8th OpenSky Symposium 2020 2020
DOI: 10.3390/proceedings2020059009
|View full text |Cite
|
Sign up to set email alerts
|

Improved Testing of AI-Based Anomaly Detection Systems Using Synthetic Surveillance Data

Abstract: Major transportation surveillance protocols have not been specified with cyber security in mind and therefore provide no encryption nor identification. These issues expose air and sea transport to false data injection attacks (FDIAs), in which an attacker modifies, blocks or emits fake surveillance messages to dupe controllers and surveillance systems. There has been growing interest in conducting research on machine learning-based anomaly detection systems that address these new threats. However, significant … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…data are recorded. Note that the FDI-T software has also been used to acquire ADS-B datasets to test anomaly detection AI models in another work done in our laboratory [6]. In this work two types of attacks were considered for anomaly detection: gradual attacks and waypoints attacks.…”
Section: A Generation Of Labeled Attacked Ads-b Messagesmentioning
confidence: 99%
See 1 more Smart Citation
“…data are recorded. Note that the FDI-T software has also been used to acquire ADS-B datasets to test anomaly detection AI models in another work done in our laboratory [6]. In this work two types of attacks were considered for anomaly detection: gradual attacks and waypoints attacks.…”
Section: A Generation Of Labeled Attacked Ads-b Messagesmentioning
confidence: 99%
“…This research as well as our previous one published in [5] are the only studies which, to the best of our knowledge, use supervised learning for ADS-B anomaly detection. Our research and [6] use the same false data injection generator (with a domain specific language) specifically devised for generating attacked ADS-B datasets contrary to anything else found in the literature. Finally we were able to detect gradual attacks on any of the previously mentioned features using a meta-model made of models trained on individual gradual attacks.…”
Section: Introductionmentioning
confidence: 99%
“…There are several open attack vectors that, from a scientific perspective, would allow attacking ADS-B on different levels. Chevrot et al [3] present a framework for arbitrary false data injection and outline detection strategies. Nevertheless, we must always consider the necessary effort for an attack and its feasibility in a real-world scenario.…”
Section: Related Workmentioning
confidence: 99%