Unmanned aerial vehicle intrusion detection and countermeasures
First Claim
1. An apparatus, comprising:
- a radio receiver coupled to at least one antenna and configured to detect radio signals communicated between a remote control unit and a remote-controlled vehicle;
a feature extractor comprising at least one processor configured to extract signal features from detected radio signals;
a classifier comprising at least one processor coupled to a classification database and configured to classify the detected radio signals based on the signal features and determine whether the detected radio signals correspond to a known or unknown radio protocol;
a threat analyzer comprising at least one processor configured to determine if a detected remote-controlled vehicle is a threat based on at least one of remote-sensing data and classification of the detected radio signals; and
a mitigation engine comprising at least one processor configured to synthesize an exploit for a remote-control system that employs an unknown radio protocol based on corresponding extracted signal features.
5 Assignments
0 Petitions
Accused Products
Abstract
A system detects unmanned aerial vehicles (UAVs) and deploys electronic countermeasures against one or more UAVs that are determined to be a threat. A signal detector detects radio signals communicated between a remote control unit and UAV. A feature extractor extracts signal features from the detected radio signals, and a classifier processes the detected radio signals based on its signal features and determines whether the detected radio signals correspond to a known or unknown radio protocol. A threat analyzer determines if a detected UAV is a threat based on at least one of remote-sensing data and classification(s) of the detected radio signals. When a UAV system employs an unknown radio protocol, a mitigation engine synthesizes an exploit based on corresponding extracted signal features. A response analyzer detects a response from the UAV system when an exploit is activated and may adapt the exploit based on the response. In some cases, the exploits can be configured against a UAV in autopilot mode.
94 Citations
22 Claims
-
1. An apparatus, comprising:
-
a radio receiver coupled to at least one antenna and configured to detect radio signals communicated between a remote control unit and a remote-controlled vehicle; a feature extractor comprising at least one processor configured to extract signal features from detected radio signals; a classifier comprising at least one processor coupled to a classification database and configured to classify the detected radio signals based on the signal features and determine whether the detected radio signals correspond to a known or unknown radio protocol; a threat analyzer comprising at least one processor configured to determine if a detected remote-controlled vehicle is a threat based on at least one of remote-sensing data and classification of the detected radio signals; and a mitigation engine comprising at least one processor configured to synthesize an exploit for a remote-control system that employs an unknown radio protocol based on corresponding extracted signal features. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable storage medium including processor-executable code for storing instructions operable to:
-
detect radio signals communicated between a remote control unit and a remote-controlled vehicle; extract signal features from detected radio signals; classify the detected radio signals based on the signal features and determine whether the detected radio signals correspond to a known or unknown radio protocol; determine if a detected remote-controlled vehicle is a threat based on at least one of remote-sensing data and classification of the detected radio signals; and synthesize an exploit for a remote-control system that employs an unknown radio protocol based on corresponding extracted signal features. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
detecting radio signals communicated between a remote control unit and a remote-controlled vehicle; extracting signal features from detected radio signals; classifying the detected radio signals based on the signal features to determine whether the detected radio signals correspond to a known or unknown radio protocol; determining if a detected remote-controlled vehicle is a threat based on at least one of remote-sensing data and classification of the detected radio signals; and synthesizing an exploit for a remote-control system that employs an unknown radio protocol based on the signal features. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification