CYBER SECURITY FOR AVIATION OPERATIONS
DR ELENA SITNIKOVA, PHD, BE (HONS), CSSLP, SFHEA
CRITICAL INFRASTRUCTURE PROTECTION, RESEARCH LEADER THE SPITFIRE MEMORIAL DEFENCE FELLOW UNSW CANBERRA @ ADFA
E.SITNIKOVA@ADFA.EDU.AU
CYBER SECURITY FOR AVIATION OPERATIONS DR ELENA SITNIKOVA, PHD, BE - - PowerPoint PPT Presentation
CYBER SECURITY FOR AVIATION OPERATIONS DR ELENA SITNIKOVA, PHD, BE (HONS), CSSLP, SFHEA CRITICAL INFRASTRUCTURE PROTECTION, RESEARCH LEADER THE SPITFIRE MEMORIAL DEFENCE FELLOW UNSW CANBERRA @ ADFA E.SITNIKOVA@ADFA.EDU.AU BACKGROUND
CRITICAL INFRASTRUCTURE PROTECTION, RESEARCH LEADER THE SPITFIRE MEMORIAL DEFENCE FELLOW UNSW CANBERRA @ ADFA
E.SITNIKOVA@ADFA.EDU.AU
BACKGROUND TECHNOLOGICAL ADVANCEMENTS: OPPORTUNITIES AND CHALLENGES NEED FOR CYBERSECURITY FOR AVIATION OPERATIONS SPITFIRE DEFENCE MEMORIAL FELLOWSHIP – 2019 PROJECT FUTURE RESEARCH INITIATIVES Q/A
physical systems, IIoT
The typical commercial UAV is a remote- controlled aircraft with an off the shelf flight computer capable of autonomous
sensor payload. It is an inexpensive airframe running an inexpensive computer that is designed carry low cost, low power, high fidelity sensors to collect data for real time and post processing. The most important growth of UAVs will not be in hardware, it will be in software and data analysis, development of innovate AI-enabled cyber defences for protecting UAV’s hardware and software.
The Loyal Wingman The MQ-25 Stingray
MQ-9 Reaper [Predator B]
civilian sectors, has been accompanied by an increase in sophisticated malicious activities.
communications
“common-sense” security measures)
discovered
reestablish the link.
sensor data.
hijacked.
controllers independent of the data link
parameters
aviation operations and related confidentiality-integrity- availability (CIA-triad) issues across the Australian Defence Force. It addresses the following question:
* Supported by the Spitfire Defence Memorial Association's Fellowship grant to lead this research project ( PS39150)
Fog computing to decrease computational resources at the network edges Fog computing to decrease computational resources at the network edges Cloud computing paradigm to store data collected Cloud computing paradigm to store data collected Flight control Position control Velocity control Attitude control Sensors Approaches and models Serial commuincation
Network Communication Network Communication Network Communication Network Communication
UAV
Human Machine Interface (HMI)/API
P r
e d f r a m e w
k
Network Communication
Physical-digital Anomaly detection framework
Onion, and UAV system. The aim: a hacker collects information about systems such as open services and protocols, types of operating systems, and weaknesses. Then, the hacker uses other exploits to breach the open the vulnerabilities of systems, such as using DoS and DDoS to corrupt services.
it from moving and corrupt its control unit. We used Metasploit and Scapy platforms installed at the Kali to exploit the systems of the UAV, Security Onion and Ubuntu server. Once we launched the hacking activities, there was a floodof traffic targeting the systems of the testbed, with superfluous requests to overload systems and prevent them from executing any normal action.
the targeted systems (i.e., the UAV system, Security Onion, and Ubuntu server) by sending massive flooding traffic from several zombie
Kali Linux using the Metasploit framework to exploit the entire testbed network of the UAV system for corrupting its legitimate operations such as movement and flying.
Ostinato tool is a packet generator and network traffic generator that has a graphic user interface that supports the process of normal operation such as generating TCP traffic in a predefined range of IP addresses and protocols with the subnet of the testbed network. We simulated different network protocol cases either ethernet or WIFI traffic to mimic a real UAV system network.
used the Argus tool to generate network header information such as source and destination IP addresses. The Argus tool was configured to log the network packets in the MySQL database.
hacking machine), otherwise we considered the record to be normal.
discovering attacking events.
Perceptron, Naïve Bayes and Support Vector Machine, using Python scripts.
(70%) and testing set (30%) to determine their performance of discovering attack events from the UAV’s network.
metrics are also provided, to better depict the performance of the classifiers.
Performance Metrics Decision Tree K-Nearest Neighbors Multi-Layer Perceptron Naïve Bayes Support Vector Machine Accuracy 0.999908 0.999822 0.999876 0.39924 0.990265 Precision 0.99995 0.999887 0.999887 0.999986 0.998316 Recall 0.99995 0.999921 0.99998 0.354525 0.991212 Fall-out 0.0006584 0.001514 0.001514 6.584e-05 0.022451 F1 Score 0.9999509 0.999904 0.999933 0.523466 0.994751 train time 3462784600 ns (3.462 sec) 1017190047800 ns (1017.19 sec) 52587907100 ns (52.59 sec) 309061500 ns (0.3 sec) 104948771600 ns (104.945 sec) testing time 28006400 ns (0.028 sec) 137822227100 ns (137.82 sec) 496112000 ns (0.5 sec) 138031500 ns (0.14 sec) 13002200 ns (0.013 sec)
from the UAV’s networks.
detection accuracy and false alarm rates were established.
and related confidentiality-integrity-availability (CIA-triad) issues across the Australian Defence Force, while providing guidance on how, to identify malicious attacks, through anomaly detection, in ways that will make mission-critical systems resilient to cyber-attacks.
is an assessment of the resilience of a system from cyber attacks. It can be applied to a range of software and hardware elements (such as standalone software, code deployed on an internet site, the browser itself, military mission-critical systems, commercial equipment, or IoT devices)
mission critical systems, Military Communications and Information Systems Conference (MilCIS) IEEE Stream , Nov 2019
deep learning for Internet of Things networks: A particle deep framework , Future Generation Computer Systems.
East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer-Video