[go: up one dir, main page]

CN103139779A - Denial service attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain - Google Patents

Denial service attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain Download PDF

Info

Publication number
CN103139779A
CN103139779A CN2011103892257A CN201110389225A CN103139779A CN 103139779 A CN103139779 A CN 103139779A CN 2011103892257 A CN2011103892257 A CN 2011103892257A CN 201110389225 A CN201110389225 A CN 201110389225A CN 103139779 A CN103139779 A CN 103139779A
Authority
CN
China
Prior art keywords
acars
dsp
data link
ground
messages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103892257A
Other languages
Chinese (zh)
Inventor
吴志军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Civil Aviation University of China
Original Assignee
Civil Aviation University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Civil Aviation University of China filed Critical Civil Aviation University of China
Priority to CN2011103892257A priority Critical patent/CN103139779A/en
Publication of CN103139779A publication Critical patent/CN103139779A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

ACARS数据链是一种甚高频数据链,主要用于飞机与地面的通信。本发明提出一种ACARS数据链安全渗透测试方法。主要根据ACARS数据链存在的信息无加密、无认证的安全漏洞,模拟了一种拒绝服务攻击。ACARS系统中,没有身份验证机制,一个实体很容易伪装成某个机载通信终端,向DSP发送大量伪造报文,阻碍DSP系统的正常运行。本发明通过一台计算机经过简单装备,伪装成机载通信终端,向地面DSP发送非法控制消息,DSP无法验证身份的合法性,因此对非法报文进行应答,耗尽自身资源,进而失去了对合法报文的应答能力。使用本发明的技术方案,可以挖掘ACARS数据链的安全隐患,对保护ACARS数据链的安全有积极的作用。The ACARS data link is a very high frequency data link, mainly used for communication between aircraft and the ground. The invention proposes an ACARS data link security penetration testing method. A denial of service attack is simulated mainly based on the security loopholes in the ACARS data link without encryption and authentication. In the ACARS system, there is no identity verification mechanism, and an entity can easily pretend to be an airborne communication terminal and send a large number of forged messages to the DSP, hindering the normal operation of the DSP system. In the present invention, through simple equipment, a computer is disguised as an airborne communication terminal, and sends an illegal control message to the ground DSP. The DSP cannot verify the legality of the identity, so it responds to the illegal message, exhausts its own resources, and then loses control over the illegal message. The ability to respond to legal packets. Using the technical scheme of the invention, the potential safety hazards of the ACARS data chain can be excavated, and it has a positive effect on protecting the safety of the ACARS data chain.

Description

针对ACARS数据链的拒绝服务攻击渗透测试方法Denial of service attack penetration testing method for ACARS data link

技术领域 technical field

本发明涉及一种航空甚高频数据链安全技术,尤其是针对飞机通信寻址报告系统(AircraftCommunication Addressing and Reporting System,ACARS)数据链的拒绝服务攻击的渗透测试,可以深入挖掘ACARS的安全隐患,对保障ACARS数据链的安全起到积极地作用。The present invention relates to an aviation VHF data link security technology, especially for the penetration test of the denial of service attack on the Aircraft Communication Addressing and Reporting System (ACARS) data link, which can dig deep into the security risks of ACARS, It plays an active role in ensuring the security of the ACARS data link.

背景技术 Background technique

ACARS是ARINC通信寻址报告系统的缩写词。该系统用于通过自动报告飞机的到达和离场时间以及其它任务飞行数据来减少话音通信的要求。系统使用一个指定的机载甚高频频率来发射和接收来自一个装备相同设备的地面站的数据。ACARS is an acronym for ARINC Communications Addressing Reporting System. The system is designed to reduce voice communication requirements by automatically reporting aircraft arrival and departure times and other mission flight data. The system uses a designated airborne VHF frequency to transmit and receive data from an identically equipped ground station.

ACARS如今在全世界商业航空日复一日地顺利运行。民航系统使用ACARS系统对雷达没有办法覆盖的海洋区域进行空中交通管制。通过ACARS系统传输的自动位置报告可以让空中交通管制员准确的监视飞机的位置。另外,管制员可以发送空中交通管理信息给飞行员来积极的掌控飞机的飞行。同样,ACARS在减小海洋空域间隔标准上也有重要贡献。ACARS is now operating smoothly day in and day out in commercial aviation around the world. The civil aviation system uses the ACARS system for air traffic control over oceanic areas that cannot be covered by radar. Automatic position reports transmitted through the ACARS system allow air traffic controllers to accurately monitor the aircraft's position. In addition, controllers can send air traffic management messages to pilots to actively control the flight of the aircraft. Likewise, ACARS has made an important contribution to the reduction of separation standards in oceanic airspace.

