AI algorithm detects MitM attacks on unmanned military vehicles

AI algorithm detects MitM attacks on unmanned military vehicles

October 15, 2023 at 01:53PM

Researchers at the University of South Australia and Charles Sturt University have developed an algorithm using machine learning to detect man-in-the-middle (MitM) attacks on unmanned military robots. The algorithm, tested on a replica of the GVR-BOT used by the U.S. Army, achieved a 99% success rate in preventing attacks. The researchers believe the system could be applied to other robotic platforms, such as unmanned aircraft.

Summary of Meeting Notes:

Professors from the University of South Australia and Charles Sturt University have developed an algorithm to detect and intercept man-in-the-middle (MitM) attacks on unmanned military robots. MitM attacks involve intercepting data traffic between robots and their controllers to eavesdrop or manipulate the data. These attacks can disrupt robot operations and even assume control over the robots.

The researchers highlight the vulnerability of the robot operating system (ROS) due to its highly networked nature, which makes it susceptible to cyberattacks. They have developed an algorithm using machine learning techniques to quickly detect and prevent MitM attacks.

The algorithm was tested on a replica of the GVR-BOT used by the U.S. Army, achieving a 99% success rate in preventing attacks with minimal false positives. The researchers also discuss the complexity of detecting MitM attacks on crewless vehicles and robots, as these systems operate under fault-tolerant modes.

The system developed by the researchers analyzes the robot’s network traffic data, using node-based methods, packet data scrutiny, and flow-statistic-based systems to detect compromise attempts. The technical paper provides details on the deep learning CNN model used for detection, which showed high accuracy even after minimal training.

The researchers suggest that this protection system could also be applied to more demanding robotic applications, such as unmanned aircraft. They are interested in investigating the efficacy of their intrusion detection system on different robotic platforms.

Please let me know if you need any further information or if there are specific action items to address based on these meeting notes.

Full Article