Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection

被引:7
|
作者
Shang, Fute [1 ]
Wang, Buhong [1 ]
Li, Tengyao [1 ]
Tian, Jiwei [1 ]
Cao, Kunrui [1 ,2 ]
Guo, Rongxiao [1 ]
机构
[1] Air Force Engn Univ, Coll Informat & Nav, Xian 710077, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Xian 710106, Peoples R China
关键词
Receivers; Encoding; Transponders; Perturbation methods; Detectors; Bit error rate; Wireless communication; Automatic dependent surveillance-broadcast (ADS-B); spoofing detection; wireless security; adversarial machine learning;
D O I
10.1109/LWC.2020.3002914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural networks have been applied to many tasks in air traffic management, ranging from anomaly detection to flight trajectory prediction. However, it has been shown that such algorithms are susceptible to adversarial examples. In this letter, we manage to show that current deep learning algorithms proposed for spoofing detection are vulnerable to maliciously crafted ADS-B data. To inject the false messages into the ADS-B system without being detected, we need to find adversarial perturbations to balance the need of overwhelming the channel noise and keeping the decoding error low. Simulation results demonstrate the viability of our approach to evade the DNN-based spoofing detector without increasing the decoding error.
引用
收藏
页码:1734 / 1737
页数:4
相关论文
共 50 条
  • [1] ADS-B spoofing attack detection method based on LSTM
    Wang, Jing
    Zou, Yunkai
    Ding, Jianli
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [2] ADS-B spoofing attack detection method based on LSTM
    Jing Wang
    Yunkai Zou
    Jianli Ding
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [3] ADS-Bpois: Poisoning Attacks Against Deep-Learning-Based Air Traffic ADS-B Unsupervised Anomaly Detection Models
    Luo, Peng
    Wang, Buhong
    Tian, Jiwei
    Yang, Yong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38301 - 38311
  • [4] ADS-B anomaly data detection model based on deep learning
    Ding, Jianli
    Zou, Yunkai
    Wang, Jing
    Wang, Huaichao
    Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, 2019, 40 (12):
  • [5] Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection
    Peng, Zuquan
    He, Yuanyuan
    Sun, Zhe
    Ni, Jianbing
    Niu, Ben
    Deng, Xianjun
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3118 - 3123
  • [6] ADS-B Data Attack Detection Based on Generative Adversarial Networks
    Li, Tengyao
    Wang, Buhong
    Shang, Fute
    Tian, Jiwei
    Cao, Kunrui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 323 - 336
  • [7] Detecting ADS-B Spoofing Attacks using Deep Neural Networks
    Ying, Xuhang
    Mazer, Joanna
    Bernieri, Giuseppe
    Conti, Mauro
    Bushnell, Linda
    Poovendran, Radha
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019, : 187 - 195
  • [8] Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples
    Zhang, Ziwei
    Ye, Dengpan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples
    Zhang, Ziwei
    Ye, Dengpan
    Security and Communication Networks, 2022, 2022
  • [10] An ADS-B Spoofing Attack Detection Method based on LASSO Ensemble Empirical Mode Decomposition
    Shen, Zhiyuan
    Wang, Han
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,