=Paper=
{{Paper
|id=Vol-2899/paper007
|storemode=property
|title=Method for detecting vulnerabilities of unmanned vehicle interfaces based on continuous values discretization
|pdfUrl=https://ceur-ws.org/Vol-2899/paper007.pdf
|volume=Vol-2899
|authors=Dmitriy Moiseev,Alexey Bryukhovetskiy
}}
==Method for detecting vulnerabilities of unmanned vehicle interfaces based on continuous values discretization==
Method for detecting vulnerabilities of unmanned vehicle interfaces based on continuous values discretization Dmitriy Moiseev1 and Alexey Bryukhovetskiy1 1 Sevastopol state university, 33 Universitetskaya str., Sevastopol, 299053, Russia Abstract An approach related to the development of methods for ensuring the safety of unmanned vehicles in the smart city information infrastructure is proposed. The method is based on the continuous values discretization of the state vector's features of UMV resources, which include: communication channel, processor, memory. For each of these resources, it is proposed to evaluate the change in such characteristics as the degree of resource load and the speed of its change. The proposed method allows you to build a system of rules for the membership of the analyzed vectors to the specified classes and minimize the conditions number in the generated rules. The problem of ensuring the unmanned vehicles information security operating in the intelligent networks of the smart city transport infrastructure does not lose its relevance due to the fact that modern networks face an unprecedented range of computer threats that lead to a violation of the integrity, confidentiality and availability of resources. Keywords 1 UMV resources, vulnerability detection, continuous values discretization, intelligent technology 1. Introduction The basis of this article is the material, obtained in the research laboratory of "Intelligent Information Systems and Critical Computing" at the Department of "Information Technologies and Computer Systems" of Sevastopol State University within the framework of the RFBR grants (grant No. 19-29- 06015 "Adaptive neural network methods for detecting vulnerabilities in the interfaces of unmanned vehicles based on artificial immune systems" and grant No. 19-29-06023 "Methods of structural synthesis of information exchange channels between an unmanned vehicle and a dispatch center based on stochastic analysis). vector programming with probabilistic criteria"), in which the authors of this article were co-executors. The experience gained so far in setting problems of describing and analyzing vulnerabilities of information systems of various classes is mostly associated with the analysis of vulnerabilities that directly affect a certain function of information systems, but the problem of integrating systems and nesting components give rise to a high degree of variability of solutions and parametric uncertainties of various types. In the monograph, based on the analysis of the state of the problem, the main vulnerable elements of UMV information systems are considered; the functional-complete set of models for evaluating the effectiveness of the protection of UMV information systems is defined; the approach to variant analysis and selection of vulnerable components based on expert assessments and fuzzy sets is further developed. The problem of ensuring the unmanned vehicles information security operating in the intelligent networks of the smart city transport infrastructure does not lose its relevance due to the fact that modern III International Workshop on Modeling, Information Processing and Computing (MIP: Computing-2021), May 28, 2021, Krasnoyarsk, Russia EMAIL: dmitriymoiseev@mail.com (Dmitriy Moiseev); a.alexir@mail.ru (Alexey Bryukhovetskiy) ORCID: 0000-0002-3141-1529 (Dmitriy Moiseev); 0000-0002-2612-2968 (Alexey Bryukhovetskiy) © 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 43 networks face an unprecedented range of computer threats that lead to a violation of the integrity, confidentiality and availability of resources. To date, there are a large number of methods for detecting vulnerabilities in UMV interfaces, which quite effectively perform detailed researches of the UMV resources information state and search for intrusions sources. The heterogeneity of applications and wireless communications in the smart city infrastructure significantly complicates the facilities security [1]. Therefore, the development and implementation of approaches to the creation of information technologies that ensure the security of the smart city critical information infrastructure are relevant and of scientific and practical interest. The need to solve this problem is associated with significant changes in the field of applied digital technologies in Vanet networks, which use technologies implemented using interfaces: vehicle-to-vehicle, vehicle-to-infrastructure, vehicle-to-pedestrian, vehicle-to-grid, vehicle-to-device [2]. In the works [2, 3] the applied methods and solutions in intelligent transport networks are considered in order to ensure the safety of the UMV operation. The paper presents the classification of attacks on UMV and means of ensuring information security in Vanet networks. The requirements for the UMV architecture and data exchange between smart city infrastructure objects are defined. The creation of management systems for such tools implies the need to study methods and approaches related not only to the conceptual organization of such systems architecture, but also to their software implementation. When developing software, special attention is paid to ensuring UMV security. For autonomous driving of a vehicle, it is necessary to systematically update its software. Upgrading over a wireless network can bring many benefits to both consumers and manufacturers (Figure 1:). Figure 1: xr Types of main BTS interfaces The authors of the article also obtained some results in the works, the solution of problems of intrusion detection in computer networks based on the assessment of changes in the network traffic state using statistical criteria, nonparametric statistics methods [4], multi-agent model of UMV information interaction [5], mechanisms adaptation of artificial immune systems to control the parameters of UMV resources state[6], anomalies detection using Markov sequences [7], and also on the concept development of an intelligent monitoring system for solving large-scale tasks in cloud computing environments [8] The problem of information security is multifaceted, costly and knowledge-intensive. The search for effective solutions to ensure information security leads to the need to create new structural elements in systems and networks. Their main purpose is to determine the presence of an attack. Timely detection of an attack leads to a reduction in the latent period of its action, minimizes the amount of damage caused, as well as the costs associated with subsequent reengineering. 44 2. Problem statement In this article, we propose a method for detecting vulnerabilities in UMV interfaces based on continuous values discretization. Discretization is a technology for separating continuous attribute values in a finite set of adjacent intervals in order to obtain a set of attribute values belonging to a single class [9,10]. One of the main features of the proposed approach is to build a system of rules for determining the ownership of a feature vector describing UMV resources state, containing the minimum number of conditions to be checked. Given a training data set Х, containing m objects xj (j=1, m) each of which belongs to a single class Ck (k=1, s). Each xj is an l-dimensional feature vector describing the state of system resources in the UMV-dispatch center channel at time t. System resources include: data link, memory, and processor. We will assume that the UMV can be in one of three states: normal, precritical, critical. The permissible limits of state changes ranges are set on the interval [0;1], Ck є [0;1]. We will use metrics as resource characteristics: D – loading a resource (M-memory, Ch- channel capacity, Pr-processor), V – the rate of decrease in the volume of the resource. Thus, the vector xj is represented by a attributes tuple xj = (DM, DCh, DPr, VM,VCh,VPr ,t | Ck ) We need to find a discretization scheme that will establish a relationship between the impact of attacks and the system resources states that are subject to change under external influence. 3. Method description We will assume that values range of each attribute xr is represented on n discrete intervals, each of which is represented by a values pair: {[z0, z1], (z1, z2], . . . , (zn-1, zn]}, where z0 – minimum value, zn – maximum attribute value xr for any r (0=< r< n), zr