Multiclass Classification for Detection of GPS Spoofing and Jamming Attacks on UAVs

Authors

DOI:

https://doi.org/10.5753/jbcs.2026.5309

Keywords:

UAV, GPS, Jamming, Spoofing, Intrusion Detection System, Machine Learning

Abstract

Unmanned Aerial Vehicles (UAVs) are increasingly being employed across various domains, making them more vulnerable to a range of attacks, particularly cyber threats. These vehicles usually rely on a global navigation satellite system (GNSS), such as the Global Positioning System (GPS) satellites, for location and navigation data, which can be exploited by adversaries launching attacks using fake GPS signals. To safeguard UAVs from GPS Jamming and GPS Spoofing attacks, this paper proposes an Intrusion Detection System (IDS) that utilizes machine learning techniques for detecting and identifying such attacks. The IDS analyzes GPS signal samples representing normal operation, GPS Jamming, and three types of GPS Spoofing attacks. It relies on machine learning, with models trained and tested for binary class and multiclass classification. The binary class version aims to identify an occurrence of any attack, irrespective of type, as suggested by previous literature. However, the novelty of this work lies in the multiclass version, which enables the identification of attack types — an essential factor in determining the most effective protective measures and providing data for forensic investigations. Stacking, an ensemble machine learning method, yielded the best results, achieving an accuracy rate of 96.91%. Furthermore, the proposed multiclass IDS reduced false negatives to 0.71%, leading to an improved IDS that reduces the likelihood of overlooking attacks compared to the binary class version, which is crucial in real UAV deployments.

Downloads

Download data is not yet available.

References

Abdulganiyu, O. H., Tchakoucht, T. A., and Saheed, Y. K. (2023). A systematic literature review for network intrusion detection system (IDS). International Journal of Information Security, 22:1125–1162. DOI: 10.1007/s10207-023-00682-2.

Aissou, G. (2022). Dynamic selection techniques for detecting GPS spoofing attacks on UAVs. Available at:[link].

Aissou, G., Benouadah, S., El Alami, H., and Kaabouch, N. (2022). Instance-based supervised machine learning models for detecting GPS spoofing attacks on UAS. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pages 0208-0214. DOI: 10.1109/CCWC54503.2022.9720888.

Aissou, G., Slimane, H. O., Benouadah, S., and Kaabouch, N. (2021). Tree-based supervised machine learning models for detecting GPS spoofing attacks on UAS. In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pages 0649-0653. DOI: 10.1109/UEMCON53757.2021.9666744.

Araújo, F., Araújo, F., Alencar, D., Pinheiro, S., Oliveira, H., and Rosário, D. (2023). Dynamic video service migration in flying edge computing networks. Journal of the Brazilian Computer Society, 29(1):63–72. DOI: 10.5753/jbcs.2023.2228.

Bartsch, R., Coyne, J., and Gray, K. (2016). Drones in Society. Routledge, London, England. DOI: 10.4324/9781315409658.

Bauernfeind, R., Kraus, T., Dötterböck, D., Eissfeller, B., Loehnert, E., and Wittmann, E. (2011). Car jammers: Interference analysis. GPS World, 22:28-35. Available at:[link].

Burkov, A. (2019). The Hundred-Page Machine Learning Book. Andriy Burkov, Quebec. Book.

da Silva, D. A. M. (2017). GPS jamming and spoofing using software defined radio. Master's thesis, University Institute of Lisbon. Available at:[link].

da Silva, R. A. and da Fonseca, N. L. (2023). Location of fog nodes mounted on fixed-wing UAVs. Vehicular Communications, 41:100600. DOI: 10.1016/j.vehcom.2023.100600.

da Silva, R. A. C., da Fonseca, N. L. S., and Boutaba, R. (2021). Evaluation of the employment of UAVs as fog nodes. IEEE Wireless Communications, 28(5):20-27. DOI: 10.1109/MWC.101.2100018.

Davidovich, B., Nassi, B., and Elovici, Y. (2022). Towards the detection of GPS spoofing attacks against drones by analyzing camera's video stream. Sensors, 22(7). DOI: 10.3390/s22072608.

Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., Maglaras, L., and Khan, F. A. (2023). Internet of drones security: Taxonomies, open issues, and future directions. Vehicular Communications, 39:100552. DOI: 10.1016/j.vehcom.2022.100552.

Gasimova, A., Khoei, T. T., and Kaabouch, N. (2022). A comparative analysis of the ensemble models for detecting GPS spoofing attacks on UAVs. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pages 0310-0315. DOI: 10.1109/CCWC54503.2022.9720738.

Géron, A. (2023). Hands-On Machine Learning with ScikitLearn, Keras, and TensorFlow. O'Reilly Media, Sebastopol. Book.

Haider, Z. and Khalid, S. (2016). Survey on effective GPS spoofing countermeasures. In 2016 Sixth International Conference on Innovative Computing Technology (INTECH), pages 573-577. DOI: 10.1109/INTECH.2016.7845038.

Kerns, A. J., Shepard, D. P., Bhatti, J. A., and Humphreys, T. E. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4):617-636. DOI: 10.1002/rob.21513.

Khan, A., Gupta, S., and Gupta, S. K. (2022). Emerging UAV technology for disaster detection, mitigation, response, and preparedness. Journal of Field Robotics, 39(6):905-955. DOI: 10.1002/rob.22075.

