Test Data Generation for False Data Injection Attack Testing in Air Traffic Surveillance

The ADS-B – Automatic Dependent Surveillance Broadcast – technology requires aircraft to broadcast their position and velocity periodically. The protocol was not specified with cyber security in minds and therefore provides no encryption nor identification. These issues, coupled with the reliance on aircraft to communicate on their status, expose air transport to new cyber security threats, and especially to FDIAs – False Data Injection Attacks – where an attacker modifies, blocks, or emits fake ADS-B messages to dupe controllers and surveillance systems. This paper is part of an ongoing research initiative toward FDIA test generation intended to improve the detection capabilities of surveillance systems. It focuses on the mechanisms used to alter existing legitimate ADS-B recordings as if an attacker had tempered with the communication flow. We propose a set of alteration algorithms covering the taxonomy of FDIA attacks for ADS-B previously defined in the literature. We experiment this approach by generating test data for an AI-based FDIA detection system [8]. Experimental results show that the proposed approach is straightforward to generate attack situations and provides a efficient way to easily generate sophisticated alterations that were not picked up by the detection system.

[1]  Jianyi Liu,et al.  Analysis of Message Attacks in Aviation Data-Link Communication , 2018, IEEE Access.

[2]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[3]  Lovekesh Vig,et al.  LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection , 2016, ArXiv.

[4]  Asaf Shabtai,et al.  Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages , 2017, Comput. Secur..

[5]  Peter Brooker,et al.  SESAR and NextGen: Investing In New Paradigms , 2008, Journal of Navigation.

[6]  Hiroshi Akima,et al.  A New Method of Interpolation and Smooth Curve Fitting Based on Local Procedures , 1970, JACM.

[7]  Naima Kaabouch,et al.  Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system , 2017, Int. J. Crit. Infrastructure Prot..

[8]  Georg Langs,et al.  Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.

[9]  Ivan Martinovic,et al.  Bringing up OpenSky: A large-scale ADS-B sensor network for research , 2014, IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.

[10]  Quan Pan,et al.  LSTM-based Flight Trajectory Prediction , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[11]  Miao Ma,et al.  Resilience Against False Data Injection Attack in Wireless Sensor Networks , 2008 .

[12]  James F. Epperson On the Runge example , 1987 .

[13]  Feng Xia,et al.  LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data , 2017, World Wide Web.

[14]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[15]  A. Smith,et al.  Methods to Provide System-Wide ADS-B Back-Up, Validation and Security , 2006, 2006 ieee/aiaa 25TH Digital Avionics Systems Conference.

[16]  Ivan Martinovic,et al.  Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.

[17]  Ronald M. Summers,et al.  Improving Computer-Aided Detection Using Convolutional Neural Networks and Random View Aggregation , 2015, IEEE Transactions on Medical Imaging.

[18]  Rui Pinheiro,et al.  On Perception and Reality in Wireless Air Traffic Communication Security , 2016, IEEE Transactions on Intelligent Transportation Systems.