Analyzing Sequences of Airspace States to Detect Anomalous Traffic Conditions

The ADS-B system serves as a replacement for the current radar-based air traffic control systems. Although much effort and resources have been invested in designing and developing the ADS-B system, it is well known for its lack of security mechanisms. Previously suggested approaches for securing the...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on aerospace and electronic systems Vol. 58; no. 3; pp. 1843 - 1857
Main Authors: Habler, Edan, Shabtai, Asaf
Format: Journal Article
Language:English
Published: New York IEEE 01.06.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9251, 1557-9603
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The ADS-B system serves as a replacement for the current radar-based air traffic control systems. Although much effort and resources have been invested in designing and developing the ADS-B system, it is well known for its lack of security mechanisms. Previously suggested approaches for securing the ADS-B system are considered impractical because of the cost and time involved in modifying the system, and given the fact that it is already deployed in most aircraft and ground stations worldwide. In this article, we propose a software-based security solution for detecting anomalous traffic conditions, which does not require any modification of the current system architecture or the addition of external sensors. In order to identify nonlegitimate ADS-B messages, our approach utilizes a stacked-LSTM encoder-decoder model that learns the flight patterns of aircraft in a monitored aerial region. We evaluated our model against common attack patterns injected into six datasets containing real ADS-B data, and we compared our proposed model with commonly used online, unsupervised models. The results of the experiments showed that our method is able to accurately and efficiently detect all of the injected attacks. Moreover, we examined our model's performance on a real flight that deviated from its planned route and confirmed that our method was capable of accurately detecting the anomaly.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0018-9251
1557-9603
DOI:10.1109/TAES.2021.3124199