Proceedings of the ACM Workshop on Wireless Security and Machine Learning 2019
DOI: 10.1145/3324921.3328791
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Drones Status via Encrypted Traffic Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 13 publications
0
16
0
2
Order By: Relevance
“…• Classifiers. We considered the Random Forest algorithm, being the best among those we tried (see [16] for more details).…”
Section: Methodsmentioning
confidence: 99%
“…• Classifiers. We considered the Random Forest algorithm, being the best among those we tried (see [16] for more details).…”
Section: Methodsmentioning
confidence: 99%
“…The electromagnetic watermarking concept was introduced by [33] as a technique that exploits the IEMI impacts for embedding a watermark into civilian UAVs to perform forensic tracking. A small sample of aircraft accident investigators, digital forensics investigators and examined the use of a forensics framework to conduct forensics on a drone [34]. The data analyses that were carried out with the use of the chi-square test of independence did not reveal any considerable connection between the groups of respondents' drone investigations and the methods used to conduct UAS forensics.…”
Section: Phase 2: Reviewing the Current Literaturementioning
confidence: 97%
“…Forensic analysis: Has been a subject of disputes among researchers, where researchers have in many instances explored diverse dimensions in the quest of assessing the security measures, attacks and the countermeasures, and to understand how to prevent such activities [1,27,30,[34][35][36][37]40]. Notably, relevant research has focused on the techniques that can be used to analyze the compromised devices such as [1,2,17,[19][20][21]23,26,28,[36][37][38][39].…”
mentioning
confidence: 99%
“…Overall, the STFT-SVM model succeeded in achieving the best performance, as SVM shows improved classification performance in binary tasks with reduced training resources compared to CNN. The current flying status (i.e., whether it is flying or it is static on the ground) of a powered-on UAV that is remotely controlled by a malicious operator was detected in real-time in Reference [96] by eavesdropping the communication traffic exchanged between the UAV and its controller and by applying classification algorithms. In particular, the Weka platform [97] was adopted that contains various standard ML algorithms for data mining tasks.…”
Section: Position Related Aspectsmentioning
confidence: 99%