=Paper= {{Paper |id=Vol-2899/paper007 |storemode=property |title=Method for detecting vulnerabilities of unmanned vehicle interfaces based on continuous values discretization |pdfUrl=https://ceur-ws.org/Vol-2899/paper007.pdf |volume=Vol-2899 |authors=Dmitriy Moiseev,Alexey Bryukhovetskiy }} ==Method for detecting vulnerabilities of unmanned vehicle interfaces based on continuous values discretization== https://ceur-ws.org/Vol-2899/paper007.pdf
Method for detecting vulnerabilities of unmanned vehicle
interfaces based on continuous values discretization
Dmitriy Moiseev1 and Alexey Bryukhovetskiy1
1
    Sevastopol state university, 33 Universitetskaya str., Sevastopol, 299053, Russia


                 Abstract
                 An approach related to the development of methods for ensuring the safety of unmanned
                 vehicles in the smart city information infrastructure is proposed. The method is based on the
                 continuous values discretization of the state vector's features of UMV resources, which
                 include: communication channel, processor, memory. For each of these resources, it is
                 proposed to evaluate the change in such characteristics as the degree of resource load and the
                 speed of its change. The proposed method allows you to build a system of rules for the
                 membership of the analyzed vectors to the specified classes and minimize the conditions
                 number in the generated rules. The problem of ensuring the unmanned vehicles information
                 security operating in the intelligent networks of the smart city transport infrastructure does not
                 lose its relevance due to the fact that modern networks face an unprecedented range of
                 computer threats that lead to a violation of the integrity, confidentiality and availability of
                 resources.

                 Keywords 1
                 UMV resources, vulnerability detection, continuous values discretization, intelligent
                 technology

1. Introduction

    The basis of this article is the material, obtained in the research laboratory of "Intelligent Information
Systems and Critical Computing" at the Department of "Information Technologies and Computer
Systems" of Sevastopol State University within the framework of the RFBR grants (grant No. 19-29-
06015 "Adaptive neural network methods for detecting vulnerabilities in the interfaces of unmanned
vehicles based on artificial immune systems" and grant No. 19-29-06023 "Methods of structural
synthesis of information exchange channels between an unmanned vehicle and a dispatch center based
on stochastic analysis). vector programming with probabilistic criteria"), in which the authors of this
article were co-executors.
    The experience gained so far in setting problems of describing and analyzing vulnerabilities of
information systems of various classes is mostly associated with the analysis of vulnerabilities that
directly affect a certain function of information systems, but the problem of integrating systems and
nesting components give rise to a high degree of variability of solutions and parametric uncertainties of
various types. In the monograph, based on the analysis of the state of the problem, the main vulnerable
elements of UMV information systems are considered; the functional-complete set of models for
evaluating the effectiveness of the protection of UMV information systems is defined; the approach to
variant analysis and selection of vulnerable components based on expert assessments and fuzzy sets is
further developed.
    The problem of ensuring the unmanned vehicles information security operating in the intelligent
networks of the smart city transport infrastructure does not lose its relevance due to the fact that modern

III International Workshop on Modeling, Information Processing and Computing (MIP: Computing-2021), May 28, 2021, Krasnoyarsk,
Russia
EMAIL: dmitriymoiseev@mail.com (Dmitriy Moiseev); a.alexir@mail.ru (Alexey Bryukhovetskiy)
ORCID: 0000-0002-3141-1529 (Dmitriy Moiseev); 0000-0002-2612-2968 (Alexey Bryukhovetskiy)
              © 2021 Copyright for this paper by its authors.
              Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
              CEUR Workshop Proceedings (CEUR-WS.org)



                                                                                    43
networks face an unprecedented range of computer threats that lead to a violation of the integrity,
confidentiality and availability of resources. To date, there are a large number of methods for detecting
vulnerabilities in UMV interfaces, which quite effectively perform detailed researches of the UMV
resources information state and search for intrusions sources. The heterogeneity of applications and
wireless communications in the smart city infrastructure significantly complicates the facilities security
[1]. Therefore, the development and implementation of approaches to the creation of information
technologies that ensure the security of the smart city critical information infrastructure are relevant
and of scientific and practical interest. The need to solve this problem is associated with significant
changes in the field of applied digital technologies in Vanet networks, which use technologies
implemented using interfaces: vehicle-to-vehicle, vehicle-to-infrastructure, vehicle-to-pedestrian,
vehicle-to-grid, vehicle-to-device [2].
    In the works [2, 3] the applied methods and solutions in intelligent transport networks are considered
in order to ensure the safety of the UMV operation. The paper presents the classification of attacks on
UMV and means of ensuring information security in Vanet networks. The requirements for the UMV
architecture and data exchange between smart city infrastructure objects are defined. The creation of
management systems for such tools implies the need to study methods and approaches related not only
to the conceptual organization of such systems architecture, but also to their software implementation.
When developing software, special attention is paid to ensuring UMV security. For autonomous driving
of a vehicle, it is necessary to systematically update its software. Upgrading over a wireless network
can bring many benefits to both consumers and manufacturers (Figure 1:).




Figure 1: xr Types of main BTS interfaces

    The authors of the article also obtained some results in the works, the solution of problems of
intrusion detection in computer networks based on the assessment of changes in the network traffic
state using statistical criteria, nonparametric statistics methods [4], multi-agent model of UMV
information interaction [5], mechanisms adaptation of artificial immune systems to control the
parameters of UMV resources state[6], anomalies detection using Markov sequences [7], and also on
the concept development of an intelligent monitoring system for solving large-scale tasks in cloud
computing environments [8]
    The problem of information security is multifaceted, costly and knowledge-intensive. The search
for effective solutions to ensure information security leads to the need to create new structural elements
in systems and networks. Their main purpose is to determine the presence of an attack. Timely detection
of an attack leads to a reduction in the latent period of its action, minimizes the amount of damage
caused, as well as the costs associated with subsequent reengineering.

                                                     44
2. Problem statement

    In this article, we propose a method for detecting vulnerabilities in UMV interfaces based on
continuous values discretization. Discretization is a technology for separating continuous attribute
values in a finite set of adjacent intervals in order to obtain a set of attribute values belonging to a single
class [9,10]. One of the main features of the proposed approach is to build a system of rules for
determining the ownership of a feature vector describing UMV resources state, containing the minimum
number of conditions to be checked.
    Given a training data set Х, containing m objects xj (j=1, m) each of which belongs to a single class
Ck (k=1, s). Each xj is an l-dimensional feature vector describing the state of system resources in the
UMV-dispatch center channel at time t. System resources include: data link, memory, and processor.
We will assume that the UMV can be in one of three states: normal, precritical, critical. The permissible
limits of state changes ranges are set on the interval [0;1], Ck є [0;1]. We will use metrics as resource
characteristics:
        D – loading a resource (M-memory, Ch- channel capacity, Pr-processor),
        V – the rate of decrease in the volume of the resource.
    Thus, the vector xj is represented by a attributes tuple
                                      xj = (DM, DCh, DPr, VM,VCh,VPr ,t | Ck )
    We need to find a discretization scheme that will establish a relationship between the impact of
attacks and the system resources states that are subject to change under external influence.

3. Method description

  We will assume that values range of each attribute xr is represented on n discrete intervals, each of
which is represented by a values pair:
                                     {[z0, z1], (z1, z2], . . . , (zn-1, zn]},

where z0 – minimum value, zn – maximum attribute value xr for any r (0=< r< n), zr