{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:58:25Z","timestamp":1757779105284,"version":"3.41.0"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T00:00:00Z","timestamp":1667174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Innovation for Defence Excellence and Security (IDEaS) Program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2022,10,31]]},"abstract":"<jats:p>MIL-STD-1553 is a communication bus that has been used by many military avionics platforms, such as the F-15 and F-35 fighter jets, for almost 50 years. Recently, it has become clear that the lack of security on MIL-STD-1553 and the requirement for internet communication between planes has revealed numerous potential attack vectors for malicious parties. Prevention of these attacks by modernizing the MIL-STD-1553 is not practical due to the military applications and existing far-reaching installations of the bus. We present a software system that can simulate bus transmissions to create easy, replicable, and large datasets of MIL-STD-1553 communications. We also propose an intrusion detection system (IDS) that can identify anomalies and the precise type of attack using recurrent neural networks with a reinforcement learning true-skip data selection algorithm. Our IDS outperforms existing algorithms designed for MIL-STD-1553 in binary anomaly detection tasks while also performing attack classification and minimizing computational resource cost. Our simulator can generate more data with higher fidelity than existing methods and integrate attack scenarios with greater detail. Furthermore, the simulator and IDS can be combined to form a web-based attack-defense game.<\/jats:p>","DOI":"10.1145\/3551893","type":"journal-article","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T12:05:45Z","timestamp":1659960345000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation"],"prefix":"10.1145","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1884-9566","authenticated-orcid":false,"given":"Michael Maximilian","family":"Wrana","sequence":"first","affiliation":[{"name":"Queen\u2019s University, Kingston, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9906-5020","authenticated-orcid":false,"given":"Marwa","family":"Elsayed","sequence":"additional","affiliation":[{"name":"Queen\u2019s University, Kingston, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4197-4189","authenticated-orcid":false,"given":"Karim","family":"Lounis","sequence":"additional","affiliation":[{"name":"Queen\u2019s University, Kingston, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0577-2793","authenticated-orcid":false,"given":"Ziad","family":"Mansour","sequence":"additional","affiliation":[{"name":"Queen\u2019s University, Kingston, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4513-200X","authenticated-orcid":false,"given":"Steven","family":"Ding","sequence":"additional","affiliation":[{"name":"Queen\u2019s University, Kingston, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1697-4101","authenticated-orcid":false,"given":"Mohammad","family":"Zulkernine","sequence":"additional","affiliation":[{"name":"Queen\u2019s University, Kingston, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,12,13]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"U.S. Department of Defense. 1978. MIL-STD-1553 designer\u2019s guide. (Sep.1978)."},{"key":"e_1_3_2_3_2","unstructured":"U.S. Army Corps of Engineers Publications Depot 1990 1110 3 Electromagnetic pulse (EMP) and tempest protection for facilities"},{"key":"e_1_3_2_4_2","first-page":"43","article-title":"RAD750 hardware specification","year":"2000","unstructured":"2000. RAD750 hardware specification. BAE Systems (Aug.2000), 43\u201344.","journal-title":"BAE Systems"},{"key":"e_1_3_2_5_2","first-page":"53128","article-title":"Special conditions: Airbus model A350-900 airplane; electronic system-security protection from unauthorized external access","volume":"79","year":"2014","unstructured":"2014. Special conditions: Airbus model A350-900 airplane; electronic system-security protection from unauthorized external access. Federal Aviation Administration 79, FR (Sep.2014), 53128\u201353129.","journal-title":"Federal Aviation Administration"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.234"},{"key":"e_1_3_2_7_2","first-page":"1","article-title":"Time-based intrusion detection on MIL-STD-1553","author":"Losier Blaine","year":"2019","unstructured":"Blaine Losier, Ron Smith, and Vincent Roberge. 2019. Time-based intrusion detection on MIL-STD-1553. Royal Military College of Canada, Project 2102 Technical report, 1\u201338.","journal-title":"Royal Military College of Canada"},{"key":"e_1_3_2_8_2","unstructured":"Victor Campos Brendan Jou Xavier Gir\u00f3-i-Nieto Jordi Torres and Shih-Fu Chang. 2017. Skip RNN: Learning to skip state updates in recurrent neural networks. Retrieved from http:\/\/arxiv.org\/abs\/1708.06834."},{"issue":"1","key":"e_1_3_2_9_2","first-page":"4","article-title":"Administration of aircraft & related ground support network security programs","volume":"232","author":"Carpenter Paula","year":"2013","unstructured":"Paula Carpenter. 2013. Administration of aircraft & related ground support network security programs. Civil Aviat. Advis. Publ. 232A, 1 (Mar.2013), 4\u20139.","journal-title":"Civil Aviat. Advis. Publ."},{"volume-title":"MIL-STD-1553 Tutorial","year":"2000","key":"e_1_3_2_10_2","unstructured":"Condor Engineering. 2000. MIL-STD-1553 Tutorial. Condor Engineering, Santa Barbara, CA."},{"key":"e_1_3_2_11_2","first-page":"38","article-title":"Supply Chain management risks: The A350 development program","author":"Daniela Mocenco","year":"2015","unstructured":"Mocenco Daniela. 2015. Supply Chain management risks: The A350 development program. In Proceedings of the 5th Eastern European Economic and Social Development Conference. 38.","journal-title":"Proceedings of the 5th Eastern European Economic and Social Development Conference"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.6095969"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102097"},{"volume-title":"Aircraft Internal Time Division Multiplex Data Bus","year":"1978","key":"e_1_3_2_14_2","unstructured":"Department of Defense. 1978. Aircraft Internal Time Division Multiplex Data Bus. Department of Defense."