scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Transforming avionics architectures to support network centric warfare

24 Oct 2004-Vol. 2
TL;DR: This work concentrates on the impact of NCW on avionics architectures and provides insight to the changes required of aircraft systems to fully utilize the NCW tenets.
Abstract: Network centric warfare was applied to different layers in the military force structure to enable commanders and direct combatants to monopolize information to increase lethality and survivability. The flow of information, the amount, type, and other attributes to be discussed, heavily impact the aviation sector of military operations and acquisition. This work concentrates on the impact of NCW on avionics architectures and provides insight to the changes required of aircraft systems to fully utilize the NCW tenets. The NCW concepts are described along with the properties of information necessary for network centric operations.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: In this paper, a machine learning-based intrusion detection system (IDS) for MIL-STD-1553 communication buses has been proposed, which is capable of detecting cyber attacks in real time.
Abstract: MIL-STD-1553 is a military standard that defines the specification of a serial communication bus that has been implemented in military and aerospace avionic platforms for over 40 years. MIL-STD-1553 was designed for a high level of fault tolerance while less attention was paid to cyber security issues. Thus, as indicated in recent studies, it is exposed to various threats. In this article, we suggest enhancing the security of MIL-STD-1553 communication buses by integrating a machine learning-based intrusion detection system (IDS); such an IDS will be capable of detecting cyber attacks in real time. The IDS consists of two modules: 1) a remote terminal (RT) authentication module that detects illegitimately connected components and data transfers and 2) a sequence-based anomaly detection module that detects anomalies in the operation of the system. The IDS showed high detection rates for both normal and abnormal behavior when evaluated in a testbed using real 1553 hardware, as well as a very fast and accurate training process using logs from a real system. The RT authentication module managed to authenticate RTs with +0.99 precision and +0.98 recall; and detect illegitimate component (or a legitimate component that impersonates other components) with +0.98 precision and +0.99 recall. The sequence-based anomaly detection module managed to perfectly detect both normal and abnormal behavior. Moreover, the sequence-based anomaly detection module managed to accurately (i.e., zero false positives) model the normal behavior of a real system in a short period of time ( $\sim$ 22 s).

17 citations


Cites methods from "Transforming avionics architectures..."

  • ..., [3], [4])....

    [...]

  • ...Some examples are studies which proposed the 1553 Xi-channel, a digital subscriber line version of MILSTD-1553 [3], and used compression algorithms in order to increase the bus efficiency [4]....

    [...]

Proceedings Article
05 Jun 2012
TL;DR: The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander.
Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander.

16 citations


Cites background from "Transforming avionics architectures..."

  • ...Various systems and methods of design and infrastructure have been examined to determine an appropriate strategy for dealing with outages [38]....

    [...]

Journal ArticleDOI
TL;DR: This paper delves its roots in a vast research endeavor aimed at granting cyber resilience of current and future assets to address the vulnerabilities of a specific avionic platform protocol, namely the MIL-STD-1553 standard.

11 citations

15 Mar 2007
TL;DR: It is concluded that permeability of cross-program boundaries, direct relationships with functional groups and rich tacit knowledge flow from suppliers are critical for countering rampant firefighting in complex product development.

4 citations


Cites background from "Transforming avionics architectures..."

  • ...Federated avionics are otherwise integrated parallel processing systems with mission computers controlling the different functions through parallel bus-structured interconnects (Filmer 2003; Hicks 2004)....

    [...]

References
More filters