Comparison of Machine Learning Based Anomaly Detection Methods for ADS-B System

被引:0
作者
Cevik, Nursah [1 ,2 ]
Akleylek, Sedat [3 ,4 ]
机构
[1] HAVELSAN, Ankara, Turkiye
[2] Ondokuz Mayis Univ, Computat Sci, Samsun, Turkiye
[3] Univ Tartu, Inst Comp Sci, Tartu, Estonia
[4] Istinye Univ, Dept Comp Engn, Istanbul, Turkiye
来源
INFORMATION TECHNOLOGIES AND THEIR APPLICATIONS, PT II, ITTA 2024 | 2025年 / 2226卷
关键词
ADS-B; Anomaly Detection System; Intrusion Detection System; IDS; Machine Learning; Avionics Security; Cyber Security;
D O I
10.1007/978-3-031-73420-5_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces an anomaly/intrusion detection system utilizing machine learning techniques for detecting attacks in the Automatic Detection System-Broadcast (ADS-B). Real ADS-B messages between Turkiye's coordinates are collected to train and test machine learning models. After data collection and pre-processing steps, the authors generate the attack datasets by using real ADS-B data to simulate two attack scenarios, which are constant velocity increase/decrease and gradually velocity increase or decrease attacks. The efficacy of fivemachine learning algorithms, including decision trees, extra trees, gaussian naive bayes, k-nearest neighbors, and logistic regression, is evaluated across different attack types. This paper demonstrates that tree-based algorithms consistently exhibit superior performance across a spectrum of attack scenarios. Moreover, the research underscores the significance of anomaly or intrusion detection mechanisms for ADS-B systems, highlights the practical viability of employing tree-based algorithms in air traffic management, and suggests avenues for enhancing safety protocols and mitigating potential risks in the airspace domain.
引用
收藏
页码:275 / 286
页数:12
相关论文
共 26 条
[1]  
[Anonymous], 2010, Automatic Dependent Surveillance Broadcast (ADSB) Out Performance Requirements To Support Air Traffic Control (ATC) Service
[2]   How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption [J].
Baek, Joonsang ;
Hableel, Eman ;
Byon, Young-Ji ;
Wong, Duncan S. ;
Jang, Kitae ;
Yeo, Hwasoo .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (03) :690-700
[3]  
Cevik N., 2022, Cyber Security in Aviation Systems Nobel Academic
[4]   Deep Learning for Large-Scale Real-World ACARS and ADS-B Radio Signal Classification [J].
Chen, Shichuan ;
Zheng, Shilian ;
Yang, Lifeng ;
Yang, Xiaoniu .
IEEE ACCESS, 2019, 7 :89256-89264
[5]   CAE: Contextual auto-encoder for multivariate time-series anomaly detection in air transportation [J].
Chevrot, Antoine ;
Vernotte, Alexandre ;
Legeard, Bruno .
COMPUTERS & SECURITY, 2022, 116
[6]   A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast [J].
Clay, Christian ;
Khan, Mohammad ;
Bajracharya, Biju .
2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, :933-938
[7]  
Feng Z., 2010, P 27 INT COUNC AER S, P1
[8]   Facing airborne attacks on ADS-B data with autoencoders [J].
Fried, Asaf ;
Last, Mark .
COMPUTERS & SECURITY, 2021, 109
[9]   Analyzing Sequences of Airspace States to Detect Anomalous Traffic Conditions [J].
Habler, Edan ;
Shabtai, Asaf .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2022, 58 (03) :1843-1857
[10]   Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages [J].
Habler, Edan ;
Shabtai, Asaf .
COMPUTERS & SECURITY, 2018, 78 :155-173