tutorials, 2024.

J. Greer IV, “MITRE Attack framework adaptation in UAV usage during surveillance and reconnaissance missions,” 2024.

C. Abdulrazak, “Cybersecurity Threat Analysis And Attack Simulations For Unmanned Aerial Vehicle Networks,” arXiv Prepr. arXiv2404.16842, 2024.

R. Shrestha, A. Omidkar, S. A. Roudi, R. Abbas, and S. Kim, “Machine-learning-enabled intrusion detection system for cellular connected UAV networks,” Electronics, vol. 10, no. 13, p. 1549, 2021.

V. Hassija et al., “Fast, reliable, and secure drone communication: A comprehensive survey,” IEEE Commun. Surv. & Tutorials, vol. 23, no. 4, pp. 2802–2832, 2021.

X. Wang et al., “A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures,” ACM Comput. Surv., vol. 57, no. 3, pp. 1–37, 2024.

N. Malik, H. Sinha, and M. Dahiya, “Security in UAV ecosystem: An implementation perspective,” Sigma J. Eng. Nat. Sci., vol. 42, no. 6, pp. 1986–1994, 2024.

H. A. Khan, H. Khan, S. Ghafoor, and M. A. Khan, “A Survey on Security of Automatic Dependent Surveillance-Broadcast (ADS-B) Protocol: Challenges, Potential Solutions and Future Directions,” IEEE Commun. Surv. & Tutorials, 2024.

A. Aldweesh, A. Derhab, and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Syst., vol. 189, p. 105124, 2020.

H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” Appl. Sci., vol. 9, no. 20, p. 4396, 2019.

J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A. Wahab, “A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions,” Electronics, vol. 9, no. 7, p. 1177, 2020.

D. Engineer, “Drone Communication and Network Anomaly Detection Dataset.” 2024




DOI: http://dx.doi.org/10.30645/jurasik.v10i1.882

DOI (PDF): http://dx.doi.org/10.30645/jurasik.v10i1.882.g857

Refbacks

  • There are currently no refbacks.



JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan : View My Stats