This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Anomaly Based Intrusion Detection for an Avionic Embedded System
Technical Paper
2018-01-1941
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
This paper firstly describes the challenges raised by the introduction of Intrusion Detection Systems (IDS) in avionic systems. In particular, we discuss some specific characteristics of such systems and the advantages and limitations of signature-based and anomaly-based techniques in an avionics context. Based on this analysis, a framework is proposed to integrate a Host-based Intrusion Detection System (HIDS) in the general Integrated Modular Avionics (IMA) development process, which fits avionic systems constraints. The proposed HIDS architecture is composed of three modules: anomaly detection, attack confirmation, and alert sending. To demonstrate the efficiency of this HIDS, an attack injection module has also been developed. The overall approach is implemented on an IMA platform running a cockpit display function, to be representative of embedded avionic systems.
Recommended Content
Authors
Citation
Damien, A., Fumey, M., Alata, E., Kaâniche, M. et al., "Anomaly Based Intrusion Detection for an Avionic Embedded System," SAE Technical Paper 2018-01-1941, 2018, https://doi.org/10.4271/2018-01-1941.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 | ||
Unnamed Dataset 2 | ||
Unnamed Dataset 3 | ||
Unnamed Dataset 4 | ||
Unnamed Dataset 5 |
Also In
References
- SAE International 2010 10.4271/arp4754A
- RTCA 2011
- Prisaznuk , P.J. Integrated Modular Avionics Proceedings of the IEEE 1992 National Aerospace and Electronics Conference@m_NAECON 1992 1 39 45 1992 10.1109/NAECON.1992.220669
- Chen , T.M. and Abu-Nimeh , S. Lessons from Stuxnet Computer 44 4 91 93 2011 10.1109/MC.2011.115
- Jeep Hacking Incident Leads to Fiat Chrysler Recall of 1.4M Vehicles Claims Journal 2015 https://www.claimsjournal.com/news/national/2015/07/27/264766.htm
- Biesecker , C. Boeing 757 Testing Shows Airplanes Vulnerable to Hacking, DHS Says Avionics 2017 https://www.aviationtoday.com/2017/11/08/boeing-757-testing-shows-airplanes-vulnerable-hacking-dhs-says/
- Teso , H. Aircraft Hacking - Practical Aero Series the Hack in the Box (HITB) Conference Amsterdam 2013
- Conmy , P. , Nicholson , M. , and McDermid , J. 2003 10
- Prisaznuk , P.J. ARINC 653 Role in Integrated Modular Avionics (IMA) 2008 IEEE/AIAA 27th Digital Avionics Systems Conference 2008 1.E.5-1 1.E.5-10 10.1109/DASC.2008.4702770
- Kocher , P. , Genkin , D. , Gruss , D. , Haas , W. et al. 2018
- Parkinson , S. , Ward , P. , Wilson , K. , and Miller , J. 2017 10.1109/TITS.2017.2665968
- RTCA 2014
- RTCA 2018
- Hintze , H. and God , R. Using Model-Based Security Engineering in the Development of Complex Aircraft Cabin Systems SAE Int. J. Aerosp. 8 1 89 96 2015 10.4271/2015-01-2445
- ARINC Industry Activities 2017
- Netkachova , K. , Müller , K. , Paulitsch , M. , and Bloomfield , R. Investigation into a Layered Approach to Architecting Security-Informed Safety Cases 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC) 2015 6B4-1 6B4-12 10.1109/DASC.2015.7311447
- Dessiatnikoff , A. , Nicomette , V. , Alata , É. , Deswarte , Y. et al. Securing Integrated Modular Avionics Computers 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC) 2013 4A3-1 4A3-11 10.1109/DASC.2013.6712577
- O’Neill , K. , Newell , G.R. , and Odiga , S.K. Protecting Flight Critical Systems against Security Threats in Commercial Air Transportation 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC) 2016 1 7 10.1109/DASC.2016.7777979
- Pharate , A. , Bhat , H. , Shilimkar , V. , and Mhetre , N. Classification of Intrusion Detection System International Journal of Computer Applications 118 7 23 26 2015 10.5120/20758-3163
- Wu , S.X. and Banzhaf , W. The Use of Computational Intelligence in Intrusion Detection Systems: A Review Applied Soft Computing 10 1 1 35 2010 10.1016/j.asoc.2009.06.019
- Tabrizi , F.M. and Pattabiraman , K. Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems Dependable Computing Conference (EDCC), 2015 Eleventh European, IEEE 2015 10.1109/EDCC.2015.17
- Studnia , I. , Alata , E. , Nicomette , V. , Kaâniche , M. et al. A Language-Based Intrusion Detection Approach for Automotive Embedded Networks The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015) Zhangjiajie, China 2014 10.1504/IJES.2018.089430
- Yoon , M.-K. , Mohan , S. , Choi , J. , Kim , J.-E. et al. Secure Core: A Multicore-Based Intrusion Detection Architecture for Real-Time Embedded Systems Real-Time and Embedded Technology and Applications Symposium (RTAS), 2013 IEEE 19th 2013 21 32 10.1109/RTAS.2013.6531076
- Kim , G. , Lee , S. , and Kim , S. A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection Expert Systems with Applications 41 4 1690 1700 2014 10.1016/j.eswa.2013.08.066
- Om , H. and Kundu , A. A Hybrid System for Reducing the False Alarm Rate of Anomaly Intrusion Detection System Recent Advances in Information Technology (RAIT), 2012 1st International Conference on 2012 131 136 10.1109/RAIT.2012.6194493
- Gil Casals , S. , Owezarski , P. , and Descargues , G. 2013 10.1109/DASC.2013.6712578
- Jacob , G. , Debar , H. , and Filiol , E. Behavioral Detection of Malware: From a Survey towards an Established Taxonomy Journal in Computer Virology 4 3 251 266 2008 10.1007/s11416-008-0086-0
- Bonfante , G. , Kaczmarek , M. , and Marion , J.-Y. Architecture of a Morphological Malware Detector Journal in Computer Virology 5 3 263 270 2009 10.1007/s11416-008-0102-4
- Bhattacharyya , S. , Cofer , D. , Musliner , D. , Mueller , J. et al. Certification Considerations for Adaptive Systems 2015 International Conference on Unmanned Aircraft Systems (ICUAS) 2015 10.1109/ICUAS.2015.7152300