通过分析ACARS报文可以得到飞机的型号,外部环境,位置,预定航线,货物内容和航班的详细操作。航空人员希望可以保护这些信息以维持竞争中的优势,来确保飞行的安全和降低操作风险。By analyzing the ACARS message, the aircraft model, external environment, location, scheduled route, cargo content and detailed operation of the flight can be obtained. Aviation personnel want to protect this information to maintain a competitive advantage, to ensure flight safety and reduce operational risk.

通常美国的军用飞机在民用空域飞行时被要求遵守空中交通规则。自从ACARS被应用于南太平洋地区的空中交通管制后,美国空军开始在他们的运输机上装备ACARS以适应民用航空规则。ACARS系统的实用性还给美国空军带来了额外的利益,因为ACARS可以用于日常无需保密的通信,从而保留了军用通信系统交通高优先级的能力。从安全意义上来说,军方操作人员需要很长一段时间来适应现有的民用ACARS系统。如果信息可以通过ACARS比较安全交换,那么美国空军将允许机群使用ACARS数据链来与世界范围内任何飞行器信息实时交换,进而提高他们的操作效率。U.S. military aircraft are generally required to obey air traffic rules when flying in civilian airspace. Since ACARS was applied to air traffic control in the South Pacific region, the U.S. Air Force began to equip their transport aircraft with ACARS to comply with civil aviation regulations. The availability of the ACARS system also brings additional benefits to the US Air Force, because ACARS can be used for routine unclassified communications, thereby preserving the high-priority capability of military communication systems for traffic. In terms of security, it will take a long time for military operators to adapt to the existing civilian ACARS system. If information can be exchanged more securely via ACARS, the Air Force will allow fleets to use ACARS data links to exchange information with any aircraft in the world in real time, increasing their operational efficiency.

ACARS信息在公开的RF频道以明文形式传输。只要很低的成本,任何人都可用检测设备来监听和处理ACARS信息。另外,如果装载有ACARS系统的空军飞机在执行任务过程中发送的报文被敌方截获,将可能会给任务的执行带来毁灭性的后果。“9.11”事件之后,各个国家对于反对恐怖主义的袭击更加重视,然而如果ACARS数据链被恐怖分子攻击或者利用,将会对国家的安全造成巨大的影响。因此航空公司,国家的特种飞行,和军方都迫切需要有安全的ACARS网络系统来保障其敏感或者秘密信息的安全传输。ACARS information is transmitted in clear text on a public RF channel. As long as the cost is very low, anyone can monitor and process ACARS information with detection equipment. In addition, if the messages sent by the air force aircraft equipped with the ACARS system are intercepted by the enemy during the execution of the mission, it may bring devastating consequences to the execution of the mission. After the "9.11" incident, various countries have paid more attention to anti-terrorist attacks. However, if the ACARS data link is attacked or used by terrorists, it will have a huge impact on national security. Therefore, airlines, national special aviation, and the military all urgently need a secure ACARS network system to ensure the safe transmission of sensitive or secret information.

ACARS系统作为地空数据链地面应用系统,已经成为各航空公司的生产系统,到目前为止,70%以上的100座客机都已经加装ACARS机载设备。各航空公司对ACARS系统的依赖性越来越大,一方面可以保证飞机飞行安全,另一方面可以显著提高公司的运营效益,这对ACARS系统的安全稳定运行就提出了很高的要求。同时,根据中国民航局的规定,所有飞机都要加装ACARS机载电子设备,而且ACARS系统应用范围会不断扩大,有效地保障ACARS系统的安全可以避免给国家,航空公司以及网络运营者带来巨大损失。因此,确保ACARS系统的信息安全具有重要的经济意义和政治意义。The ACARS system, as the ground application system of the ground-air data link, has become the production system of various airlines. So far, more than 70% of the 100-seat passenger planes have been equipped with ACARS airborne equipment. All airlines rely more and more on the ACARS system. On the one hand, it can ensure the flight safety of the aircraft, and on the other hand, it can significantly improve the company's operating efficiency. This puts forward high requirements for the safe and stable operation of the ACARS system. At the same time, according to the regulations of the Civil Aviation Administration of China, all aircraft must be equipped with ACARS airborne electronic equipment, and the application range of the ACARS system will continue to expand. Effectively ensuring the safety of the ACARS system can avoid bringing harm to the country, airlines and network operators. huge loss. Therefore, ensuring the information security of ACARS system has important economic and political significance.

