Skip to main content
Top

2023 | OriginalPaper | Chapter

ADS-B Anomaly Detection Algorithm Based on LSTM-ED and SVDD

Authors : Jiao Yi, Lin Lin, Li Nisi, Wang Jintao

Published in: Proceedings of the 10th Chinese Society of Aeronautics and Astronautics Youth Forum

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of radio broadcasting technology and information technology, the possibility of ADS-B surveillance system suffering from radio frequency interference and network attack is increasing. Firstly, the types of attacks that ADS-B system is vulnerable to are analyzed, and the abnormal data of the corresponding state are simulated. Then, in order to detect ADS-B data attacks accurately, an anomaly detection algorithm based on Long Short-Term Memory Encoder–Decoder (LSTM-ED) and hypersphere classifier is proposed. Using the normal historical data to train the LSTM-ED model so that the reconstructed values can be obtained. Then, the difference values between the actual values and the reconstructed values are put into SVDD (support vector data description) for training, and a hypersphere classifier that can detect abnormal data is obtained. It is judged whether there is an abnormality according to the set threshold. Experiments show that the LSTM-ED-SVDD model can detect abnormal ADS-B data generated by various attacks and has high accuracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Strohmeier, M., Lenders, V., Martinovic, I.: Security of ADS−B: State of the Art and Beyond. DCS (2016) Strohmeier, M., Lenders, V., Martinovic, I.: Security of ADS−B: State of the Art and Beyond. DCS (2016)
2.
go back to reference Mccallie, D., Butts, J., Mills. R.: Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Critical Infrastruct. Protect. 4(2), 78–87 (2011) Mccallie, D., Butts, J., Mills. R.: Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Critical Infrastruct. Protect. 4(2), 78–87 (2011)
3.
go back to reference McCallie, D., Butts, J., Mills, R.: Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Crit. Infrastruct. Prot. 4(2), 78–87 (2011)CrossRef McCallie, D., Butts, J., Mills, R.: Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Crit. Infrastruct. Prot. 4(2), 78–87 (2011)CrossRef
4.
go back to reference Costin, A., Francillon, A.: Ghost in the air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black hat USA, pp. 1–12 (2012) Costin, A., Francillon, A.: Ghost in the air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black hat USA, pp. 1–12 (2012)
5.
go back to reference Magazu III, D.: Exploiting the automatic dependent surveillance-broadcast system via false target injection (2012) Magazu III, D.: Exploiting the automatic dependent surveillance-broadcast system via false target injection (2012)
6.
go back to reference Schäfer, M., Lenders, V., Martinovic, I.: Experimental analysis of attacks on next generation air traffic communication. In: International Conference on Applied Cryptography and Network Security. Springer, Berlin, Heidelberg, pp. 253–271 (2013) Schäfer, M., Lenders, V., Martinovic, I.: Experimental analysis of attacks on next generation air traffic communication. In: International Conference on Applied Cryptography and Network Security. Springer, Berlin, Heidelberg, pp. 253–271 (2013)
7.
go back to reference Strohmeier, M., Schäfer, M., Lenders, V., et al.: Realities and challenges of next gen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52(5), 111–118 (2014)CrossRef Strohmeier, M., Schäfer, M., Lenders, V., et al.: Realities and challenges of next gen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52(5), 111–118 (2014)CrossRef
8.
go back to reference Strohmeier, M., Lenders, V., Martinovic, I.: On the security of the automatic dependent surveillance-broadcast protocol. IEEE Commun. Surv. Tutor. 17(2), 1066–1087 (2014)CrossRef Strohmeier, M., Lenders, V., Martinovic, I.: On the security of the automatic dependent surveillance-broadcast protocol. IEEE Commun. Surv. Tutor. 17(2), 1066–1087 (2014)CrossRef
9.
go back to reference Li, T., Wang, B.: Sequential collaborative detection strategy on ADS-B data attack. Int. J. Critical Infrastruct. Protect. (2018) Li, T., Wang, B.: Sequential collaborative detection strategy on ADS-B data attack. Int. J. Critical Infrastruct. Protect. (2018)
10.
go back to reference Strohmeier, M., Schafer, M., Fuchs, M., et al.: OpenSky: a Swiss army knife for air traffic security research. In: 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE (2015) Strohmeier, M., Schafer, M., Fuchs, M., et al.: OpenSky: a Swiss army knife for air traffic security research. In: 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE (2015)
11.
go back to reference Yu, Y., Si, X., Hu, C., Zhang, J.: A review of recurrent neural networks: LSTM cells and network architectures. Neural Comput. 31(7), 1235–1270 (2019) Yu, Y., Si, X., Hu, C., Zhang, J.: A review of recurrent neural networks: LSTM cells and network architectures. Neural Comput. 31(7), 1235–1270 (2019)
12.
go back to reference Habler, E., Shabta,i A.: Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. Comput. Secur. 78(sep.), 155–173 (2017) Habler, E., Shabta,i A.: Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. Comput. Secur. 78(sep.), 155–173 (2017)
Metadata
Title
ADS-B Anomaly Detection Algorithm Based on LSTM-ED and SVDD
Authors
Jiao Yi
Lin Lin
Li Nisi
Wang Jintao
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-7652-0_23

Premium Partner