Mathematical model of threats to an aviation data network under unauthorized access
https://doi.org/10.26467/2079-0619-2025-28-4-40-49
Abstract
Due to the increasing integration of onboard and ground-based data networks in aviation and the associated rise in information threats, the development of comprehensive models capable of assessing the security of such systems against unauthorized access is becoming increasingly necessary. One promising direction for enhancing the resilience of aviation networks is the creation of mathematical models that consider not only technical malfunctions and random equipment failures but also deliberate cyberattacks by intruders. This paper proposes a mathematical model of threats to aviation data networks, developed in accordance with ICAO recommendations and the requirements of ARINC standards. The network structure is represented as a directed graph, the nodes and edges of which are characterized by probabilistic indicators of failures and vulnerability to attacks. A distinctive feature of the developed model is the integration of probabilistic characteristics of random equipment failures, intentional attack scenarios, and parameters reflecting the efficiency of systems detecting unauthorized access. Utilizing probabilistic theory approaches, we synthesized an algorithm enabling the calculation of an integral indicator representing the risk of network connectivity loss and performance degradation. A significant aspect of this algorithm is its ability to simultaneously account for various types of threats and quantitatively assess the vulnerability of network elements. Numerical simulations of the proposed model were conducted, and results evaluating the criticality of specific network nodes and data transmission channels are presented. The analysis confirmed that applying the developed mathematical model provides a sound basis for identifying the most vulnerable aviation network components and selecting appropriate protective measures.
About the Authors
A. A. GanichevRussian Federation
Alexandr A. Ganichev, Senior Lecturer, the Chair of Fundamentals of Radio Engineering and Information Security
Moscow
V. I. Petrov
Russian Federation
Viktor I. Petrov, Candidate of Technical Sciences, Associate Professor, the Head of the Chair of Fundamentals of Radio Engineering and Information Security, the Dean of the Faculty of Aviation Systems and Complexes
Moscow
References
1. Ukwandu, E., Ben-Farah, M.A., Hindy, H. et al. (2022). Cyber-security challenges in aviation industry: a review of current and future trends. Information, vol. 13, no. 3, ID: 146. DOI: 10.3390/info13030146 (accessed: 20.11.2024).
2. Ben Mahmoud, M.S., Pirovano, A., Larrieu, N. (2014). Aeronautical communication transition from analog to digital data: A network security survey. Computer Science Review, vol. 11–12, pp. 1–29. DOI: 10.1016/j.cosrev.2014.02.001
3. Kızılcan, S., Mızrak, K.C. (2022). Cyber attacks in civil aviation and the concept of cyber security. International Journal of Disciplines Economics & Administrative Sciences Studies, vol. 8, no. 47, pp. 742–752. DOI: 10.29228/ideas.65891
4. Gaurav, D., Gaurav, Ch., Vikas, S., Ilsun, Y., Kim-Kwang, R.Ch. (2022). Cyber security challenges in aviation communication, navigation, and surveillance. Computers & Security, vol. 113. ID: 102516. DOI: 10.1016/j.cose.2021.102516 (accessed: 20.11.2024).
5. Kagalwalla, N., Churi, P.P. (2019). Cybersecurity in aviation: An intrinsic review. In: 2019 5th International Conference On Computing, Communication, Control and Automation (ICCUBEA), India, Pune, pp. 1–6. DOI: 10.1109/ICCUBEA47591.2019.9128483 (accessed: 20.11.2024).
6. Corretjer, P.J. (2018). A Cybersecurity analysis of today’s commercial aircrafts and aviation industry systems: A thesis master of science. USA, NY, Utica College, 22 p.
7. Kulik, A.A., Bolshakov, A.A. (2021). Methodological approaches to development of intelligent aviation safety control system. Vestnik of Astrakhan State Technical University. Series: Management, Computer Science and Informatics, no. 3, pp. 41–48. DOI: 10.24143/2072-9502-2021-3-41-48 (in Russian)
8. Basora, L., Olive, X., Dubot, T. (2019). Recent advances in anomaly detection methods applied to aviation. Aerospace, vol. 6, no. 11, ID: 117. DOI: 10.3390/aerospace6110117 (accessed: 20.11.2024).
9. Zhang, R., Liu, G., Liu, J., Nees, J.P. (2018). Analysis of message attacks in aviation data-link communication. IEEE Access, vol. 6, pp. 455–463. DOI: 10.1109/ACCESS.2017.2767059 (accessed: 20.11.2024).