发明内容 Contents of the invention

ACARS系统中,攻击者可以通过向地面站发送大量伪信息,使地面站不能响应正常的飞机通信,造成地面站拒绝服务。或者攻击者伪装成终端向数据链路发送大量无用的ACARS信息,使信息处理中心服务器负载过重,资源耗尽,不能够响应正常的信息,从而造成服务器的拒绝服务。拒绝服务攻击会造成正常通信的中断,严重威胁到飞行的安全。In the ACARS system, the attacker can send a large amount of false information to the ground station, so that the ground station cannot respond to normal aircraft communication, causing the ground station to deny service. Or the attacker pretends to be a terminal and sends a large amount of useless ACARS information to the data link, causing the server of the information processing center to be overloaded and resources exhausted, unable to respond to normal information, thus causing the server to deny service. Denial of service attacks will cause interruption of normal communication and seriously threaten the safety of flight.

本发明根据ACARS数据链信息安全研究的需要,使用C++和C#语言,构建了ACARS数据链信息安全保障系统演示平台。ACARS数据链安全性研究的平台包括:1个飞机航路演示、1个机载模拟通信管理组件(Communication Management Unit,CMU)、2个远端地面站(Remote Ground Station,RGS)(1个可靠,1个非法)、DSP1个、1个报文解析器、1个数据链终端用户(航空公司)、1个攻击端(具备空地通信能力)。本发明的目的是按照ACARS系统报文的传输规则,验证ACARS系统可能存在的安全威胁,演示效果。According to the needs of ACARS data link information security research, the present invention uses C++ and C# languages to build an ACARS data link information security guarantee system demonstration platform. The platform for ACARS data link security research includes: 1 aircraft route demonstration, 1 airborne analog communication management unit (Communication Management Unit, CMU), 2 remote ground stations (Remote Ground Station, RGS) (1 reliable, 1 illegal), 1 DSP, 1 message parser, 1 data link end user (airline), 1 attack end (with air-to-ground communication capability). The purpose of the present invention is to verify possible security threats in the ACARS system and demonstrate the effect according to the transmission rules of the ACARS system messages.

CMU是ACARS安全仿真系统中的重要部分,该模块实现模拟机载CMU的各功能特性,包括ACARS报文的自动/手动发送、人机交互界面(航线管理和飞机运行状态显示)和标准接口的仿真实现。CMU is an important part of the ACARS safety simulation system. This module implements the functions and characteristics of the simulated airborne CMU, including automatic/manual transmission of ACARS messages, human-computer interaction interface (route management and aircraft operation status display) and standard interface. simulation implementation.

RGS是甚高频数据链系统的地面节点,用于连接飞机与地面数据通信网,并可实现地面数据通信网节点间数据通信。他能提供飞机与地面网之间的双向数据通信。RGS站的功能表现在对上行、下行数据信息的处理和监视,并且能有效、快速、准确地将数据分发给飞机和地面数据通信网。RGS is the ground node of the VHF data link system, which is used to connect the aircraft and the ground data communication network, and can realize data communication between nodes of the ground data communication network. He can provide two-way data communication between the aircraft and the ground network. The function of the RGS station is to process and monitor the uplink and downlink data information, and can effectively, quickly and accurately distribute the data to the aircraft and the ground data communication network.

DSP主要包括俩大核心模块:第一,实现ARINC618与ARINC620两种报文格式的双向互转;第二,实现双向的信息路由。DSP mainly includes two major core modules: first, to realize two-way mutual conversion between ARINC618 and ARINC620 message formats; second, to realize two-way information routing.

报文解析器模块当系统接受到DSP发出的报文后,自动进行解析,根据ARINC 620协议,将报文转换成元格式(使用XML格式),并且自动发送给它的下位机,通知已接受到报文。Message parser module When the system receives the message sent by DSP, it will automatically analyze it, convert the message into meta format (using XML format) according to the ARINC 620 protocol, and automatically send it to its lower computer to notify that it has been accepted to the message.

