Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages

被引:82
作者
Habler, Edan [1 ]
Shabtai, Asaf [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, IL-8410501 Beer Sheva, Israel
关键词
ADS-B; Security; LSTM; Anomaly detection; Aviation;
D O I
10.1016/j.cose.2018.07.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the ADS-B system is expected to play a major role in the safe navigation of airplanes and air traffic control (ATC) management, it is also well known for its lack of security mechanisms. Previous research has proposed various methods for improving the security of the ADS-B system and mitigating associated risks. However, these solutions typically require the use of additional participating nodes or sensors (e.g., to verify the location of the airplane by analyzing the physical signal) or modification of the current protocol architecture (e.g., adding encryption or authentication mechanisms). Due to the regulation process regarding avionic systems and the fact that the ADS-B system is already deployed in most airplanes, applying such modifications to the current protocol at this stage is impractical. In this paper we propose an alternative security solution for detecting anomalous ADS-B messages, which is aimed at the detection of spoofed or manipulated ADS-B messages sent by an attacker or compromised airplane. The proposed approach utilizes an LSTM encoder-decoder algorithm for modeling flight routes by analyzing sequences of legitimate ADS-B messages. Using these models, aircraft can autonomously evaluate ADS-B messages received and identify deviations from the legitimate flight path (i.e., anomalies). We examined our approach on thirteen different flight route datasets into which we injected different types of anomalies. In addition, we compared our proposed method with five commonly used anomaly detection algorithms: GMM-HMM, DBSTREAM, one class SVM, LOF and Isolation Forest. Our experiments show that by using our approach, we were able to detect all of the injected attacks with an average false alarm rate of 4.5%. Moreover, in all cases, the performance of the LSTM encoder-decoder algorithm outperformed the other algorithms. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:155 / 173
页数:19
相关论文
共 29 条
[1]  
[Anonymous], 2017, IEEE Trans. Big Data
[2]  
Bär A, 2014, IEEE INT CONF BIG DA, P165, DOI 10.1109/BigData.2014.7004227
[3]  
Bitton R, 2017, IEEE HI ASS SYS ENGR, P153, DOI 10.1109/HASE.2017.38
[4]  
Blythe W., 2011, ADS B IMPLEMENTATION
[5]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[6]  
Chen YQ, 2001, IEEE IMAGE PROC, P34, DOI 10.1109/ICIP.2001.958946
[7]  
Costin A., 2012, Ghost in the air(traffic): On insecurity of ADS-B protocol and practical attacks on ADS- B devices
[8]  
Feng Z, P 27 INT C AER SCI I
[9]   Enhancing the security of aircraft surveillance in the next generation air traffic control system [J].
Finke, Cindy ;
Butts, Jonathan ;
Mills, Robert ;
Grimaila, Michael .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (01) :3-11
[10]  
Ghose N, 2015, P DIG AV SYST C DASC