Data integrity assessment for maritime anomaly detection

Abstract In the last years, systems broadcasting mobility data underwent a rise in cyberthreats, jeopardising their normal use and putting both users and their environment at risk. In this respect, anomaly detection methods are needed to ensure an assessment of such systems. In this article, we propose a rule-based method for data integrity assessment, with rules built from the system technical specifications and by domain experts, and formalised by a logic-based framework, resulting in the triggering of situation-specific alerts. A use case is proposed on the Automatic Identification System, a worldwide localisation system for vessels, based on its poor level of security which allows errors, falsifications and spoofing scenarios. The discovery of abnormal reporting cases aims to assist marine traffic surveillance, preserve the human life at sea and mitigate hazardous behaviours against ports, off-shore structures and the environment.

[1]  Esteban Zimányi,et al.  Advocacy for External Quality in GIS , 2011, GeoS.

[2]  Cyril Ray,et al.  Heterogeneous integrated dataset for Maritime Intelligence, surveillance, and reconnaissance , 2019, Data in brief.

[3]  Alain Bouju,et al.  DeAIS project: Detection of AIS spoofing and resulting risks , 2015, OCEANS 2015 - Genova.

[4]  David N. Wiley,et al.  Modeling speed restrictions to mitigate lethal collisions between ships and whales in the Stellwagen Bank National Marine Sanctuary, USA , 2011 .

[5]  Kartik Palani,et al.  Modeling Cyber Attacks at Intelligent Traffic Signals , 2018, Transportation Research Record: Journal of the Transportation Research Board.

[6]  Niklas Lavesson,et al.  Open data for anomaly detection in maritime surveillance , 2013, Expert Syst. Appl..

[7]  Todd E. Humphreys,et al.  Hostile Control of Ships via False GPS Signals: Demonstration and Detection , 2017 .

[8]  Laurie Goldsworthy,et al.  Modelling of ship engine exhaust emissions in ports and extensive coastal waters based on terrestrial AIS data - An Australian case study , 2015, Environ. Model. Softw..

[9]  Ian Horrocks,et al.  Description Logics , 2008, Handbook of Knowledge Representation.

[10]  Anany Levitin,et al.  The Notion of Data and Its Quality Dimensions , 1994, Inf. Process. Manag..

[11]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[12]  Alexander O. MacGillivray,et al.  Mapping cumulative noise from shipping to inform marine spatial planning. , 2012, The Journal of the Acoustical Society of America.

[13]  Feng Lu,et al.  A quantitative approach for delineating principal fairways of ship passages through a strait , 2015 .

[14]  A. Harati-Mokhtari,et al.  Automatic Identification System (AIS): Data Reliability and Human Error Implications , 2007, Journal of Navigation.

[15]  Etienne Martineau,et al.  Maritime Anomaly Detection: Domain Introduction and Review of Selected Literature , 2011 .

[16]  Fabrizio Natale,et al.  Mapping Fishing Effort through AIS Data , 2015, PloS one.

[17]  Mica R. Endsley,et al.  Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[18]  B. Buchanan,et al.  Attributing Cyber Attacks , 2015 .

[19]  Morten Hertzum,et al.  Trust in information sources: seeking information from people, documents, and virtual agents , 2002, Interact. Comput..

[20]  Kenneth R. Fleischmann,et al.  Trust in digital information , 2008 .

[21]  Markus Lundkvist,et al.  Automatic Identification System (AIS) and Risk-Based Planning of Hydrographic Surveys in Swedish Waters , 2008 .

[22]  Cyril Ray,et al.  Composite Event Patterns for Maritime Monitoring , 2018, SETN.

[23]  Michael Cheng,et al.  A system for real-time monitoring of cybersecurity events on aircraft , 2017, 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC).

[24]  Lars Linsen,et al.  How automatic identification system (AIS) antenna setup affects AIS signal quality , 2015 .

[25]  Cyril Ray,et al.  Continuous detection of black holes for moving objects at sea , 2016, IWGS@SIGSPATIAL.

[26]  Michael L. Brodie Data quality in information systems , 1980, Inf. Manag..

[27]  K. Blomqvist The many faces of trust , 1997 .

[28]  P.A. McGillivary,et al.  Marine Ship Automatic Identification System (AIS) for Enhanced Coastal Security Capabilities: An Oil Spill Tracking Application , 2007, OCEANS 2007.

[29]  Erik Brynjolfsson,et al.  Big data: the management revolution. , 2012, Harvard business review.

[30]  F. R. Keller,et al.  Data Quality , 1990, Taxation and Labour Supply.

[31]  Shai Levi,et al.  Do firms underreport information on cyber-attacks? Evidence from capital markets , 2018, Review of Accounting Studies.

[32]  Thomas J. Holt,et al.  Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups , 2019, Terrorism and Political Violence.

[33]  Marco Balduzzi,et al.  A security evaluation of AIS automated identification system , 2014, ACSAC.

[34]  Sotiris B. Kotsiantis,et al.  Machine learning: a review of classification and combining techniques , 2006, Artificial Intelligence Review.

[35]  Mohamed Amine Ferrag,et al.  Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures , 2018, EAI Endorsed Trans. Security Safety.

[36]  Michele Vespe,et al.  Vessel Pattern Knowledge Discovery from AIS Data: A Framework for Anomaly Detection and Route Prediction , 2013, Entropy.

[37]  Cyril Ray,et al.  Methodology for AIS signature identification through magnitude and temporal characterization , 2016, OCEANS 2016 - Shanghai.

[38]  Diane M. Strong,et al.  Beyond Accuracy: What Data Quality Means to Data Consumers , 1996, J. Manag. Inf. Syst..

[39]  Fabio Mazzarella,et al.  Estimated Time of Arrival Using Historical Vessel Tracking Data , 2018, IEEE Transactions on Intelligent Transportation Systems.

[40]  Wiem Tounsi,et al.  A survey on technical threat intelligence in the age of sophisticated cyber attacks , 2018, Comput. Secur..

[41]  Abdullahi Arabo,et al.  Cyber Security Challenges within the Connected Home Ecosystem Futures , 2015, Complex Adaptive Systems.

[42]  Gudrun Høye,et al.  Maritime traffic monitoring using a space-based AIS receiver , 2006 .

[43]  Stan Matwin,et al.  Identifying fishing activities from AIS data with Conditional Random Fields , 2016, 2016 Federated Conference on Computer Science and Information Systems (FedCSIS).

[44]  Arnaud Serry,et al.  Le système d’identification automatique (AIS). Une source de données pour étudier la circulation maritime , 2015, NeTCoM 2015.

[45]  Dario Tarchi,et al.  Mining Vessel Tracking Data for Maritime Domain Applications , 2016, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW).

[46]  Paolo Braca,et al.  Detection of malicious AIS position spoofing by exploiting radar information , 2013, Proceedings of the 16th International Conference on Information Fusion.

[47]  Sara M Denize,et al.  Concerning trust and information , 2007 .

[48]  Li Pheng Khoo,et al.  Knowledge discovery using genetic algorithm for maritime situational awareness , 2014, Expert Syst. Appl..

[49]  Clément Iphar,et al.  Detection of false AIS messages for the improvement of maritime situational awareness , 2015, OCEANS 2015 - MTS/IEEE Washington.

[50]  Hans Wehn,et al.  Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[51]  Ronald Pelot,et al.  Past, present, and future of the satellite-based automatic identification system: areas of applications (2004–2016) , 2018, WMU Journal of Maritime Affairs.

[52]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[53]  Kevin Fall,et al.  Enhancing AIS to improve whale-ship collision avoidance and maritime security , 2009, OCEANS 2009.