RESEARCH OF MACHINE LEARNING METHODS FOR DETECTING SPOOFING ATTACKS IN DECENTRALIZED NETWORKS
Abstract
Unmanned aerial vehicles are appearing more and more in our lives and are used for various purposes such as cargo delivery, monitoring, household management, exploration and entertainment. But along with their growing popularity, the number of people who intentionally want to interfere with the operation of UAVs and use them for their own interests and purposes is also increasing. They use various types of attacks to eliminate or intercept the drone by any means. Spoofing attacks are one of the most common and dangerous types of attacks, as they allow attackers to act unnoticed, faking the identifiers of autonomous aircraft or operators, posing as legitimate participants in the system. The purpose of such attacks may be to intercept control, steal data, sabotage, or use UAVs to perform malicious actions such as espionage, damage, or malfunction operations. But every year it becomes more difficult to prevent attacks, as they are difficult to detect and can lead to serious consequences, which is why such a solution as detecting spoofing attacks on an unmanned vehicle using machine learning was invented. The article discusses spoofing attacks on UAVs, analyzes spoofing on autonomous aircraft, and studies machine learning methods for detecting spoofing attacks based on a dataset using the Knime platform. The results of the study demonstrate that the method of detecting attacks using machine learning based on the ensemble method, the Tree Ensemble Learner and Random Forest Learner models, which showed results of 97.110% and 97.039%, respectively, is the best among other methods, which will improve the security of unmanned aerial vehicles, reduce the burden on operators and increase the reliability of the system as a whole. In the future, the proposed approach can be expanded to detect other types of cyberattacks, which will make it a universal method of protection against intruders
References
1. Savinkova S.A. Razrabotka metoda otslezhivaniya peremeshcheniy ob"ektov [Development of a method for tracking the movement of objects], Vestnik sovremennykh issledovaniy [Bulletin of Modern Studies], 2021, No. 1-6, pp. 28-36.
2. GPS: glushilki, spufing i uyazvimosti [GPS: jammers, spoofing and vulnerabilities], SavePearlHarbor. Available at: https://savepearlharbor.com/?p=264385 (accessed 03 April 2025).
3. Eldosouky A.R., Ferdowsi A., Saad W. Drones in distress: A game-theoretic countermeasure for protect-ing UAVs against GPS spoofing, IEEE Internet of Things Journal, 2019, Vol. 7, No. 4, pp. 2840-2854
4. Khan S.Z., Mohsin M., Iqbal W. On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions, PeerJ Computer Science, 2021, Vol. 7, pp. e507.
5. Arthur M.P. Detecting signal spoofing and jamming attacks in UAV networks using a lightweight IDS, 2019 international conference on computer, information and telecommunication systems (CITS). IEEE, 2019, pp. 1-5.
6. Wesson K.D., Shepard D.P., Bhatti J.A., Humphreys T.E. An evaluation of the vestigial signal defense for civil GPS anti-spoofing, Proceedings of the 24th International Technical Meeting of the Satellite Di-vision of The institute of navigation (ION GNSS 2011), 2011, pp. 2646-2656.
7. Savinkova S.A. Razrabotka metoda otslezhivaniya peremeshcheniy ob"ektov [Development of a method for tracking the movement of objects], Vestnik sovremennykh issledovaniy [Bulletin of modern studies], 2021, No. 1-6, pp. 28-36.
8. Spufing BVSov [Spoofing of UAVs], Spufing BVSov (BVS) [Spoofing of UAVs (UAVs)]. Available at: https://protectionsystem.ru/spoofing (accessed 03 April 2025).
9. Iranskie khakery smogli poluchit' upravlenie amerikanskim BPLA i posadit' ego na svoey territorii [Ira-nian hackers were able to gain control of an American UAV and land it on their territory]. Available at: https://habr.com/ru/articles/135150/ (accessed 05 June 2025).
10. Humphreys T. Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing, University of Texas at Austin (July 18, 2012), 2012, pp. 1-16.
11. Davidovich B., Nassi B., Elovici Y. Towards the detection of GPS spoofing attacks against drones by analyzing camera’s video stream, Sensors, 2022, Vol. 22, No. 7, pp. 2608.
12. What is machine learning?, IBM. Available at: https://www.ibm.com/think/topics/machine-learning (ac-cessed 04 April 2025).
13. Drone Communication Dataset, kaggle. Available at: https://www.kaggle.com/datasets/ datasetengi-neer/drone-communication-dataset (accessed 04 April 2025).
14. Chto takoe KNIME i kak ego ispol'zovat' [What is KNIME and how to use it], Skypro. Available at: https://sky.pro/media/chto-takoe-knime-i-kak-ego-ispolzovat/ (accessed 03 April 2025).
15. Gradient Boosted Trees Learner, Knime. Available at: https://hub.knime.com/knime/extensions/ org.knime.features.ensembles/latest/org.knime.base.node.mine.treeensemble2.node.gradientboosting.learner.classification.GradientBoostingClassificationLearnerNodeFactory2 (accessed 03 April 2025).
16. Decision Tree Learner, Knime. Available at: https://hub.knime.com/knime/extensions/ org.knime.features.base/latest/org.knime.base.node.mine.decisiontree2.learner2.DecisionTreeLearnerNodeFactory3 (accessed 03 April 2025).
17. Tree Ensemble Learner, Knime. Available at: https://hub.knime.com/knime/extensions/ org.knime.features.ensembles/latest/org.knime.base.node.mine.treeensemble2.node.learner.classification.TreeEnsembleClassificationLearnerNodeFactory2 (accessed 03 April 2025).
18. Random Forest Learner, Knime. Available at: https://hub.knime.com/knime/extensions/ org.knime.features.ensembles/latest/org.knime.base.node.mine.treeensemble2.node.randomforest.learner.classification.RandomForestClassificationLearnerNodeFactory2 (accessed 03 April 2025).
19. K Nearest Neighbor, Knime. Available at: https://hub.knime.com/knime/extensions/org.knime.features.base/ lat-est/org.knime.base.node.mine.knn.KnnNodeFactory2 (accessed 03 April 2025).
20. Zul M.I., Yulia F., Nurmalasari D. Social media sentiment analysis using K-means and naïve bayes algorithm, 2018 2nd International conference on electrical engineering and informatics (ICon EEI). IEEE, 2018, pp. 24-29.








