Skip to main content

2019 | OriginalPaper | Buchkapitel

GRYPHON: Drone Forensics in Dataflash and Telemetry Logs

verfasst von : Evangelos Mantas, Constantinos Patsakis

Erschienen in: Advances in Information and Computer Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The continuous decrease in the price of Unmanned Aerial Vehicles (UAVs), more commonly known as drones, has pushed their adoption from military-oriented to a wide range of civilian and business applications. Nevertheless, the many features that they offer have started being maliciously exploited. The latter coupled with the fact that accidents or malicious acts may occur to drones has sparked the interest towards drones forensics.
Trying to fill in the gap of the literature, this work focuses on a particular field of drone forensics that of forensics on the flight data logs. Therefore, we investigate one of the most widely used platforms, Ardupilot and the dataflash and telemetry logs. In this work, we discuss a methodology for collecting the necessary information, analysing it, and constructing the corresponding timeline. In this regard, we have developed an open source tool that is freely available and tested it on data provided by VTO Labs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
Literatur
2.
Zurück zum Zitat Abbaspour, A., Yen, K.K., Forouzannezhad, P., Sargolzaei, A.: A neural adaptive approach for active fault-tolerant control design in UAV. IEEE Trans. Syst. Man Cybern. Syst. 99, 1–11 (2018)CrossRef Abbaspour, A., Yen, K.K., Forouzannezhad, P., Sargolzaei, A.: A neural adaptive approach for active fault-tolerant control design in UAV. IEEE Trans. Syst. Man Cybern. Syst. 99, 1–11 (2018)CrossRef
3.
Zurück zum Zitat Abbaspour, A., Yen, K.K., Noei, S., Sargolzaei, A.: Detection of fault data injection attack on UAV using adaptive neural network. Proc. Comput. Sci. 95, 193–200 (2016)CrossRef Abbaspour, A., Yen, K.K., Noei, S., Sargolzaei, A.: Detection of fault data injection attack on UAV using adaptive neural network. Proc. Comput. Sci. 95, 193–200 (2016)CrossRef
4.
Zurück zum Zitat Altawy, R., Youssef, A.M.: Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans. Cyber-Phys. Syst. 1(2), 7 (2017) Altawy, R., Youssef, A.M.: Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans. Cyber-Phys. Syst. 1(2), 7 (2017)
5.
Zurück zum Zitat Alvarez, P.: Using extended file information (EXIF) file headers in digital evidence analysis. Int. J. Digit. Evid. 2(3), 1–5 (2004) Alvarez, P.: Using extended file information (EXIF) file headers in digital evidence analysis. Int. J. Digit. Evid. 2(3), 1–5 (2004)
7.
Zurück zum Zitat Barton, T.E.A., Azhar, M.H.B.: Forensic analysis of popular UAV systems. In: 2017 Seventh International Conference on Emerging Security Technologies (EST), pp. 91–96. IEEE (2017) Barton, T.E.A., Azhar, M.H.B.: Forensic analysis of popular UAV systems. In: 2017 Seventh International Conference on Emerging Security Technologies (EST), pp. 91–96. IEEE (2017)
8.
Zurück zum Zitat Birnbaum, Z., Dolgikh, A., Skormin, V., O’Brien, E., Muller, D., Stracquodaine, C.: Unmanned aerial vehicle security using recursive parameter estimation. J. Intell. Robot. Syst. 84(1–4), 107–120 (2016)CrossRef Birnbaum, Z., Dolgikh, A., Skormin, V., O’Brien, E., Muller, D., Stracquodaine, C.: Unmanned aerial vehicle security using recursive parameter estimation. J. Intell. Robot. Syst. 84(1–4), 107–120 (2016)CrossRef
9.
Zurück zum Zitat Bouafif, H., Kamoun, F., Iqbal, F., Marrington, A.: Drone forensics: challenges and new insights. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–6. IEEE (2018) Bouafif, H., Kamoun, F., Iqbal, F., Marrington, A.: Drone forensics: challenges and new insights. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–6. IEEE (2018)
10.
Zurück zum Zitat Clark, D.R., Meffert, C., Baggili, I., Breitinger, F.: DROP (drone open source parser) your drone: forensic analysis of the DJI Phantom III. Digit. Invest. 22, S3–S14 (2017)CrossRef Clark, D.R., Meffert, C., Baggili, I., Breitinger, F.: DROP (drone open source parser) your drone: forensic analysis of the DJI Phantom III. Digit. Invest. 22, S3–S14 (2017)CrossRef
11.
Zurück zum Zitat Hartmann, K., Giles, K.: UAV exploitation: a new domain for cyber power. In: 2016 8th International Conference on Cyber Conflict (CyCon), pp. 205–221. IEEE (2016) Hartmann, K., Giles, K.: UAV exploitation: a new domain for cyber power. In: 2016 8th International Conference on Cyber Conflict (CyCon), pp. 205–221. IEEE (2016)
12.
Zurück zum Zitat Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1–23. IEEE (2013) Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1–23. IEEE (2013)