Khoei, T. T., Aissou, G., Al Shamaileh, K., Devabhaktuni, V. K., and Kaabouch, N. (2023). Supervised deep learning models for detecting GPS spoofing attacks on unmanned aerial vehicles. In 2023 IEEE International Conference on Electro Information Technology (eIT), pages 340-346. DOI: 10.1109/eIT57321.2023.10187274.

Khoei, T. T., Gasimova, A., Ahajjam, M. A., Shamaileh, K. A., Devabhaktuni, V., and Kaabouch, N. (2022). A comparative analysis of supervised and unsupervised models for detecting GPS spoofing attack on UAVs. In 2022 IEEE International Conference on Electro Information Technology (eIT), pages 279-284. DOI: 10.1109/eIT53891.2022.9813826.

Kim, A., Wampler, B., Goppert, J., Hwang, I., and Aldridge, H. (2012). Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In Infotech@Aerospace 2012, pages 1-30. DOI: 10.2514/6.2012-2438.

Lemos, G. (2023). Original dataset. [link].

Liang, C., Miao, M., Ma, J., Yan, H., Zhang, Q., and Li, X. (2022). Detection of global positioning system spoofing attack on unmanned aerial vehicle system. Concurrency and Computation: Practice and Experience, 34(7):e5925. DOI: 10.1002/cpe.5925.

Manulis, M., Bridges, C. P., Harrison, R., Sekar, V., and Davis, A. (2021). Cyber security in new space. International Journal of Information Security, 20:287-311. DOI: 10.1007/s10207-020-00503-w.

McCarthy, S., Zheng, W., and Tsang, D. (2018). Hk 1 million in damage caused by GPS jamming that caused 46 drones to plummet during hong kong show. Available at:[link] accessed on June 2, 2023.

Misra, P. and Enge, P. (2006). Global Position System Signals, Measurement and Performance. Ganga Jamuna Press, Lincoln. Book.

Noh, J., Kwon, Y., Son, Y., Shin, H., Kim, D., Choi, J., and Kim, Y. (2019). Tractor beam: Safe-hijacking of consumer drones with adaptive gps spoofing. ACM Trans. Priv. Secur., 22(2). DOI: 10.1145/3309735.

Omolara, A. E., Alawida, M., and Abiodun, O. I. (2023). Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey. Neural Computing and Applications, 35:23063–23101. DOI: 10.1007/s00521-023-08857-7.

Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Édouard Duchesnay (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12(85):2825-2830. DOI: 10.48550/arxiv.1201.0490.

Prasad, S. V. R. V. and Khilar, P. M. (2024). SVM-SFL based malicious UAV detection in wireless sensor networks. Concurrency and Computation: Practice and Experience, 36(13):e8049. DOI: 10.1002/cpe.8049.

Ranyal, E. and Jain, K. (2021). Unmanned aerial vehicle’s vulnerability to GPS spoofing a review. Indian Society of Remote Sensing, 49:585–591. DOI: 10.1007/s12524-020-01225-1.

Scikit-learn (2007-2025). 1. Supervised learning. [link] (Accessed on May 4, 2025).

Talaei Khoei, T., Ismail, S., and Kaabouch, N. (2022). Dynamic selection techniques for detecting GPS spoofing attacks on UAVs. Sensors, 22(2). DOI: 10.3390/s22020662.

Talaei Khoei, T., Ismail, S., Shamaileh, K. A., Devabhaktuni, V. K., and Kaabouch, N. (2023). Impact of dataset and model parameters on machine learning performance for the detection of GPS spoofing attacks on unmanned aerial vehicles. Applied Sciences, 13(1). DOI: 10.3390/app13010383.

Van den Bergh, B. and Pollin, S. (2019). Keeping UAVs under control during GPS jamming. IEEE Systems Journal, 13(2):2010-2021. DOI: 10.1109/JSYST.2018.2882769.

Weber, J. S., Neves, M., and Ferreto, T. (2021). VANET simulators: an updated review. Journal of the Brazilian Computer Society, 27(1):8. DOI: 10.1186/s13173-021-00113-x.

Wei, X., Wang, Y., and Sun, C. (2022). Perdet: Machine-learning-based UAV GPS spoofing detection using perception data. Remote Sensing, 14(19). DOI: 10.3390/rs14194925.

Whelan, J., Almehmadi, A., and El-Khatib, K. (2022). Artificial intelligence for intrusion detection systems in unmanned aerial vehicles. Computers and Electrical Engineering, 99:107784. DOI: 10.1016/j.compeleceng.2022.107784.

Wolpert, D. H. (1996). The Lack of A Priori Distinctions Between Learning Algorithms. Neural Computation, 8(7):1341-1390. DOI: 10.1162/neco.1996.8.7.1341.

Yaacoub, J.-P., Noura, H., Salman, O., and Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11:100218. DOI: 10.1016/j.iot.2020.100218.

Downloads

Published

2026-03-17

How to Cite

de Lemos, G. G. R., & da Silva, R. A. C. (2026). Multiclass Classification for Detection of GPS Spoofing and Jamming Attacks on UAVs. Journal of the Brazilian Computer Society, 32(1), 374–386. https://doi.org/10.5753/jbcs.2026.5309

Issue

Section

Regular Issue