Enhancing UAV Communication Security: Multi-Label Anomaly Detection Using Machine Learning in Imbalanced Data Environments

Gregorius Airlangga(1*), Denny Jean Cross Sihombing(2), Oskar Ika Adi Nugroho(3),

(1) Universitas Katolik Indonesia Atma Jaya, Indonesia
(2) Universitas Katolik Indonesia Atma Jaya, Indonesia
(3) National Chung Cheng University, Chiayi, Taiwan
(*) Corresponding Author

Abstract


Unmanned Aerial Vehicle (UAV) communication networks are increasingly vulnerable to cyber threats, including spoofing, jamming, malware, and distributed denial-of-service (DDoS) attacks. Effective anomaly detection is crucial to maintaining network integrity and operational security. This study evaluates multiple machines learning models, including Support Vector Machines, Logistic Regression, XGBoost, Gradient Boosting, and Random Forest, to detect anomalies in UAV communication networks. A real-world dataset containing 44,016 instances of network telemetry and security indicators was utilized, with each instance labeled for multiple potential anomalies. Experimental results reveal a significant class imbalance, where models achieve high accuracy (92%) but fail to detect minority class anomalies, yielding near-zero recall scores for critical cyber threats. The study highlights the limitations of traditional classifiers in imbalanced multi-label classification tasks and emphasizes the need for advanced techniques such as Synthetic Minority Over-sampling (SMOTE), cost-sensitive learning, and deep learning-based anomaly detection. The findings suggest that conventional machine learning approaches alone are insufficient for reliable anomaly detection in UAV networks, necessitating hybrid solutions that integrate multiple detection paradigms. Future work should explore adaptive ensemble learning methods and deep anomaly detection frameworks to improve recall and precision for rare cybersecurity threats.

Full Text:

PDF

References


A. Khan, S. Gupta, and S. K. Gupta, “Emerging UAV technology for disaster detection, mitigation, response, and preparedness,” J. F. Robot., vol. 39, no. 6, pp. 905–955, 2022.

S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif, and M. A. Khan, “Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends,” Intell. Serv. Robot., vol. 16, no. 1, pp. 109–137, 2023.

S. A. H. Mohsan, M. A. Khan, F. Noor, I. Ullah, and M. H. Alsharif, “Towards the unmanned aerial vehicles (UAVs): A comprehensive review,” Drones, vol. 6, no. 6, p. 147, 2022.

A. Munir, A. Aved, and E. Blasch, “Situational awareness: techniques, challenges, and prospects,” AI, vol. 3, no. 1, pp. 55–77, 2022.

M. N. Nafees, N. Saxena, A. Cardenas, S. Grijalva, and P. Burnap, “Smart grid cyber-physical situational awareness of complex operational technology attacks: A review,” ACM Comput. Surv., vol. 55, no. 10, pp. 1–36, 2023.

L. Ge, Y. Li, Y. Li, J. Yan, and Y. Sun, “Smart distribution network situation awareness for high-quality operation and maintenance: a brief review,” Energies, vol. 15, no. 3, p. 828, 2022.

Z. Yu, Z. Wang, J. Yu, D. Liu, H. H. Song, and Z. Li, “Cybersecurity of unmanned aerial vehicles: A survey,” IEEE Aerosp. Electron. Syst. Mag., vol. 39, no. 9, pp. 182–215, 2023.

S. I. Han, “Survey on UAV deployment and trajectory in wireless communication networks: Applications and challenges,” Information, vol. 13, no. 8, p. 389, 2022.

A. Baltaci, E. Dinc, M. Ozger, A. Alabbasi, C. Cavdar, and D. Schupke, “A survey of wireless networks for future aerial communications (FACOM),” IEEE Commun. Surv. & Tutorials, vol. 23, no. 4, pp. 2833–2884, 2021.

M. A. K. et al., “Swarm of UAVs for Network Management in 6G: A Technical Review,” IEEE Trans. Netw. Serv. Manag., vol. 20, no. 1, pp. 741–761, 2023.

Y. Bai, H. Zhao, X. Zhang, Z. Chang, R. Jäntti, and K. Yang, “Towards Autonomous Multi-UAV Wireless Network: A Survey of Reinforcement Learning-Based Approaches,” IEEE Commun. Surv. & Tutorials, 2023.

A. Rovira-Sugranes, A. Razi, F. Afghah, and J. Chakareski, “A review of AI-enabled routing protocols for UAV networks: Trends, challenges, and future outlook,” Ad Hoc Networks, vol. 130, p. 102790, 2022.

N. Nomikos, P. K. Gkonis, P. S. Bithas, and P. Trakadas, “A survey on UAV-aided maritime communications: Deployment considerations, applications, and future challenges,” IEEE Open J. Commun. Soc., vol. 4, pp. 56–78, 2022.

G. E. M. Abro, S. A. B. M. Zulkifli, R. J. Masood, V. S. Asirvadam, and A. Laouiti, “Comprehensive review of UAV detection, security, and communication advancements to prevent threats,” Drones, vol. 6, no. 10, p. 284, 2022.

R. K. Mahmood et al., “Optimizing network security with machine learning and multi-factor authentication for enhanced intrusion detection,” J. Robot. Control, vol. 5, no. 5, pp. 1502–1524, 2024.

H. Kurunathan, H. Huang, K. Li, W. Ni, and E. Hossain, “Machine learning-aided operations and communications of unmanned aerial vehicles: A contemporary survey,” IEEE Commun. Surv. & Tutorials, 2023.

Z. Azam, M. M. Islam, and M. N. Huda, “Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree,” IEEE Access, 2023.

E. El-Shafeiy, M. Alsabaan, M. I. Ibrahem, and H. Elwahsh, “Real-time anomaly detection for water quality sensor monitoring based on multivariate deep learning technique,” Sensors, vol. 23, no. 20, p. 8613, 2023.

M. Y. Alzahrani, “Enhancing Drone Security Through Multi-Sensor Anomaly Detection and Machine Learning,” SN Comput. Sci., vol. 5, no. 5, p. 651, 2024.

D. Engineer, “Drone Communication and Network Anomaly Detection Dataset.” 2024.




DOI: http://dx.doi.org/10.30645/jurasik.v10i1.883

DOI (PDF): http://dx.doi.org/10.30645/jurasik.v10i1.883.g858

Refbacks

  • There are currently no refbacks.



JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan : View My Stats