13.
Zurück zum Zitat Hooper, M., et al.: Securing commercial WiFi-based UAVs from common security attacks. In: MILCOM 2016–2016 IEEE Military Communications Conference, pp. 1213–1218. IEEE (2016) Hooper, M., et al.: Securing commercial WiFi-based UAVs from common security attacks. In: MILCOM 2016–2016 IEEE Military Communications Conference, pp. 1213–1218. IEEE (2016)
14.
Zurück zum Zitat Horsman, G.: Unmanned aerial vehicles: a preliminary analysis of forensic challenges. Digit. Invest. 16, 1–11 (2016)CrossRef Horsman, G.: Unmanned aerial vehicles: a preliminary analysis of forensic challenges. Digit. Invest. 16, 1–11 (2016)CrossRef
15.
Zurück zum Zitat Jain, U., Rogers, M., Matson, E.T.: Drone forensic framework: sensor and data identification and verification. In: 2017 IEEE Sensors Applications Symposium (SAS), pp. 1–6. IEEE (2017) Jain, U., Rogers, M., Matson, E.T.: Drone forensic framework: sensor and data identification and verification. In: 2017 IEEE Sensors Applications Symposium (SAS), pp. 1–6. IEEE (2017)
16.
Zurück zum Zitat Javaid, A.Y., Sun, W., Alam, M.: UAVSim: a simulation testbed for unmanned aerial vehicle network cyber security analysis. In: 2013 IEEE Globecom Workshops (GC Wkshps), pp. 1432–1436. IEEE (2013) Javaid, A.Y., Sun, W., Alam, M.: UAVSim: a simulation testbed for unmanned aerial vehicle network cyber security analysis. In: 2013 IEEE Globecom Workshops (GC Wkshps), pp. 1432–1436. IEEE (2013)
17.
Zurück zum Zitat Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace 2012, p. 2438 (2012) Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace 2012, p. 2438 (2012)
18.
Zurück zum Zitat Kovar, D., Dominguez, G., Murphy, C.: UAV (aka drone) forensics. Slides of a talk given at SANS DFIR summit in Austin, TX July 7 (2015) Kovar, D., Dominguez, G., Murphy, C.: UAV (aka drone) forensics. Slides of a talk given at SANS DFIR summit in Austin, TX July 7 (2015)
19.
Zurück zum Zitat Pleban, J.S., Band, R., Creutzburg, R.: Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, vol. 9030, p. 90300L. International Society for Optics and Photonics (2014) Pleban, J.S., Band, R., Creutzburg, R.: Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, vol. 9030, p. 90300L. International Society for Optics and Photonics (2014)
21.
Zurück zum Zitat Sedjelmaci, H., Senouci, S.M., Messous, M.A.: How to detect cyber-attacks in unmanned aerial vehicles network? In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2016) Sedjelmaci, H., Senouci, S.M., Messous, M.A.: How to detect cyber-attacks in unmanned aerial vehicles network? In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2016)
22.
Zurück zum Zitat Solodov, A., Williams, A., Al Hanaei, S., Goddard, B.: Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities. Secur. J. 31(1), 305–324 (2018)CrossRef Solodov, A., Williams, A., Al Hanaei, S., Goddard, B.: Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities. Secur. J. 31(1), 305–324 (2018)CrossRef
23.
Zurück zum Zitat Valente, J., Cardenas, A.A.: Understanding security threats in consumer drones through the lens of the discovery quadcopter family. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 31–36. ACM (2017) Valente, J., Cardenas, A.A.: Understanding security threats in consumer drones through the lens of the discovery quadcopter family. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 31–36. ACM (2017)
24.
Zurück zum Zitat Vattapparamban, E., Güvenç, İ., Yurekli, A.İ., Akkaya, K., Uluağaç, S.: Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In: 2016 International Wireless Communications and Mobile computing Conference (IWCMC), pp. 216–221. IEEE (2016) Vattapparamban, E., Güvenç, İ., Yurekli, A.İ., Akkaya, K., Uluağaç, S.: Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In: 2016 International Wireless Communications and Mobile computing Conference (IWCMC), pp. 216–221. IEEE (2016)
25.
Zurück zum Zitat Yaqoob, I., Hashem, I.A.T., Ahmed, A., Kazmi, S.A., Hong, C.S.: Internet of things forensics: recent advances, taxonomy, requirements, and open challenges. Future Gener. Comput. Syst. 92, 265–275 (2019)CrossRef Yaqoob, I., Hashem, I.A.T., Ahmed, A., Kazmi, S.A., Hong, C.S.: Internet of things forensics: recent advances, taxonomy, requirements, and open challenges. Future Gener. Comput. Syst. 92, 265–275 (2019)CrossRef
Metadaten
Titel
GRYPHON: Drone Forensics in Dataflash and Telemetry Logs
verfasst von
Evangelos Mantas
Constantinos Patsakis
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-26834-3_22

Premium Partner