cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

MiTM attacks on unmanned military vehicles

Hi All

 

A couple of Australian University's have thought up an AI algorithm to detect MiTM attacks on unmanned military vehicles.

 

https://www.bleepingcomputer.com/news/security/ai-algorithm-detects-mitm-attacks-on-unmanned-militar...

 

This could be a good item to have in your back pocket.

 

Regards

 

Caute_Cautim

2 Replies
JoePete
Advocate I

It seems to me the researchers efforts would be better directed toward securing the communication rather than developing an AI tool to guess when that communication is malicious. We've had decent PKI systems since the mid-1990s. It shouldn't be a heavy lift to ensure that communication with unmanned vehicles has mutual authentication, confidentiality, integrity, and non-repudiation. I'm actually aghast that perhaps these things aren't being done already.

 

While it's glossed over in the story, the researchers indicated a false positive of 2%. Think about that. You have a drone about to carry out a strike, and the instructions come to abort. One out of every 50 missions, though, this algorithm might ignore the command, interpreting it as malicious. 

If you want better military command and control in the civilized world, simple: have every government adopt a law that the vanguard of any attack must include the president, czar, minister, congress people, representatives, etc. that voted to take that action. But continuing to distance those individuals from the consequences of their decisions by clouding the picture with more technology is a bad idea.

Caute_cautim
Community Champion

@JoePete    Yes, with the recent conflict the difference between a hospital and a legitimate target.

 

The other issues, lets hope when the Quantum Safe revolution hits they are ready to update the Post Quantum Cryptography as well, or current cryptographic algorithms will be redundant in many ways.

 

But if the PKI certificates issues are based on IoT devices embedded within the system, it will be interesting to see whether they thought about the renewal, revocation or replacement of the existing algorithms too.

 

Regards

 

Caute_Cautim