scholarly journals Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B

2021 ◽  
Vol 5 (2) ◽  
pp. 27
Author(s):  
Dustin M. Mink ◽  
Jeffrey McDonald ◽  
Sikha Bagui ◽  
William B. Glisson ◽  
Jordan Shropshire ◽  
...  

Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a data mining process, in the context of big data, to determine flight patterns, including patterns for possible attacks, in the U.S. National Air Space (NAS). Flights outside the flight patterns are possible attacks. For this study, OpenSky was used as the data source of Automatic Dependent Surveillance-Broadcast (ADS-B) messages, NiFi was used for data management, Elasticsearch was used as the log analyzer, Kibana was used to visualize the data for feature selection, and Support Vector Machine (SVM) was used for classification. This research provides a solution for attack mitigation by packaging a machine learning algorithm, SVM, into an intrusion detection system and calculating the feasibility of processing US ADS-B messages in near real time. Results of this work show that ADS-B network attacks can be detected using network attack signatures, and volume and velocity calculations show that ADS-B messages are processable at the scale of the U.S. Next Generation (NextGen) Air Traffic Systems using commodity hardware, facilitating real time attack detection. Precision and recall close to 80% were obtained using SVM.

Sensors ◽  
2018 ◽  
Vol 18 (4) ◽  
pp. 1174 ◽  
Author(s):  
Jian Luo ◽  
Chang Lin

In this study, we propose a real-time pedestrian detection system using a FPGA with a digital image sensor. Comparing with some prior works, the proposed implementation realizes both the histogram of oriented gradients (HOG) and the trained support vector machine (SVM) classification on a FPGA. Moreover, the implementation does not use any external memory or processors to assist the implementation. Although the implementation implements both the HOG algorithm and the SVM classification in hardware without using any external memory modules and processors, the proposed implementation’s resource utilization of the FPGA is lower than most of the prior art. The main reasons resulting in the lower resource usage are: (1) simplification in the Getting Bin sub-module; (2) distributed writing and two shift registers in the Cell Histogram Generation sub-module; (3) reuse of each sum of the cell histogram in the Block Histogram Normalization sub-module; and (4) regarding a window of the SVM classification as 105 blocks of the SVM classification. Moreover, compared to Dalal and Triggs’s pure software HOG implementation, the proposed implementation‘s average detection rate is just about 4.05% less, but can achieve a much higher frame rate.


Author(s):  
Mouhammd Sharari Alkasassbeh ◽  
Mohannad Zead Khairallah

Over the past decades, the Internet and information technologies have elevated security issues due to the huge use of networks. Because of this advance information and communication and sharing information, the threats of cybersecurity have been increasing daily. Intrusion Detection System (IDS) is considered one of the most critical security components which detects network security breaches in organizations. However, a lot of challenges raise while implementing dynamics and effective NIDS for unknown and unpredictable attacks. Consider the machine learning approach to developing an effective and flexible IDS. A deep neural network model is proposed to increase the effectiveness of intrusions detection system. This chapter presents an efficient mechanism for network attacks detection and attack classification using the Management Information Base (MIB) variables with machine learning techniques. During the evaluation test, the proposed model seems highly effective with deep neural network implementation with a precision of 99.6% accuracy rate.


2010 ◽  
Vol 54 (7) ◽  
pp. 1126-1141 ◽  
Author(s):  
John Felix Charles Joseph ◽  
Amitabha Das ◽  
Bu-Sung Lee ◽  
Boon-Chong Seet

2011 ◽  
Vol 464 ◽  
pp. 175-178
Author(s):  
Rong Biao Zhang ◽  
Jing Jing Guo ◽  
Qi Wang ◽  
Lei Zhang ◽  
Xian Lin Wang

Real-time monitoring of soil moisture is essential for agricultural production. In this paper, an improved system is designed based on GPRS technology for real-time detecting soil moisture, a salinity calibration model is established based on Least Squares Support Vector Machines on MatLAB (LS-SVMlab) for improving detection precision. The transmission of soil moisture information is the key technology of the system, by software and hardware design we have solved the problems of data congestion, off-line, and moving the monitoring terminal at any time, which still restrict the application of GPRS in soil moisture detection. Field tests show that the system can realize seamless connection between the collection nodes and remote host, and acquire soil moisture accurately. Simultaneously, the time of re-networking has been shortened greatly.


2021 ◽  
Vol 11 (3) ◽  
pp. 7273-7278
Author(s):  
M. Anwer ◽  
M. U. Farooq ◽  
S. M. Khan ◽  
W. Waseemullah

Many researchers have examined the risks imposed by the Internet of Things (IoT) devices on big companies and smart towns. Due to the high adoption of IoT, their character, inherent mobility, and standardization limitations, smart mechanisms, capable of automatically detecting suspicious movement on IoT devices connected to the local networks are needed. With the increase of IoT devices connected through internet, the capacity of web traffic increased. Due to this change, attack detection through common methods and old data processing techniques is now obsolete. Detection of attacks in IoT and detecting malicious traffic in the early stages is a very challenging problem due to the increase in the size of network traffic. In this paper, a framework is recommended for the detection of malicious network traffic. The framework uses three popular classification-based malicious network traffic detection methods, namely Support Vector Machine (SVM), Gradient Boosted Decision Trees (GBDT), and Random Forest (RF), with RF supervised machine learning algorithm achieving far better accuracy (85.34%). The dataset NSL KDD was used in the recommended framework and the performances in terms of training, predicting time, specificity, and accuracy were compared.


Sign in / Sign up

Export Citation Format

Share Document