Design, Development and Implementation of a Network Intrusion Detection Tool for Air Traffic Management Systems

被引:0
作者
de Riberolles, Theobald [1 ]
机构
[1] Activus Serv, Toulouse, France
来源
2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W) | 2018年
关键词
Anomaly detection; intrusion; IDS; ATM;
D O I
10.1109/DSN-W.2018.00044
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An Air Traffic Management (ATM) relies on a set of critical systems composed of control centers, sensors, communication means and radio navigation systems. These critical systems may be subject to different attacks and thus compromise their security. Indeed as there is a desire to open this system more and more outward and there is a gap between this world and the interconnected world, threats are increasing. The ATM system have particular characteristics as the fact that it is a very distributed system with a lot of real-time applications using proprietary and/or legacy protocols. Thus, the need to have an efficient Intrusion Detection System (IDS) is primordial in terms of reliability (a false negative rate as low as possible) and relevance (a lowest possible false-positive rate). The development of an IDS combining misuse detection (i.e., defining attack scenarios and finding traces of these scenarios in the traffic.) and anomaly detection ( i.e., the construction of a reference model of the behavior of the supervised entity to which we will be able to compare the observed behavior) based on wavelet theory is a promising approach as they are already shown for this type of systems. The detection capability for such complex system could be enhanced using the specific characteristics of its exchanges, use them to enrich its normal signature and reduce the probability of false positive and false negatives. This paper describes the context and the state of the art of the current research direction of the authors with the aim to present the challenges and the future works that the student aims to perform in the next years.
引用
收藏
页码:96 / 99
页数:4
相关论文
共 19 条
[1]  
Abry P., 1998, Journal of Time Series Analysis, V19, P253, DOI DOI 10.1111/1467-9892.00090
[2]  
Ahmad Subutai, 2016, ARXIV160702480
[3]  
AMAND M., 2011, ETUDE SYSTEME DETECT
[4]  
Balachander K., 2003, P 3 ACM SIGCOMM C IN, P234
[5]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[6]   Seven Years and One Day: Sketching the Evolution of Internet Traffic [J].
Borgnat, Pierre ;
Dewaele, Guillaume ;
Fukuda, Kensuke ;
Abry, Patrice ;
Cho, Kenjiro .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :711-+
[7]   Anomaly Extraction in Backbone Networks Using Association Rules [J].
Brauckhoff, Daniela ;
Dimitropoulos, Xenofontas ;
Wagner, Arno ;
Salamatian, Kave .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) :1788-1799
[8]  
Condomines J.-P., 2018, AEROCONF 2018 39 IEE
[9]  
Fontugne R, 2011, APPL COMPUT REV, V11, P41
[10]   Outlier Detection for Temporal Data: A Survey [J].
Gupta, Manish ;
Gao, Jing ;
Aggarwal, Charu C. ;
Han, Jiawei .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (09) :2250-2267