首页 | 本学科首页   官方微博 | 高级检索  
     

ADS-B攻击数据弹性恢复方法
引用本文:李腾耀,王布宏,尚福特,田继伟,曹堃锐.ADS-B攻击数据弹性恢复方法[J].电子与信息学报,2020,42(10):2365-2373.
作者姓名:李腾耀  王布宏  尚福特  田继伟  曹堃锐
作者单位:1.空军工程大学信息与导航学院 西安 7100772.国防科技大学信息通信学院 西安 710106
基金项目:国家自然科学基金(61902426)
摘    要:为了对自动广播相关监视(ADS-B)攻击数据进行弹性恢复,确保空情态势感知信息的持续可用性,该文提出针对ADS-B攻击数据的弹性恢复方法。基于前置的攻击检测机制,获取当前ADS-B量测数据序列和预测数据序列,并在此基础上构建偏差数据序列、差分数据序列和邻近密度数据序列。依托偏差数据构建恢复向量,依托差分数据挖掘攻击数据的时序特性,依托邻近密度数据挖掘攻击数据的空间特性。通过整合3种数据序列构建弹性恢复策略并确定恢复终止点,实现对攻击影响的弱化,将ADS-B攻击数据向正常数据方向进行定向恢复。通过对6种典型攻击样式的实验分析,证明该弹性恢复方法能够有效恢复ADS-B攻击数据,削弱数据攻击对监视系统的影响。

关 键 词:空管监视    自动广播相关监视    数据安全    攻击检测    弹性恢复
收稿时间:2019-12-23

A Resilient Recovery Method on ADS-B Attack Data
Tengyao LI,Buhong WANG,Fute SHANG,Jiwei TIAN,Kunrui CAO.A Resilient Recovery Method on ADS-B Attack Data[J].Journal of Electronics & Information Technology,2020,42(10):2365-2373.
Authors:Tengyao LI  Buhong WANG  Fute SHANG  Jiwei TIAN  Kunrui CAO
Affiliation:1.College of Information and Navigation, Air Force Engineering University, Xi’an 710077, China2.School of Information and Communications, National University of Defense Technology, Xi’an 710106, China
Abstract:In order to conduct effective resilient recovery on Automatic Dependent Surveillance-Broadcast (ADS-B) attack data and ensure the continuous availability of air traffic situation awareness, a resilient recovery method on ADS-B attack data is proposed. Based on attack detection strategies, the measurement and prediction sequences of ADS-B data are obtained to set up deviation data, differential data and neighbor density data sequences, which are designed to construct recovery vectors, mine the temporal correlations and the spatial correlations respectively. The selected data sequences are integrated to accomplish the whole recovery method and decide the end point of recovery. The method is applied to elinimating attack effects and recovering the attack data towards normal data. According to the results of experiments on six classical attack patterns, the proposed method is effective on recovering attack data and eliminating the attack impacts.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号