攻击端模块是ACARS安全演示系统中的重要部分,它具备对正常空地通信进行通信监视的功能,包括飞机与DSP之间所有的报文通信,并将收到的上行与下行报文在界面中进行原文和十六进制的显示。同时攻击端还具备进行拒绝服务攻击的能力。The attack module is an important part of the ACARS safety demonstration system. It has the function of monitoring normal air-ground communications, including all message communications between the aircraft and DSP, and displays the received uplink and downlink messages in the interface. Display original text and hexadecimal. At the same time, the attacker also has the ability to carry out denial of service attacks.

航空公司模块用于模拟航空公司对报文的使用过程。对报文的操作分布在两个界面上,即:报文编辑录入界面和报文输出显示界面。The airline module is used to simulate the airline's use of messages. The operation of the message is distributed on two interfaces, namely: the message editing and input interface and the message output display interface.

附图说明 Description of drawings

图1为ACARS模拟系统网络架构。Figure 1 is the ACARS simulation system network architecture.

图2为ARINC618上下行数据格式。Figure 2 is ARINC618 uplink and downlink data format.

图3为拒绝服务攻击效果。Figure 3 shows the effect of denial of service attack.

具体实施方式 Detailed ways

1、按照图1模拟的系统架构,在机载CMU点击航线管理模块开始,飞机开始飞行。1. According to the system architecture simulated in Figure 1, click the route management module on the onboard CMU to start, and the aircraft starts to fly.

2、在攻击端伪装为合法飞机向DSP发送报文,点击攻击端拒绝服务图标。2. On the attack end, pretend to be a legitimate aircraft and send a message to the DSP, and click the attack end denial of service icon.

3、点击发送,开始伪装机载终端向DSP发送信息。3. Click Send to start disguising the airborne terminal to send information to the DSP.

4、在DSP模块可见DSP正常接收了请求,并做出应答。4. In the DSP module, it can be seen that the DSP has received the request normally and responded.

5、正常飞机下行报文到达DSP,DSP无法应答,正常报文重发。5. The downlink message of the normal aircraft reaches the DSP, but the DSP cannot respond, and the normal message is resent.

Claims (3)

1.ACARS数据链属于无线网络,比起有线网络来说更容易受到攻击。ACARS信息完全以明文的形式传输,没有加密机制和消息认证机制,任何人只要拥有一台电脑、声卡、射频天线和可用的免费软件就可以很方便的获得几乎所有的ACARS信息,并且现已有软件可以模拟飞机终端或者管制员终端,与真实终端进行通信。由于DSP所能提供的服务能力有限,所以当一个攻击者发送大量伪造报文时,DSP面临资源耗尽的安全威胁,导致不能为合法机载终端提供服务。1. The ACARS data link is a wireless network, which is more vulnerable to attacks than wired networks. ACARS information is completely transmitted in the form of plain text, without encryption mechanism and message authentication mechanism, anyone can easily obtain almost all ACARS information as long as they have a computer, sound card, radio frequency antenna and available free software, and there are already The software can simulate an aircraft terminal or a controller terminal, and communicate with a real terminal. Due to the limited service capability that the DSP can provide, when an attacker sends a large number of forged messages, the DSP faces the security threat of resource exhaustion, resulting in the inability to provide services for legal airborne terminals. 2.根据权利要求1所述的ACARS数据链存在的安全隐患,发明一种针对ACARS数据链系统的拒绝服务渗透测试方法,其特征在于所述测试方法包括以下步骤:2. according to the potential safety hazard that ACARS data chain exists according to claim 1, invent a kind of denial of service penetration testing method for ACARS data chain system, it is characterized in that described testing method comprises the following steps: 1)以ARINC618协议和ARINC620协议为参照,模拟一个ACARS数据链系统,包括机载终端、RGS远端地面站、DSP数据链服务提供商、地面终端用户。系统具备空地通信能力。1) Taking ARINC618 protocol and ARINC620 protocol as reference, simulate an ACARS data link system, including airborne terminal, RGS remote ground station, DSP data link service provider, and ground terminal user. The system has air-to-ground communication capability. 2)模拟一个ACARS数据链攻击端,具备对正常空地通信进行通信监视的功能,包括飞机与DSP之间所有的报文通信。2) Simulate an ACARS data link attack end, which has the function of communication monitoring for normal air-ground communication, including all message communication between aircraft and DSP. 3)攻击端对上下行报文进行窃取,获取相关信息,包括航班号、机尾号等。3) The attack end steals the uplink and downlink messages and obtains relevant information, including flight number, tail number, etc. 4)攻击端窃取相关信息后,模拟正常的机载终端,向DSP发出大量伪造报文。4) After the attack end steals relevant information, it simulates a normal airborne terminal and sends a large number of forged messages to the DSP. 5)DSP收到伪造报文,无法辨别其合法性,对大量伪造的报文进行处理,耗尽自身资源。DSP拒绝对正常飞机的服务。5) DSP receives the forged message, cannot distinguish its legitimacy, and processes a large number of forged messages, exhausting its own resources. DSP denies service to normal aircraft. 3.根据2所述的ACARS数据链拒绝服务攻击测试方法,其特征在于:3. according to the ACARS data link denial of service attack test method described in 2, it is characterized in that: 1)正常的空地数据链数据格式符合ARINC618标准,DSP与地面数据链用户通信,数据格式符合ARINC620标准。1) The data format of the normal air-ground data link conforms to the ARINC618 standard, and the DSP communicates with the ground data link user, and the data format conforms to the ARINC620 standard. 2)攻击端模拟机载终端,具有收发空地数据的能力。能提取合法信息的有用字段来生成非法报文,可以主动发送下行伪造数据。2) The attack end simulates the airborne terminal and has the ability to send and receive air-ground data. It can extract useful fields of legal information to generate illegal messages, and can actively send downlink forged data. 3)地面通信终端无法识别非法信息,对非法报文进行正常的处理,包括非法报文的显示和应答。机载终端得不到DSP应答,重复发送相同报文。3) The ground communication terminal cannot identify illegal information, and normally handles illegal messages, including displaying and responding to illegal messages. The airborne terminal cannot get a response from the DSP, and sends the same message repeatedly.
CN2011103892257A 2011-11-30 2011-11-30 Denial service attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain Pending CN103139779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103892257A CN103139779A (en) 2011-11-30 2011-11-30 Denial service attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103892257A CN103139779A (en) 2011-11-30 2011-11-30 Denial service attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain

