Advertisement

Cyber-Attacks – The Impact Over Airports Security and Prevention Modalities

  • George Suciu
  • Andrei Scheianu
  • Alexandru Vulpe
  • Ioana Petre
  • Victor Suciu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 747)

Abstract

In recent years, we have witnessed an improvement of the systems developed for the prevention of cyber-attacks meant to harm the airports security, due to the increasing number of the sophisticated malicious attacks. The majority of government organizations depends on advanced systems consisting of interconnected computing machines, used to provide public services. This connectivity and online services have many advantages for users, but also, they become vulnerable in case of a cyber-attack. One of the most targeted systems is the one used in the aviation sector, which is also vulnerable in front of physical threats. Since Sept 11th, 2001, an improvement of terrorist tactics was observed, reason why the security of this sector represents a critical consideration. This paper presents a summary of the ongoing research activities taken to improve the security level of airports and proposes a scalable solution for the integration of several security tools, services and fields.

Keywords

Airport Security Cyber-attack Vulnerability 

Notes

Acknowledgments

This paper has been supported in part by UEFISCDI Romania through projects ALADIN, ToR-SIM and ODSI, and funded in part by European Union’s Horizon 2020 research and innovation program under grant agreement No. 777996 (SealedGRID project).

References

  1. 1.
    Bernard, L.: Emerging threats from cyber security in aviation – challenges and mitigations. J. Aviat. Manag. (2014)Google Scholar
  2. 2.
    Tommaso, D.Z., Fabrizio, A., Federica, C.: The Defence of Civilian Air Traffic Systems from Cyber Threats. IAI (2016). http://www.iai.it/sites/default/files/iai1523e.pdf
  3. 3.
    IFALPA: Cyber threats: who controls your aircraft? IFALPA Position Papers, No. 14POS03 (2013). http://www.ifalpa.org/store/14POS03%20-%20Cyber%20threats.pdf
  4. 4.
    CANSO: Cyber Security and Risk Assessment Guide (2014). https://www.canso.org/node/753
  5. 5.
  6. 6.
    Accenture: Midyear cybersecurity risk review forecast and remediations (2017). https://www.accenture.com/t20171010T121722Z__w__/us-en/_acnmedia/PDF-63/Accenture-Cyber-Threatscape-Report.pdf
  7. 7.
    Koch, T., Möller, D.P.F., Deutschmann, A., Milbredt, O.: Model-based airport security analysis in case of blackouts or cyber-attacks. In: 2017 IEEE International Conference on Electro Information Technology (EIT), Lincoln, NE, pp. 143–148 (2017).  https://doi.org/10.1109/eit.2017.8053346
  8. 8.
    Ugwoke, F.N., Okafor, K.C., Chijindu, V.C.: Security QoS profiling against cyber terrorism in airport network systems. In: 2015 International Conference on Cyberspace (CYBER-Abuja), Abuja, pp. 241–251 (2015).  https://doi.org/10.1109/cyber-abuja.2015.7360516
  9. 9.
    Chiappetta, A., Cuozzo, G.: Critical infrastructure protection: beyond the hybrid port and airport firmware security cybersecurity applications on transport. In: 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), Naples, pp. 206–211 (2017).  https://doi.org/10.1109/mtits.2017.8005666
  10. 10.
    ICAO: Aviation Unites on Cyber Threat (2014). http://www.icao.int/Newsroom/Pages/aviation-unites-on-cyberthreat.aspx
  11. 11.
  12. 12.
    Khalid, A.F.: An Analysis of Airports Cyber-Security (2016). http://www.caeaccess.org/research/volume4/number7/fakeeh-2016-cae-652129.pdf
  13. 13.
    Marcel, R., Gerald, T.: Cyber-Attack Warning: Could Hackers Bring Down a Plane? Spiegel Online International (2015). http://spon.de/aevsu
  14. 14.
    McAllister, N.: No, you CAN’T hijack a plane with an Android app. The Register (2013). http://goo.gl/news/0PmU
  15. 15.
    Kim, Z.: Feds Say That Banned Researcher Commandeered a Plane. Wired (2015). http://www.wired.com/?p=1782748
  16. 16.
    Olivier, D., Olivier, R., Eric, V., Chris, J., Matt, S., Piotr, S., Veronika, P.: Cyber-security application for SESAR OFA 05.01.01 - Final report (2016). http://www.sesarju.eu/sites/default/files/documents/news/Addressing_airport_cyber-security_Full_0.pdf
  17. 17.
    Arseni, S.C., Halunga, S., Fratu, O., Vulpe, A., Suciu, G.: Analysis of the security solutions implemented in current Internet of Things platforms. In: IEEE Grid, Cloud & High Performance Computing in Science (ROLCG), pp. 1–4 (2015)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • George Suciu
    • 1
    • 2
  • Andrei Scheianu
    • 1
  • Alexandru Vulpe
    • 2
  • Ioana Petre
    • 1
  • Victor Suciu
    • 1
  1. 1.R&D DepartmentBEIA Consult InternationalBucharestRomania
  2. 2.Telecommunication DepartmentUniversity Politehnica of BucharestBucharestRomania

Personalised recommendations