ADS-B spoofing attack detection method based on LSTM

被引:0
作者
Jing Wang
Yunkai Zou
Jianli Ding
机构
[1] College of Computer Science and Technology,
[2] Civil Aviation University of China,undefined
[3] Sino-European Institute of Aviation Engineering,undefined
[4] Civil Aviation University of China,undefined
来源
EURASIP Journal on Wireless Communications and Networking | / 2020卷
关键词
ADS-B; Attack detection; LSTM; Sliding window; Security threat;
D O I
暂无
中图分类号
学科分类号
摘要
The open and shared nature of the Automatic Dependent Surveillance Broadcast (ADS-B) protocol makes its messages extremely vulnerable to various security threats, such as jamming, modification, and injection. This paper proposes a long short-term memory (LSTM)-based ADS-B spoofing attack detection method from the perspective of data. First, the message sequence is preprocessed in the form of a sliding window, and then, an LSTM network is used to perform prediction training on the windows. Finally, the residual set of predicted values and true values is calculated to set a threshold. As a result, we can detect a spoofing attack and further identify which feature was attacked. Experiments show that this method can effectively detect 10 different kinds of simulated manipulated ADS-B messages without further increasing the complexity of airborne applications. Therefore, the method can respond well to the security threats suffered by the ADS-B system.
引用
收藏
相关论文
共 78 条
[1]  
Qi L.(2020)A context-aware service evaluation approach over big data for cloud applications IEEE Trans. Cloud Comput. 8 338-348
[2]  
Dou W.(2020)Joint optimization of offloading utility and privacy for edge computing enabled iot IEEE Internet Things J. 7 2622-2629
[3]  
Hu C.(2019)A computation offloading method over big data for iot-enabled cloud-edge computing Future Gener. Comput. Syst. 95 522-533
[4]  
Zhou Y.(2020)Become: blockchain-enabled computation offloading for iot in mobile edge computing IEEE Trans. Ind. Inform. 16 4187-4195
[5]  
Yu J.(2005)Framewise phoneme classification with bidirectional lstm and other neural network architectures Neural Netw. 18 602-610
[6]  
Xu X.(2019)Link prediction in paper citation network to construct paper correlation graph EURASIP J. Wirel. Commun. Netw. 2019 1-12
[7]  
He C.(2018)Web traffic anomaly detection using c-lstm neural networks Expert Syst. Appl. 106 66-76
[8]  
Xu Z.(2018)Using lstm encoder-decoder algorithm for detecting anomalous ads-b messages Comput. Secur. 78 155-173
[9]  
Qi L.(2019)Ads-b anomaly data detection model based on deep learning Acta Aeronaut. et Astronaut. Sin. 40 167-177
[10]  
Wan S.(2013)Enhancing the security of aircraft surveillance in the next generation air traffic control system Int. J. Crit. Infrastruct. Protect. 6 3-11