10. Meshankov, D.V., Tikhonov, A.I. (2021). Implementation of a new safety information system. Moscow Economic Journal, no. 10. DOI: 10.24411/2413-046X-2021-10601 (accessed: 20.11.2024). (in Russian)
11. Koptev, D.S., Mukhin, I.E. (2020). Concept of integrated airborne systems for providing aircraft operations safety, including systems for monitoring the functional state of the operator. T-Comm, vol. 14, no. 12, pp. 58–65. DOI: 10.36724/2072-8735-2020-14-12-58-65
12. Ganichev, A.A., Pitelinskiy, K.V., Britvina, V.V. (2024). Statistical analysis of potential threats to information security in the aircraft on-board network. Information security questions, no. 1 (144), pp. 11–22. DOI: 10.52190/2073-2600_2024_1_11 (in Russian)
13. Petrov, V.I. (2016). Undeclared Capabilities of Aircraft Onboard Computer Software. In: Grazhdanskaya aviatsiya na sovremennom etape razvitiya nauki, tekhniki i obshchestva: sbornik tezisov dokladov Mezhdunarodnoy nauchno-tekhnicheskoy konferentsii, posvyashchennoy 45-letiyu Universiteta, p. 160. (in Russian)
14. Taleqani, A.R., Nygard, K.E., Bridgelall, R., Hough, J. (2018). Machine learning approach to cyber security in aviation. In: 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, USA, pp. 0147–0152. DOI: 10.1109/EIT.2018.8500165
15. Wrana, M.M., Elsayed, M., Lounis, K., Mansour, Z., Ding, S., Zulkernine, M. (2022). OD1NF1ST: True skip intrusion detection and avionics network cyber-attack simulation. ACM Transactions on Cyber-Physical Systems, vol. 6, no. 4, ID: 33, 27 p. DOI: 10.1145/3551893 (accessed: 20.11.2024).
16. Mashoshin, A.O. (2021). Message verification of the automatic dependent surveillance system under unauthorized intervention using the monolateration method. Scientific Bulletin of the State Scientific Research Institute of Civil Aviation (GosNII GA), no. 37, pp. 136–145. (in Russian)
17. Ganichev, A.A., Pitelinskiy, K.V., Kesel, S.A., Pikov, V.A. (2024). Threat model of unauthorized interference in wireless avionics information systems. Information security questions, no. 4 (147), pp. 35–43. DOI: 10.52190/2073-2600_2024_4_35 (in Russian)
18. Petrov, V.I. (2017). The technique of analysis of software of on-board computers of air vessel to absence of undeclared capabilities by signature-heuristic way. Civil Aviation High Technologies, vol. 20, no. 1, pp. 186–193. (in Russian)
19. Kessler, G.C., Craiger, J.P. (2018). Aviation cybersecurity: An overview. In: The National Training Aircraft Symposium (NTAS) 2018. Available at: https://commons.erau.edu/ntas/2018/presentations/37/ (accessed: 20.11.2024).
20. Israfilov, A. (2024). Contemporary challenges in cybersecurity of unmanned aerial systems. Universum: Technical Sciences, no. 2 (119). Available at: https://7universum.com/ru/tech/archive/item/16760 (accessed: 20.11.2024). (in Russian)
21. Lyanguzov, D.A., Plyusnin, N.I. (2023). Security and vulnerability of unmanned aerial vehicle networks: a review. Izvestiya Tulskogo gosudarstvennogo universiteta. Tekhnicheskiye nauki, issue 7, pp. 528–529. DOI: 10.24412/2071-6168-2023-7-528-529 (in Russian)
22. Costin, A., Turtiainen, H., Khandker, S., Hämäläinen, T. (2023). Towards a unified cybersecurity testing lab for satellite, aerospace, avionics, maritime, drone (SAAMD) technologies and communications. Cryptography and Security. DOI: 10.48550/arXiv.2302.08359 (accessed: 20.11.2024).
23. Habler, E., Bitton, R., Shabtai, A. (2022). Evaluating the security of aircraft systems. Cryptography and Security, 38 p. DOI: 10.48550/arXiv.2209.04028 (accessed: 20.11.2024).
Review
For citations:
Ganichev A.A., Petrov V.I. Mathematical model of threats to an aviation data network under unauthorized access. Civil Aviation High Technologies. 2025;28(4):40-49. https://doi.org/10.26467/2079-0619-2025-28-4-40-49