UAV Cyber Resilience Assessment Method: Combining IMECA, Penetration Testing and State-space Markov Modeling

Authors

  • Artem Abakumov
  • Vyacheslav Kharchenko
  • Yurii Ponochovnyi

Keywords:

UAV, Cyber Resilience, State-Space Markov Modeling, IMECA, Penetration Testing

Abstract

The objective of this paper is to develop and justify a combined method for assessing the Cyber Resilience (CR) of Unmanned Aerial Vehicles (UAVs) under cyber attacks. The proposed approach, formalized in IDEF0 notation, integrates analytical IMECA-analysis and experimental Penetration Testing (PT) procedures with State-Space Markov Modeling (SSMM). This combination overcomes the limitations of static risk assessment methods by creating a closed cycle of system verification and protection. Based on the constructed SSMM, a sensitivity analysis was performed to identify key parameters. The study reveals that the system's response speed is the most critical factor for UAVs’ CR. It was established that an increase in operational recovery time leads to a 31.2% drop in the availability coefficient and nearly doubles the risk of compromise (+87.5%). Conversely, increasing the probability of successful recovery provides a significant increase in the probability of mission success (by 83.6%). Furthermore, the hypothesis regarding the effectiveness of frequent PT was refuted: changing the inspection interval showed a minor impact on availability (<2%), whereas excessive duration of PT procedures reduced system availability by 51.0%. These findings demonstrate the inefficiency of excessively long and frequent checks and suggest that the strategy should concentrate on the speed and automation of PT procedures rather than their frequency. Future research will focus on developing a multi-fragment SSMM to integrate PT processes with a UAV simulator and analyze the impact of combined intrusion modes.

References

F. Tlili, L. C. Fourati, S. Ayed, and B. Ouni, “Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures,” Ad Hoc Networks, vol. 129, p. 102805, 2022. https://doi.org/10.1016/j.adhoc.2022.102805.

S. J. Freedberg Jr., “Dumb and cheap: When facing electronic warfare in Ukraine, small drones’ quantity is quality,” BreakingDefense.com, 2023. [Online]. Available at: https://breakingdefense.com/2023/06/dumb-and-cheap-when-facing-electronic-warfare-in-ukraine-small-drones-quantity-is-quality/.

K. Hartmann and K. Giles, “UAV exploitation: A new domain for cyber power,” Proceedings of the 2016 8th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 2016, pp. 205–221. https://doi.org/10.1109/CYCON.2016.7529436.

J.-P. Yaacoub, H. Noura, O. Salman, and A. Chehab, “Security analysis of drones systems: Attacks, limitations, and recommendations,” Internet of Things, vol. 11, p. 100218, 2020. https://doi.org/10.1016/j.iot.2020.100218.

The New Geopolitics Research Network, “Ukrainian Drones vs Russian Jamming,” NewGeopolitics.org, 2024. [Online]. Available at: https://www.newgeopolitics.org/2024/06/10/ukrainian-drones-vs-russian-jamming/.

Royal United Services Institute for Defence and Security Studies, “Meatgrinder: Russian Tactics in the Second Year of Its Invasion of Ukraine,” RUSI, 2023. [Online]. Available at: https://static.rusi.org/403-SR-Russian-Tactics-web-final.pdf.

Mezha, “DJI Mavic 3 was discontinued: What will happen next and are there Ukrainian analogues,” Mezha.ua, 2023. [Online]. Available at: https://oboronka.mezha.ua/en/dji-mavic-3-znyali-z-virobnictva-shcho-bude-dali-ta-chi-ye-ukrajinski-analogi-302336/. (in Ukrainian)

Y. Mekdad et al., “A survey on security and privacy issues of UAVs,” Computer Networks, vol. 224, no. 109626, 2023. https://doi.org/10.1016/j.comnet.2023.109626DOI: 10.1016/j.comnet.2023.109626.

H. Dui, C. Zhang, G. Bai, and L. Chen, “Mission reliability modeling of UAV swarm and its structure optimization based on importance measure,” Reliability Engineering & System Safety, vol. 215, p. 107879, 2021. https://doi.org/10.1016/j.ress.2021.107879.

E. Zaitseva et al., “Comparative reliability analysis of unmanned aerial vehicle swarm based on mathematical models of binary-state and multi-state systems,” Electronics, vol. 13, no. 22, p. 4509, 2024. https://doi.org/10.3390/electronics13224509.

I. Kliushnikov, “Assessment of the safety of using unmanned aerial vehicles using Markov models,” Systems of Arms and Military Equipment, no. 4(76), pp. 51–57, 2023. https://doi.org/10.30748/soivt.2023.76.05.

V. Moskalenko, A. Korobov, and Y. Moskalenko, “Object detection with affordable robustness for UAV aerial imagery: model and providing method,” Radioelectronic and Computer Systems, no. 3, pp. 55–66, 2024. https://doi.org/10.32620/reks.2024.3.04.

