Syed Golam Abid

Work place: Department of Computer Science and Engineering, Faculty of science and technology, American International University-Bangladesh (AIUB), Dhaka, Bangladesh

E-mail: sg.abid@hotmail.com

Website:

Research Interests: Network Security

Biography

Syed Golam Abid completed his Bachelor of Science in Computer Science and Engineering from American International University – Bangladesh (AIUB). He has done his major in Computer Engineering covering Operating Systems, Computer Network and Network Security. Now, he is currently pursuing his Master of Science in Cyber Security at Bangladesh University of Professionals (BUP). Besides, he is also currently working as a Security Operations Center (SOC) Analyst at GenNext Technologies Limited and also as one the Security Infrastructure Architects of Meghna Cloud. Furthermore, his research interest is in Cybersecurity, Information, Network and IoT Security.

Author Articles
Comparative Analysis of Threat Detection Techniques in Drone Networks

By Syed Golam Abid Muntezar Rabbani Arpita Sarker Tasfiq Ahmed Rafi Dip Nandi

DOI: https://doi.org/10.5815/ijmsc.2024.02.04, Pub. Date: 8 Jun. 2024

With the rapid proliferation of drones and drone networks across various application domains, ensuring their security against cyber threats has become imperative. This paper presents a comprehensive analysis and comparative analysis of the state-of-the-art techniques for detecting cyber threats in drone networks. The background provides a primer on drones, networks, drone network architectures, communication mechanisms, and enabling technologies like wireless protocols, satellite navigation, onboard computers, sensors, and flight control systems. The landscape of emerging technologies including blockchain, software-defined networking, machine learning, fog computing, ad-hoc networks, and swarm intelligence is reviewed in the context of transforming drone network capabilities while also introducing potential vulnerabilities. The paper delves into common cyber threats faced by drone networks such as hacking, DoS attacks, data breaches, and GPS spoofing. A detailed literature review of proposed threat detection techniques is provided, categorized into machine learning, multi-agent systems, blockchain, intrusion detection systems, software solutions, and miscellaneous methods. A key gap identified is handling increasingly sophisticated attacks, complex environments, and resource limitations in aerial platforms. The analysis highlights accuracy, overhead and real-time trade-offs between techniques, while factors like model optimization can influence efficacy. A comparative analysis highlights the advantages and limitations of each approach considering metrics like accuracy, scalability, flexibility, and overhead. Key observations include the trade-offs between computational complexity and real-time performance, the challenges in handling evolving attack techniques, and the dependencies between detection accuracy and factors like model selection and training data quality. The analysis provides a comprehensive reference for cyber threat detection in drone networks, benefiting researchers and practitioners aiming to advance this crucial area of drone security through robust detection systems tailored for resource-constrained aerial environments.

[...] Read more.
Other Articles