王布宏1,,,
尚福特1,
田继伟1,
曹堃锐1, 2
1.空军工程大学信息与导航学院 西安 710077
2.国防科技大学信息通信学院 西安 710106
基金项目:国家自然科学基金(61902426)
详细信息
作者简介:李腾耀:男,1991年生,博士生,研究方向为ADS-B数据攻击检测及弹性恢复
王布宏:男,1975年生,博士,教授,研究方向为空管安全、信息物理系统安全和人工智能安全
尚福特:男,1992年生,博士生,研究方向为信息物理系统安全
田继伟:男,1993年生,博士生,研究方向为信息物理系统安全和人工智能安全
曹堃锐:男,1989年生,博士生,研究方向为无线网络物理层安全
通讯作者:王布宏 wbhgroup@aliyun.com
中图分类号:TP915.08计量
文章访问数:973
HTML全文浏览量:347
PDF下载量:49
被引次数:0
出版历程
收稿日期:2019-12-23
修回日期:2020-05-22
网络出版日期:2020-07-21
刊出日期:2020-10-13
A Resilient Recovery Method on ADS-B Attack Data
Tengyao LI1,Buhong WANG1,,,
Fute SHANG1,
Jiwei TIAN1,
Kunrui CAO1, 2
1. College of Information and Navigation, Air Force Engineering University, Xi’an 710077, China
2. School of Information and Communications, National University of Defense Technology, Xi’an 710106, China
Funds:The National Natural Science Foundation of China (61902426)
摘要
摘要:为了对自动广播相关监视(ADS-B)攻击数据进行弹性恢复,确保空情态势感知信息的持续可用性,该文提出针对ADS-B攻击数据的弹性恢复方法。基于前置的攻击检测机制,获取当前ADS-B量测数据序列和预测数据序列,并在此基础上构建偏差数据序列、差分数据序列和邻近密度数据序列。依托偏差数据构建恢复向量,依托差分数据挖掘攻击数据的时序特性,依托邻近密度数据挖掘攻击数据的空间特性。通过整合3种数据序列构建弹性恢复策略并确定恢复终止点,实现对攻击影响的弱化,将ADS-B攻击数据向正常数据方向进行定向恢复。通过对6种典型攻击样式的实验分析,证明该弹性恢复方法能够有效恢复ADS-B攻击数据,削弱数据攻击对监视系统的影响。
关键词:空管监视/
自动广播相关监视/
数据安全/
攻击检测/
弹性恢复
Abstract:In order to conduct effective resilient recovery on Automatic Dependent Surveillance-Broadcast (ADS-B) attack data and ensure the continuous availability of air traffic situation awareness, a resilient recovery method on ADS-B attack data is proposed. Based on attack detection strategies, the measurement and prediction sequences of ADS-B data are obtained to set up deviation data, differential data and neighbor density data sequences, which are designed to construct recovery vectors, mine the temporal correlations and the spatial correlations respectively. The selected data sequences are integrated to accomplish the whole recovery method and decide the end point of recovery. The method is applied to elinimating attack effects and recovering the attack data towards normal data. According to the results of experiments on six classical attack patterns, the proposed method is effective on recovering attack data and eliminating the attack impacts.
Key words:Air traffic surveillance/
Automatic Dependent Surveillance-Broadcast (ADS-B)/
Data security/
Attack detection/
Resilient recovery
PDF全文下载地址:
https://jeit.ac.cn/article/exportPdf?id=0be6c188-bfb3-4b8b-8d93-7fba02f2c19b