Y. Feng, W. Xu, Z. Zhang, and F. Wang, “Continuous hidden Markov model based spectrum sensing with estimated SNR for cognitive UAV networks,” Sensors, vol. 22, no. 7, p. 2620, 2022. https://doi.org/10.3390/s22072620.

V. Kharchenko, I. Kliushnikov, A. Rucinski, H. Fesenko, and O. Illiashenko, “UAV fleet as a dependable service for smart cities: Model-based assessment and application,” Smart Cities, vol. 5, no. 3, pp. 1151–1178, 2022. https://doi.org/10.3390/smartcities5030058.

Z. Yu, Z. Wang, J. Yu, D. Liu, H. H. Song, and Z. Li, “Cybersecurity of unmanned aerial vehicles: A survey,” IEEE Aerospace and Electronic Systems Magazine, vol. 39, no. 9, pp. 182–215, 2024. https://doi.org/10.1109/MAES.2023.3318226.

P.-Y. Kong, “A survey of cyberattack countermeasures for unmanned aerial vehicles,” IEEE Access, vol. 9, pp. 148244–148263, 2021. https://doi.org/10.1109/ACCESS.2021.3124996.

H. Zemlianko and V. Kharchenko, “Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique,” Radioelectronic and Computer Systems, no. 4, pp. 152–170, 2023. https://doi.org/10.32620/reks.2023.4.11.

B. Branco, J. S. Silva, and M. Correia, “D3S: A drone security scoring system,” Information, vol. 15, no. 12, p. 811, 2024. https://doi.org/10.3390/info15120811.

M. Ficco, D. Granata, F. Palmieri, and M. Rak, “A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles,” Internet of Things, vol. 26, p. 101180, 2024. https://doi.org/10.1016/j.iot.2024.101180.

C. S. Veerappan, P. L. K. Keong, V. Balachandran, and M. S. B. M. Fadilah, “DRAT: A penetration testing framework for drones,” Proceedings of the 2021 IEEE 16th Conference on Industrial Electronics and Applications (ICIEA), Chengdu, China, 2021, pp. 498–503. https://doi.org/10.1109/ICIEA51954.2021.9516363.

A. Abakumov and V. Kharchenko, “Combining experimental and analytical methods for penetration testing of AI-powered robotic systems,” Proceedings of the 7th Int. Conf. on Computational Linguistics and Intelligent Systems (COLINS 2023), Kharkiv, Ukraine, 2023, vol. 3403, pp. 470–481. [Online]. Available: https://ceur-ws.org/Vol-3403/paper40.pdf.

A. Zimba, “A Bayesian attack-network modeling approach to mitigating malware-based banking cyberattacks,” International Journal of Computer Network and Information Security (IJCNIS), Vol.14, No.1, pp.25-39, 2022. https://doi.org/10.5815/ijcnis.2022.01.03.

T. Almutiri, F. Nadeem, “Markov models applications in natural language processing: A survey,” International Journal of Information Technology and Computer Science (IJITCS), vol. 14, no. 2, pp. 1-16, 2022. https://doi.org/10.5815/ijitcs.2022.02.01.

M. Kozlovska and A. Piskozub, “Hybridizing large language models and Markov processes: A new paradigm for autonomous penetration testing,” Automatic Control and Programming Systems, vol. 10, no. 2, pp. 146–150, 2025. https://doi.org/10.23939/acps2025.02.146.

R. Ross et al., “Systems security engineering: Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems,” National Institute of Standards and Technology, Gaithersburg, MD, NIST Special Publication (SP) 800-160 Vol. 2 Rev. 1, 2021. https://doi.org/10.6028/NIST.SP.800-160v2r1.

V. Salauyou, “Description styles of fault-tolerant finite state machines for unmanned aerial vehicles,” Radioelectronic and Computer Systems, no. 1, pp. 196–206, 2024. https://doi.org/10.32620/reks.2024.1.15.

O. Fedorovich, D. Krytskyi, M. Lukhanin, O. Prokhorov, and Y. Leshchenko, “Modeling of strike drone missions for conducting wave attacks in conditions of enemy anti-drone actions,” Radioelectronic and Computer Systems, no. 1, pp. 29–43, 2025. https://doi.org/10.32620/reks.2025.1.02.

P. Artemiou, L. Moysis, I. Kafetzis, N. G. Bardis, M. Lawnik, and C. Volos, “Chaotic agent navigation: Achieving uniform exploration through area segmentation,” Proceedings of the 2022 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, 2022, pp. 1–7. https://doi.org/10.1109/DESSERT58054.2022.10018663.

Downloads

Published

2026-01-01

How to Cite

Abakumov, A., Kharchenko, V., & Ponochovnyi, Y. (2026). UAV Cyber Resilience Assessment Method: Combining IMECA, Penetration Testing and State-space Markov Modeling. International Journal of Computing, 24(4), 790-801. Retrieved from https://www.computingonline.net/computing/article/view/4346

Issue

Section

Articles