Cargando…
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. T...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185311/ https://www.ncbi.nlm.nih.gov/pubmed/35684879 http://dx.doi.org/10.3390/s22114259 |
_version_ | 1784724693201190912 |
---|---|
author | Cohen, Shai Levy, Efrat Shaked, Avi Cohen, Tair Elovici, Yuval Shabtai, Asaf |
author_facet | Cohen, Shai Levy, Efrat Shaked, Avi Cohen, Tair Elovici, Yuval Shabtai, Asaf |
author_sort | Cohen, Shai |
collection | PubMed |
description | Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. Those systems process the data stream and make real-time operational decisions based on the data received. Given this, the reliability and availability of information provided by radar systems have grown in importance. Although the field of cyber security has been continuously evolving, no prior research has focused on anomaly detection in radar systems. In this paper, we present an unsupervised deep-learning-based method for detecting anomalies in radar system data streams; we take into consideration the fact that a data stream created by a radar system is heterogeneous, i.e., it contains both numerical and categorical features with non-linear and complex relationships. We propose a novel technique that learns the correlation between numerical features and an embedding representation of categorical features in an unsupervised manner. The proposed technique, which allows for the detection of the malicious manipulation of critical fields in a data stream, is complemented by a timing-interval anomaly-detection mechanism proposed for the detection of message-dropping attempts. Real radar system data were used to evaluate the proposed method. Our experiments demonstrated the method’s high detection accuracy on a variety of data-stream manipulation attacks (an average detection rate of 88% with a false -alarm rate of 1.59%) and message-dropping attacks (an average detection rate of 92% with a false-alarm rate of 2.2%). |
format | Online Article Text |
id | pubmed-9185311 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-91853112022-06-11 RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks Cohen, Shai Levy, Efrat Shaked, Avi Cohen, Tair Elovici, Yuval Shabtai, Asaf Sensors (Basel) Article Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. Those systems process the data stream and make real-time operational decisions based on the data received. Given this, the reliability and availability of information provided by radar systems have grown in importance. Although the field of cyber security has been continuously evolving, no prior research has focused on anomaly detection in radar systems. In this paper, we present an unsupervised deep-learning-based method for detecting anomalies in radar system data streams; we take into consideration the fact that a data stream created by a radar system is heterogeneous, i.e., it contains both numerical and categorical features with non-linear and complex relationships. We propose a novel technique that learns the correlation between numerical features and an embedding representation of categorical features in an unsupervised manner. The proposed technique, which allows for the detection of the malicious manipulation of critical fields in a data stream, is complemented by a timing-interval anomaly-detection mechanism proposed for the detection of message-dropping attempts. Real radar system data were used to evaluate the proposed method. Our experiments demonstrated the method’s high detection accuracy on a variety of data-stream manipulation attacks (an average detection rate of 88% with a false -alarm rate of 1.59%) and message-dropping attacks (an average detection rate of 92% with a false-alarm rate of 2.2%). MDPI 2022-06-02 /pmc/articles/PMC9185311/ /pubmed/35684879 http://dx.doi.org/10.3390/s22114259 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Cohen, Shai Levy, Efrat Shaked, Avi Cohen, Tair Elovici, Yuval Shabtai, Asaf RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks |
title | RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks |
title_full | RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks |
title_fullStr | RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks |
title_full_unstemmed | RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks |
title_short | RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks |
title_sort | radarnomaly: protecting radar systems from data manipulation attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185311/ https://www.ncbi.nlm.nih.gov/pubmed/35684879 http://dx.doi.org/10.3390/s22114259 |
work_keys_str_mv | AT cohenshai radarnomalyprotectingradarsystemsfromdatamanipulationattacks AT levyefrat radarnomalyprotectingradarsystemsfromdatamanipulationattacks AT shakedavi radarnomalyprotectingradarsystemsfromdatamanipulationattacks AT cohentair radarnomalyprotectingradarsystemsfromdatamanipulationattacks AT eloviciyuval radarnomalyprotectingradarsystemsfromdatamanipulationattacks AT shabtaiasaf radarnomalyprotectingradarsystemsfromdatamanipulationattacks |