{"title":"交通避碰系统:威胁参与者模型与攻击分类","authors":"John Hannah, R. Mills, Richard Dill","doi":"10.23919/NTCA50409.2020.9291180","DOIUrl":null,"url":null,"abstract":"As air travel increases across the globe, the opportunities for exploiting air communications increase as well. In modern aviation technology, the Traffic Collision Avoidance System (TCAS) is used to deter mid-air collisions between aircraft. With an increase in the air traffic, it is imperative for the safety of passengers that TCAS properly functions. This paper aims to present the first TCAS threat actor model, adapted from a cyber threat model. The determined threat actors include: Advanced Persistent Threats (APTs), Insider Threats, Criminal Organizations, and Hobbyists. Additionally, the paper presents the first taxonomy of communication threats against TCAS. Using an Automatic dependent surveillance–broadcast (ADS-B) threat model, the TCAS threats are categorized into passive, eavesdropping and active attacks, ghosting, denial-of-service, and spoofing. Furthermore, the paper presents the requirements necessary to successfully implement a spoofing attack. After the taxonomy of threats are presented, future work is discussed regarding the current TCAS implementation and future versions.","PeriodicalId":198861,"journal":{"name":"2020 New Trends in Civil Aviation (NTCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Traffic Collision Avoidance System: Threat Actor Model and Attack Taxonomy\",\"authors\":\"John Hannah, R. Mills, Richard Dill\",\"doi\":\"10.23919/NTCA50409.2020.9291180\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As air travel increases across the globe, the opportunities for exploiting air communications increase as well. In modern aviation technology, the Traffic Collision Avoidance System (TCAS) is used to deter mid-air collisions between aircraft. With an increase in the air traffic, it is imperative for the safety of passengers that TCAS properly functions. This paper aims to present the first TCAS threat actor model, adapted from a cyber threat model. The determined threat actors include: Advanced Persistent Threats (APTs), Insider Threats, Criminal Organizations, and Hobbyists. Additionally, the paper presents the first taxonomy of communication threats against TCAS. Using an Automatic dependent surveillance–broadcast (ADS-B) threat model, the TCAS threats are categorized into passive, eavesdropping and active attacks, ghosting, denial-of-service, and spoofing. Furthermore, the paper presents the requirements necessary to successfully implement a spoofing attack. After the taxonomy of threats are presented, future work is discussed regarding the current TCAS implementation and future versions.\",\"PeriodicalId\":198861,\"journal\":{\"name\":\"2020 New Trends in Civil Aviation (NTCA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 New Trends in Civil Aviation (NTCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/NTCA50409.2020.9291180\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 New Trends in Civil Aviation (NTCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/NTCA50409.2020.9291180","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Traffic Collision Avoidance System: Threat Actor Model and Attack Taxonomy
As air travel increases across the globe, the opportunities for exploiting air communications increase as well. In modern aviation technology, the Traffic Collision Avoidance System (TCAS) is used to deter mid-air collisions between aircraft. With an increase in the air traffic, it is imperative for the safety of passengers that TCAS properly functions. This paper aims to present the first TCAS threat actor model, adapted from a cyber threat model. The determined threat actors include: Advanced Persistent Threats (APTs), Insider Threats, Criminal Organizations, and Hobbyists. Additionally, the paper presents the first taxonomy of communication threats against TCAS. Using an Automatic dependent surveillance–broadcast (ADS-B) threat model, the TCAS threats are categorized into passive, eavesdropping and active attacks, ghosting, denial-of-service, and spoofing. Furthermore, the paper presents the requirements necessary to successfully implement a spoofing attack. After the taxonomy of threats are presented, future work is discussed regarding the current TCAS implementation and future versions.