Publications (1)

Publication Number Publication Date
CN103139779A true CN103139779A (en) 2013-06-05

Family

ID=48498968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103892257A Pending CN103139779A (en) 2011-11-30 2011-11-30 Denial service attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain

Country Status (1)

Country Link
CN (1) CN103139779A (en)

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李建军等: "《空地数据链机载仿真系统设计研究》", 《航空电子技术》 *
王晓琳等: "《ACARS数据链中的安全通信》", 《第七届全国航空通讯导航技术学术研讨会》 *

Similar Documents

Publication Publication Date Title
Costin et al. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
Gupta et al. Blockchain‐assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges
Sampigethaya et al. Future e-enabled aircraft communications and security: The next 20 years and beyond
CN103139165A (en) Entity masquerade attack penetration testing method for ACARS data link
CN102045168A (en) Aviation security management over broadband air/ground networks
US11190531B2 (en) Systems for secure data connections in an aviation environment
Strohmeier Security in next generation air traffic communication networks
Shaikh et al. A review of recent advances and security challenges in emerging E-enabled aircraft systems
Zhang et al. Analysis of message attacks in aviation data-link communication
Sampigethaya et al. Cyber security of unmanned aircraft system traffic management (UTM)
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront
Bogoda et al. A systems engineering approach to appraise cybersecurity risks of CNS/ATM and avionics systems
Lehto et al. Controller pilot data link communication security: A practical study
Bresteau et al. On the security of aeronautical datalink communications: Problems and solutions
Abro et al. Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats. Drones 2022, 6, 284
Kacem et al. Secure ADS-B framework “ADS-Bsec”
Ishtiaq et al. Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry
Bernsmed et al. Security requirements for SATCOM datalink systems for future air traffic management
Harison et al. Survey of cyber threats in air traffic control and aircraft communications systems
Monteiro et al. An integrated mission and cyber simulation for Air Traffic Control
CN103139779A (en) Denial service attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain
Efe et al. Air traffic security against cyber threats
Haass et al. A framework for aviation cybersecurity
Xie et al. Cybersecurity trends in low-altitude air traffic management
Risley et al. Experimental encryption of aircraft communications addressing and reporting system (ACARS) aeronautical operational control (AOC) messages

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130605