2018
DOI: 10.1016/j.cose.2018.07.004
|View full text |Cite
|
Sign up to set email alerts
|

Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages

Abstract: Although the ADS-B system is going to play a major role in the safe navigation of airplanes and air traffic control (ATC) management, it is also well known for its lack of security mechanisms. Previous research has proposed various methods for improving the security of the ADS-B system and mitigating associated risks. However, these solutions typically require the use of additional participating nodes (or sensors) (e.g., to verify the location of the airplane by analyzing the physical signal) or modification o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 114 publications
(68 citation statements)
references
References 19 publications
0
67
1
Order By: Relevance
“…By analyzing the ADS-B attacks, we construct a neural network made up of LSTM units to detect different types of anomalous data we simulate. Compared with the existing machine learning methods [14,15], our method does not require complicated feature engineering.…”
Section: Introductionmentioning
confidence: 99%
“…By analyzing the ADS-B attacks, we construct a neural network made up of LSTM units to detect different types of anomalous data we simulate. Compared with the existing machine learning methods [14,15], our method does not require complicated feature engineering.…”
Section: Introductionmentioning
confidence: 99%
“…(5) From the perspective of data, a machine learning method is used to reconstruct the ADS-B message sequence, and the reconstruction error is used to detect anomalous messages. Based on the original features contained in an ADS-B message, Habler et al calculated the distances from all points on the track to four special nodes and the distances between two adjacent track points, for a total of 5 parameters, as additional training features to perform anomaly detection [14]. Our research group statistically expands the original features based on the strong temporal correlation of ADS-B messages so that the model can better capture the time dependence of the data [15].…”
Section: Research Statusmentioning
confidence: 99%
“…Compared with the existing machine learning methods [14,15], our method does not require complicated feature engineering. 2 We set different thresholds for different features, so that we can determine the specific features containing anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…It is also interesting to note that some approaches use RNN as part of an autoencoder (e.g., LSTM encoder-decoder (LSTM-ED) [63,78]) or generative architecture (e.g., GAN-AD [68]). See Sections 3.3 and 3.4 for further details.…”
Section: Recent Advances In Recurrent Neural Networkmentioning
confidence: 99%