},{"key":"e_1_3_2_15_2","first-page":"349","volume-title":"Proceedings of the Papers of the 2nd AFSC Avionics Standardization Conference","volume":"1","author":"Earhart Leroy","year":"1982","unstructured":"Leroy Earhart. 1982. MIL-STD-1553: Testing and test equipment. In Proceedings of the Papers of the 2nd AFSC Avionics Standardization Conference, Vol. 1. 349\u2013365."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977325"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2914519"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3441458"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.2514\/6.2018-3370"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000517"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800194"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900480"},{"key":"e_1_3_2_23_2","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2015. Deep residual learning for image recognition. Retrieved from http:\/\/arxiv.org\/abs\/1512.03385."},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Ting Huang Gehui Shen and Zhi-Hong Deng. 2019. Leap-LSTM: Enhancing long short-term memory for text categorization. Retrieved from http:\/\/arxiv.org\/abs\/1905.11558.","DOI":"10.24963\/ijcai.2019\/697"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3059881"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3445812"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/iMac4s.2013.6526415"},{"key":"e_1_3_2_28_2","unstructured":"Jaeyoung Kim Mostafa El-Khamy and Jungwon Lee. 2017. Residual LSTM: Design of a deep recurrent architecture for distant speech recognition. Retrieved from http:\/\/arxiv.org\/abs\/1701.03360."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.004"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3078192"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363897"},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-49380-8_10","volume-title":"Information Hiding","author":"Kuhn Markus G.","year":"1998","unstructured":"Markus G. Kuhn and Ross J. Anderson. 1998. Soft tempest: Hidden data transmission using electromagnetic emanations. In Information Hiding, David Aucsmith (Ed.). Springer, Berlin, 124\u2013142."},{"issue":"6","key":"e_1_3_2_33_2","first-page":"481","article-title":"A review of manchester, miller, and fm0 encoding techniques","volume":"4","author":"Lalitha V.","year":"2014","unstructured":"V. Lalitha and S. Kathiravan. 2014. A review of manchester, miller, and fm0 encoding techniques. SmartCR 4, 6 (2014), 481\u2013490.","journal-title":"SmartCR"},{"key":"e_1_3_2_34_2","unstructured":"Efrat Levy Nadav Maman Asaf Shabtai and Yuval Elovici. 2022. Anomili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus. Retrieved from https:\/\/arxiv.org\/abs\/2202.06870."},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3433174.3433584"},{"key":"e_1_3_2_37_2","first-page":"131","volume-title":"Sensors and Systems for Space Applications VII","author":"McGraw Robert M.","year":"2014","unstructured":"Robert M. McGraw, Mark J. Fowler, David Umphress, and Richard A. MacDonald. 2014. Cyber threat impact assessment and analysis for space vehicle architectures. In Sensors and Systems for Space Applications VII, Vol. 9085. SPIE, 131\u2013141."},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2000.886964"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110524"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00084"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00227"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/CONIT51480.2021.9498552"},{"key":"e_1_3_2_44_2","first-page":"93","volume-title":"Proceedings of the 11th Australian Workshop on Safety Critical Systems and Software","author":"Squair Matthew John","year":"2007","unstructured":"Matthew John Squair. 2007. Safety, software architecture and MIL-STD-1760. In Proceedings of the 11th Australian Workshop on Safety Critical Systems and Software. 93\u2013112."},{"key":"e_1_3_2_45_2","unstructured":"Rupesh Kumar Srivastava Klaus Greff and J\u00fcrgen Schmidhuber. 2015. Highway networks. Retrieved from http:\/\/arxiv.org\/abs\/1505.00387."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16874-2_11"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2961824"},{"key":"e_1_3_2_48_2","article-title":"Protecting military avionics platforms from attacks on mil-std-1553 communication bus","author":"Stan Orly","year":"2017","unstructured":"Orly Stan, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, and Shachar Kur. 2017. Protecting military avionics platforms from attacks on mil-std-1553 communication bus. Retrieved from https:\/\/arXiv:1707.05032.","journal-title":"https:\/\/arXiv:1707.05032."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101857"},{"key":"e_1_3_2_50_2","first-page":"117","volume-title":"Proceedings of the AUTOTESTCON.","author":"Truitt R. Ben","year":"2004","unstructured":"R. Ben Truitt, Edward Sanchez, and Michael Garis. 2004. Using open networking standards over MIL-STD-1553 networks. In Proceedings of the AUTOTESTCON. IEEE, 117\u2013123."},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09406-3"},{"key":"e_1_3_2_52_2","volume-title":"Compromised by Design?: Securing the Defense Electronics Supply Chain","author":"Villasenor John","year":"2013","unstructured":"John Villasenor. 2013. Compromised by Design?: Securing the Defense Electronics Supply Chain. Center for Technology Innovation at Brookings."},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.2514\/6.2018-3368"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377408"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2019.103863"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3145007"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551893","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:17Z","timestamp":1750186817000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,31]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,10,31]]}},"alternative-id":["10.1145\/3551893"],"URL":"https:\/\/doi.org\/10.1145\/3551893","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"type":"print","value":"2378-962X"},{"type":"electronic","value":"2378-9638"}],"subject":[],"published":{"date-parts":[[2022,10,31]]},"assertion":[{"value":"2021-09-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}