Cargando…

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. T...

Descripción completa

Detalles Bibliográficos
Autores principales: Cohen, Shai, Levy, Efrat, Shaked, Avi, Cohen, Tair, Elovici, Yuval, Shabtai, Asaf
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185311/
https://www.ncbi.nlm.nih.gov/pubmed/35684879
http://dx.doi.org/10.3390/s22114259
_version_ 1784724693201190912
author Cohen, Shai
Levy, Efrat
Shaked, Avi
Cohen, Tair
Elovici, Yuval
Shabtai, Asaf
author_facet Cohen, Shai
Levy, Efrat
Shaked, Avi
Cohen, Tair
Elovici, Yuval
Shabtai, Asaf
author_sort Cohen, Shai
collection PubMed
description Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. Those systems process the data stream and make real-time operational decisions based on the data received. Given this, the reliability and availability of information provided by radar systems have grown in importance. Although the field of cyber security has been continuously evolving, no prior research has focused on anomaly detection in radar systems. In this paper, we present an unsupervised deep-learning-based method for detecting anomalies in radar system data streams; we take into consideration the fact that a data stream created by a radar system is heterogeneous, i.e., it contains both numerical and categorical features with non-linear and complex relationships. We propose a novel technique that learns the correlation between numerical features and an embedding representation of categorical features in an unsupervised manner. The proposed technique, which allows for the detection of the malicious manipulation of critical fields in a data stream, is complemented by a timing-interval anomaly-detection mechanism proposed for the detection of message-dropping attempts. Real radar system data were used to evaluate the proposed method. Our experiments demonstrated the method’s high detection accuracy on a variety of data-stream manipulation attacks (an average detection rate of 88% with a false -alarm rate of 1.59%) and message-dropping attacks (an average detection rate of 92% with a false-alarm rate of 2.2%).
format Online
Article
Text
id pubmed-9185311
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91853112022-06-11 RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks Cohen, Shai Levy, Efrat Shaked, Avi Cohen, Tair Elovici, Yuval Shabtai, Asaf Sensors (Basel) Article Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. Those systems process the data stream and make real-time operational decisions based on the data received. Given this, the reliability and availability of information provided by radar systems have grown in importance. Although the field of cyber security has been continuously evolving, no prior research has focused on anomaly detection in radar systems. In this paper, we present an unsupervised deep-learning-based method for detecting anomalies in radar system data streams; we take into consideration the fact that a data stream created by a radar system is heterogeneous, i.e., it contains both numerical and categorical features with non-linear and complex relationships. We propose a novel technique that learns the correlation between numerical features and an embedding representation of categorical features in an unsupervised manner. The proposed technique, which allows for the detection of the malicious manipulation of critical fields in a data stream, is complemented by a timing-interval anomaly-detection mechanism proposed for the detection of message-dropping attempts. Real radar system data were used to evaluate the proposed method. Our experiments demonstrated the method’s high detection accuracy on a variety of data-stream manipulation attacks (an average detection rate of 88% with a false -alarm rate of 1.59%) and message-dropping attacks (an average detection rate of 92% with a false-alarm rate of 2.2%). MDPI 2022-06-02 /pmc/articles/PMC9185311/ /pubmed/35684879 http://dx.doi.org/10.3390/s22114259 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Cohen, Shai
Levy, Efrat
Shaked, Avi
Cohen, Tair
Elovici, Yuval
Shabtai, Asaf
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
title RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
title_full RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
title_fullStr RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
title_full_unstemmed RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
title_short RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
title_sort radarnomaly: protecting radar systems from data manipulation attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185311/
https://www.ncbi.nlm.nih.gov/pubmed/35684879
http://dx.doi.org/10.3390/s22114259
work_keys_str_mv AT cohenshai radarnomalyprotectingradarsystemsfromdatamanipulationattacks
AT levyefrat radarnomalyprotectingradarsystemsfromdatamanipulationattacks
AT shakedavi radarnomalyprotectingradarsystemsfromdatamanipulationattacks
AT cohentair radarnomalyprotectingradarsystemsfromdatamanipulationattacks
AT eloviciyuval radarnomalyprotectingradarsystemsfromdatamanipulationattacks
AT shabtaiasaf radarnomalyprotectingradarsystemsfromdatamanipulationattacks