Analyzing Sequences of Airspace States to Detect Anomalous Traffic Conditions

被引:8
作者
Habler, Edan [1 ]
Shabtai, Asaf [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Software Informat Syst Engn, IL-84105 Beer Sheva, Israel
基金
欧盟地平线“2020”;
关键词
Aircraft; Air traffic control; Aerospace electronics; Atmospheric modeling; Protocols; Sensors; Security; Automatic dependent surveillance-broadcast (ADS-B); anomaly detection; long short-term memory (LSTM); explainability; ATTACKS; SURVEILLANCE; SECURITY; RISK;
D O I
10.1109/TAES.2021.3124199
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The ADS-B system serves as a replacement for the current radar-based air traffic control systems. Although much effort and resources have been invested in designing and developing the ADS-B system, it is well known for its lack of security mechanisms. Previously suggested approaches for securing the ADS-B system are considered impractical because of the cost and time involved in modifying the system, and given the fact that it is already deployed in most aircraft and ground stations worldwide. In this article, we propose a software-based security solution for detecting anomalous traffic conditions, which does not require any modification of the current system architecture or the addition of external sensors. In order to identify nonlegitimate ADS-B messages, our approach utilizes a stacked-LSTM encoder-decoder model that learns the flight patterns of aircraft in a monitored aerial region. We evaluated our model against common attack patterns injected into six datasets containing real ADS-B data, and we compared our proposed model with commonly used online, unsupervised models. The results of the experiments showed that our method is able to accurately and efficiently detect all of the injected attacks. Moreover, we examined our model's performance on a real flight that deviated from its planned route and confirmed that our method was capable of accurately detecting the anomaly.
引用
收藏
页码:1843 / 1857
页数:15
相关论文
共 56 条
  • [1] Antwarg L., ARXIV190302407
  • [2] A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers
    Bitton, Ron
    Shabtai, Asaf
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1164 - 1181
  • [3] Blythe W., 2011, ASIA PACIFIC OCEAN, P1
  • [4] Brownlee J., 2019, Machine learning mastery., V6
  • [5] Chen MC, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATICS, MANAGEMENT ENGINEERING AND INDUSTRIAL APPLICATION (IMEIA 2016), P1, DOI 10.1109/PLASMA.2016.7534032
  • [6] Combining LSTM Network Ensemble via Adaptive Weighting for Improved Time Series Forecasting
    Choi, Jae Young
    Lee, Bumshik
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [7] Costin A, 2012, P BLACK HAT LAS VEG, P1
  • [8] Towards Security-Optimized Placement of ADS-B Sensors
    Darabseh, Ala'
    Popper, Christina
    [J]. PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 39 - 44
  • [9] Feng Z., 2010, PROC 27 INT C AERONA, P1
  • [10] Enhancing the security of aircraft surveillance in the next generation air traffic control system
    Finke, Cindy
    Butts, Jonathan
    Mills, Robert
    Grimaila, Michael
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (01) : 3 - 11