SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast

被引:6
作者
Cevik, Nursah [1 ,2 ]
Akleylek, Sedat [3 ,4 ]
机构
[1] HAVELSAN, TR-06510 Ankara, Turkiye
[2] Ondokuz Mayis Univ, Dept Comp Engn, TR-55139 Samsun, Turkiye
[3] Istinye Univ, Dept Comp Engn, TR-34010 Istanbul, Turkiye
[4] Univ Tartu, Inst Comp Sci, Tartu, Estonia
关键词
Deep learning; Aircraft; Anomaly detection; Surveys; Intrusion detection; Databases; Computer security; Machine learning; ADS-B; anomaly based intrusion detection system; anomaly detection system; cyber security; avionics security; deep learning; IDS; intrusion detection system; machine learning; ADS-B; TUTORIAL;
D O I
10.1109/ACCESS.2024.3369181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on the vulnerabilities of ADS-B, one of the avionics systems, and the countermeasures taken against these vulnerabilities proposed in the literature. Among the proposed countermeasures against the vulnerabilities of ADS-B, anomaly detection methods based on machine learning and deep learning algorithms were analyzed in detail. The advantages and disadvantages of using an anomaly detection system on ADS-B data are investigated. Thanks to advances in machine learning and deep learning over the last decade, it has become more appropriate to use anomaly detection systems to detect anomalies in ADS-B systems. To the best of our knowledge, this is the first survey to focus on studies using machine learning and deep learning algorithms for ADS-B security. In this context, this study addresses research on this topic from different perspectives, draws a road map for future research, and searches for five research questions related to machine learning and deep learning algorithms used in anomaly detection systems.
引用
收藏
页码:35643 / 35662
页数:20
相关论文
共 48 条
[1]  
Alrefaei A., 2022, P IEEE INT IOT EL ME, P1
[2]  
[Anonymous], 2010, Automatic Dependent Surveillance-Broadcast (ADS-B) Out PerformanceRequirements to Support Air Traffic Control (ATC) Service-Final Rule
[3]   Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature [J].
Baek, Joonsang ;
Byon, Young-ji ;
Hableel, Eman ;
Al-Qutayri, Mahmoud .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) :740-750
[4]   An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature [J].
Baek, Joonsang ;
Byon, Young-ji ;
Hableel, Eman ;
Al-Qutayri, Mahmoud .
2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, :358-363
[5]  
Bitton R, 2017, IEEE HI ASS SYS ENGR, P153, DOI 10.1109/HASE.2017.38
[6]   Holistic Air Protection Scheme of ADS-B Communication [J].
Braeken, An .
IEEE ACCESS, 2019, 7 :65251-65262
[7]  
Breiman L., 2017, CLASSIFICATION REGRE, DOI [DOI 10.1201/9781315139470, 10.1201/9781315139470]
[8]  
Breiman L., 2001, RANDOM FORESTS, V45, P5
[9]   A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[10]  
Cevik N., 2022, Cyber Security and Defence, V6