2019 15th International Wireless Communications &Amp; Mobile Computing Conference (IWCMC) 2019
DOI: 10.1109/iwcmc.2019.8766538
|View full text |Cite
|
Sign up to set email alerts
|

Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…Last but not least, a recent work by Salamh et al [156] suggests an enhanced model of Drone Forensics, as well as an Incident Response plan (DFIR), covering storage mechanisms used by three different types of drones: DJI Phanthom 4 Pro; Typhoon H; and DJI Mavic Pro. The scholars in [156], pointed out that when it comes to digital forensics investigation, the metadata inside the media files represent valuable evidence material. Furthermore, the work discusses drone disrupted denial of service attacks (3DOS), along with some possible anti-forensics techniques that could be implemented to alter digital evidence associated with drones.…”
Section: ) Blockchain-based Investigation Frameworkmentioning
confidence: 99%
“…Last but not least, a recent work by Salamh et al [156] suggests an enhanced model of Drone Forensics, as well as an Incident Response plan (DFIR), covering storage mechanisms used by three different types of drones: DJI Phanthom 4 Pro; Typhoon H; and DJI Mavic Pro. The scholars in [156], pointed out that when it comes to digital forensics investigation, the metadata inside the media files represent valuable evidence material. Furthermore, the work discusses drone disrupted denial of service attacks (3DOS), along with some possible anti-forensics techniques that could be implemented to alter digital evidence associated with drones.…”
Section: ) Blockchain-based Investigation Frameworkmentioning
confidence: 99%
“…In [14], machine learning algorithms are utilized as well as taxonomy-ladder of IoT-based-security systems, which include identification, wireless networking, data collection is briefly studied. In [15], DoS attacks for UAVs are proposed through GPS tracking investigation of data using log files [15]. Wireless vision (Wi-Vi) sensors are put in service for self-controlled flying vehicles, which can be used to rescue or detection of intruders even if there is very thick wall of security [16].…”
Section: Literature Surveymentioning
confidence: 99%
“…Researchers in [19] also claim that the process of UAV forensic investigations is unclear due to the complexity of data flow and UAS architecture. While there has been a fair amount of recent work in the area of UAV forensic investigations [20,21], challenges related to drone forensics are still ongoing. One major factor is system architecture, related software components, and data flow mechanisms.…”
Section: Literature Reviewmentioning
confidence: 99%