Israeli Cyber Researchers Develop Method to Pinpoint Malicious Drone Operators

0
48
"Sea of Tears" drone, which can hold and drop tear gas canisters on rioters, is used by the IDF at Ayosh junction near Bet El and Ramallah, during a 'Palestinian day of rage', planned by the Fatah movement in response to United States' declaration on Israeli settlements. Bet El, Nov 26, 2019. Photo by Kobi Richter / TPS

Researchers at Ben-Gurion University of the Negev (BGU) have developed a method to pinpoint the location of a drone operator who may be operating maliciously near airports or protected airspace by analyzing the flight path of the drone, providing a solution for a new and emerging threat.

Drones, small unmanned aerial systems, pose significant security risks due to their agility, accessibility and low cost. There is a growing need to develop methods for detection, localization and mitigation of malicious and other harmful aircraft operations.

“Currently, drone operators are located using Radio Frequency (RF) and require sensors around the flight area which can then be triangulated,” says lead researcher Eliyahu Mashhadi, a BGU computer science student. “This is challenging due to the amount of other WiFi, Bluetooth and IoT signals in the air that obstruct drone signals.”

The researchers trained a deep neural network (DNN) to predict the location of drone operators, using only the path of the drones, which does not require additional sensors.

“Our system can now identify patterns in the drone’s route when the drone is in motion, and use it to locate the drone operator,” Mashhadi says.

When tested in simulated drone paths, the model was able to predict the operator location with 78% accuracy. The next step in the project would be to repeat this experiment with data captured from real drones.

“Now that we know we can identify the drone operator location, it would be interesting to explore what additional data can be extracted from this information,” said Dr. Yossi Oren, a senior lecturer in BGU’s Department of Software and Information Systems Engineering and head of the Implementation Security and Side-Channel Attacks Lab, who also contributed to the research.

“Possible insights would include the technical experience level and even precise identity of the drone operator,” he added.

(TPS).

Leave a Reply