Anomaly Detection for the MIL-STD-1553B Multiplex Data Bus Using an LSTM Autoencoder

被引:0
作者
Harlow, Alec [1 ]
Lachine, Brian [1 ]
Roberge, Vincent [1 ]
机构
[1] Royal Mil Coll Canada, Kingston, ON, Canada
来源
PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY, ICCWS 2024 | 2024年 / 19卷
关键词
MIL-STD-1553B; Anomaly Detection; Deep Learning; LSTM Autoencoder; Aviation Cybersecurity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the modernization of commercial and military aircraft, real-time systems and their connectivity to ground based networks, including the Internet, that were thought to be "air-gapped", are becoming more susceptible to cyber-attack. Most real-time systems that communicate using the Military Standard 1553B Multiplex data bus (MIL-STD-1553B) protocol do not have the ability to detect cyber-attacks. These systems were originally developed with safety and redundancy in mind, not security. These two factors introduce attack vectors to MIL-STD-1553B communication buses and expose associated avionics systems to exploitation. Recent approaches to anomaly detection for the MIL-STD-1553B data bus have leveraged statistical analysis, Markov Chain modelling, remote terminal fingerprinting and signature-based detection. However, their comparative effectiveness is unknown. Regarding the statistical analysis technique, the lack of accuracy and precision in detecting the start and stop time of anomalous events are not ideal for conducting investigations due to the sheer volume of messages still required to be manually analysed. Deep learning techniques offer an effective means of anomaly detection and applying these techniques to the MIL-STD-1553B data bus could provide more accurate and precise detection times when anomalies or attacks are present, when compared to known statistical analysis, leading to more efficient forensic investigations of anomalous events. The aim of this research is to improve the time-related performance metrics when detecting attacks on the MIL-STD-1553B data bus traffic using a Long Short-Term Memory (LSTM) autoencoder. In order to accomplish this aim, an LSTM autoencoder detector was developed and tested on two separate datasets from different MIL-STD-1553B network architectures, totalling 15 threat instances over 5 scenarios. The detector was then compared to the MIL-STD-1553B Anomaly-Based Intrusion Detection System (MAIDENS) detector, a statistical-based intrusion detection system. The LSTM autoencoder detected every threat instance with no false positive or false negative results and significantly improved the time-related performance metrics when compared to the MAIDENS detector. The results demonstrated this deep learning technique as an effective method for identifying anomalies on a MIL-STD-1553B data bus and significantly reducing the overall number of frames to be analysed during the investigation of identified anomalies.
引用
收藏
页码:103 / 111
页数:9
相关论文
共 13 条
[1]  
[Anonymous], 1998, MIL-STD-1553 Designer's Guide
[2]   MAIDENS: MIL-STD-1553 Anomaly-Based Intrusion Detection System Using Time-Based Histogram Comparison [J].
Genereux, Sebastien J. J. ;
Lai, Alvin K. H. ;
Fowles, Craig O. ;
Roberge, Vincent R. ;
Vigeant, Guillaume P. M. ;
Paquet, Jeremy R. .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2020, 56 (01) :276-284
[3]  
International Organization for Standardization, 1994, ISO 5725-1
[4]   A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus [J].
Lounis, Karim ;
Mansour, Ziad ;
Wrana, Michael ;
Elsayed, Marwa A. ;
Ding, Steven H. H. ;
Zulkernine, Mohammad .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2022, 58 (06) :5586-5606
[5]  
Mahmoud M., 2022, 2022 INT TEL C ITC E, P1
[6]   Unsupervised anomaly detection with LSTM autoencoders using statistical data-filtering [J].
Maleki, Sepehr ;
Maleki, Sasan ;
Jennings, Nicholas R. .
APPLIED SOFT COMPUTING, 2021, 108
[7]  
Paquet J., 2014, Uncovering MIL-STD-1553 vulnerabilities: exploitability of military aircraft networks
[8]  
Provotar Oleksandr I., 2019, 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), P513, DOI 10.1109/ATIT49449.2019.9030505
[9]  
Said Elsayed Mahmoud, 2020, Q2SWinet '20: Proceedings of the 16th Symposium on QoS and Security for Wireless and Mobile Networks, P37, DOI 10.1145/3416013.3426457
[10]  
Stan O., 2019, IEEE Trans. Aerosp. Electron. Syst., P2