UAV network intrusion detection method based on spatio-temporal graph convolutional network

被引:0
|
作者
Chen Z. [1 ]
Lyu N. [1 ]
Chen K. [1 ]
Zhang Y. [1 ]
Gao W. [1 ]
机构
[1] College of Information and Navigation, Air Force Engineering University, Xi'an
基金
中国国家自然科学基金;
关键词
Attention mechanism; Gated recursive unit; Graph convolutional network; Intrusion detection; UAV network;
D O I
10.13700/j.bh.1001-5965.2020.0095
中图分类号
学科分类号
摘要
Compared with ground networks, UAV networks have the characteristics of fast moving nodes, frequent topology changes, and unreliable communication links. Traditional intrusion detection methods are difficult to apply. Aimed at the spatio-temporal dynamic characteristics of UAV networks, an intrusion detection method: Attention-based Spatio-Temporal Graph Convolutional Network (ATGCN) is proposed, which combines graph convolutional network and gated recursive unit into spatio-temporal graph convolutional network. The spatio-temporal graph convolutional network extracts the spatio-temporal evolution characteristics of the network from complex and changeable data, attention mechanism is used to extract the features most relevant to intrusion detection, and the support vector machine is used as the last layer of the model for classification to identify network attacks. The experimental analysis of multiple datasets shows that the proposed method can adapt to the dynamics and instability of UAV networks, has higher accuracy and lower false positive rate than traditional detection methods, and has good robustness and adaptability. © 2021, Editorial Board of JBUAA. All right reserved.
引用
收藏
页码:1068 / 1076
页数:8
相关论文
共 32 条
  • [1] HE D J, DU X, QIAO Y R, Et al., A survey on cyber security of unmanned aerial vehicles, Chinese Journal of Computers, 42, 5, pp. 150-168, (2019)
  • [2] JAWHAR I, MOHAMED N, AL-JAROODI J, Et al., Communication and networking of UAV-based systems: Classification and associated architectures, Journal of Network and Computer Applications, 84, pp. 93-108, (2017)
  • [3] KUMAR N, KUMAR U., Anomaly-based network intrusion detection: An outlier detection techniques, International Conference on Soft Computing and Pattern Recognition, pp. 262-269, (2016)
  • [4] ZIMEK A, FILZMOSER P., There and back again: Outlier detection between statistical reasoning and data mining algorithms, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 8, 6, (2018)
  • [5] DIVYA K, KUMARAN N S., Survey on outlier detection techniques using categorical data, International Research Journal of Engineering and Technology, 3, 12, pp. 899-904, (2016)
  • [6] DESHMUKH M M K, KAPSE A., A survey on outlier detection technique in streaming data using data clustering approach, International Journal of Engineering and Computer Science, 5, 1, pp. 15453-15456, (2016)
  • [7] JIANG F, LIU G, DU J, Et al., Initialization of K-modes clustering using outlier detection techniques, Information Sciences, 332, pp. 167-183, (2016)
  • [8] CHEN J, SATHE S, AGGARWAL C, Et al., Outlier detection with autoencoder ensembles, Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 90-98, (2017)
  • [9] KWON D, KIM H, KIM J, Et al., A survey of deep learning-based network anomaly detection, Cluster Computing, 22, pp. 949-961, (2019)
  • [10] ZONG B, SONG Q, MIN M R, Et al., Deep autoencoding Gaussian mixture model for unsupervised anomaly detection, ICLR, pp. 1-19, (2018)