Machine Learning based Theoretical Framework for Failure Prediction, Detection, and Correction of Mission-Critical Flight Software

Muhammad Waqas Ahmad, M. Akram, K. Saghar, Wasi Haider Butt, Rashid Ahmad, Ali Hassan
{"title":"Machine Learning based Theoretical Framework for Failure Prediction, Detection, and Correction of Mission-Critical Flight Software","authors":"Muhammad Waqas Ahmad, M. Akram, K. Saghar, Wasi Haider Butt, Rashid Ahmad, Ali Hassan","doi":"10.1109/ICoDT255437.2022.9787424","DOIUrl":null,"url":null,"abstract":"Mission-critical flight software acts as the control mechanism for autonomous flights and lies at the heart of next-generation developments in the aviation industry. Most state-of-the-art technological evolution is realized through the use of contemporary software which implements the essentially required, novel, innovative, and featuring value additions. Real-time physical exposure and the data-driven flying nature of aerial vehicles make them vulnerable to an ever-evolving new threat spectrum of cyber security. Nation or state-sponsored cyber attacks through sensors’ data corruption, hardware Trojans, or counterfeit wireless signals may exploit dormant and residual software vulnerabilities. It may lead to severe and catastrophic consequences including but not limited to serious injury or death of the crew, extreme damage or loss to equipment and environment. We have proposed a machine learning based theoretical framework for real-time monitoring and failure analysis of autonomous flight software. It has been introduced to protect the mission-critical flight software from run-time data-driven semantic bugs and exploitation that may be caused by missing, jammed, or spoofed data values, due to malicious online cyber activities. The effectiveness of the proposed framework has been demonstrated by the evaluation of a real-world incident of grounding an aerial vehicle by the actors in their vicinity without the intent of the original equipment manufacturer (OEM). The results show that the reported undesired but successful cyber attack may has been avoided by the effective utilization of our proposed cyber defense approach, which is targeted at software failure prediction, detection, and correction for autonomous aerial vehicles.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"74 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoDT255437.2022.9787424","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Mission-critical flight software acts as the control mechanism for autonomous flights and lies at the heart of next-generation developments in the aviation industry. Most state-of-the-art technological evolution is realized through the use of contemporary software which implements the essentially required, novel, innovative, and featuring value additions. Real-time physical exposure and the data-driven flying nature of aerial vehicles make them vulnerable to an ever-evolving new threat spectrum of cyber security. Nation or state-sponsored cyber attacks through sensors’ data corruption, hardware Trojans, or counterfeit wireless signals may exploit dormant and residual software vulnerabilities. It may lead to severe and catastrophic consequences including but not limited to serious injury or death of the crew, extreme damage or loss to equipment and environment. We have proposed a machine learning based theoretical framework for real-time monitoring and failure analysis of autonomous flight software. It has been introduced to protect the mission-critical flight software from run-time data-driven semantic bugs and exploitation that may be caused by missing, jammed, or spoofed data values, due to malicious online cyber activities. The effectiveness of the proposed framework has been demonstrated by the evaluation of a real-world incident of grounding an aerial vehicle by the actors in their vicinity without the intent of the original equipment manufacturer (OEM). The results show that the reported undesired but successful cyber attack may has been avoided by the effective utilization of our proposed cyber defense approach, which is targeted at software failure prediction, detection, and correction for autonomous aerial vehicles.
基于机器学习的关键任务飞行软件故障预测、检测和修正理论框架
关键任务飞行软件作为自主飞行的控制机制,是航空工业下一代发展的核心。大多数最先进的技术发展都是通过使用当代软件来实现的,这些软件实现了本质上需要的、新颖的、创新的和具有特色的附加价值。飞行器的实时物理暴露和数据驱动的飞行特性使它们容易受到不断发展的网络安全新威胁的影响。通过传感器数据损坏、硬件木马或伪造无线信号进行的国家或国家支持的网络攻击可能会利用休眠和残留的软件漏洞。可能导致严重的灾难性后果,包括但不限于机组人员的严重伤害或死亡、设备和环境的严重损坏或损失。我们提出了一个基于机器学习的自主飞行软件实时监控和故障分析的理论框架。引入它是为了保护关键任务飞行软件免受运行时数据驱动的语义错误和利用,这些错误可能是由于恶意在线网络活动导致的数据值丢失、堵塞或欺骗造成的。所提出的框架的有效性已通过对一个真实世界事件的评估得到证明,该事件是在原始设备制造商(OEM)没有意图的情况下,由其附近的行为者使飞行器停飞。结果表明,通过有效利用我们提出的网络防御方法,可以避免报告中不希望但成功的网络攻击,该方法针对自主飞行器的软件故障预测,检测和纠正。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信