Challenges with the Application of Cyber Security for Airworthiness
(CSA) in Real-World Contexts
- URL: http://arxiv.org/abs/2305.09261v1
- Date: Tue, 16 May 2023 08:10:25 GMT
- Title: Challenges with the Application of Cyber Security for Airworthiness
(CSA) in Real-World Contexts
- Authors: Beckett LeClair, James McLeod, Lee Ramsay, Mick Warren
- Abstract summary: The push towards reliance on computerised technology in commercial, general, and military aerospace brings with it an increasing amount of potential cyber hazards and attacks.
recognized Good Practice standards such as DO 326A and ED 202A attempt to address this by providing guidelines for cyber security on in-service aircraft.
This work explores the interrelated challenges surrounding real-world applications of CSA and the beginnings of how these may be overcome.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The ever increasing push towards reliance upon computerised technology in
commercial, general, and military aerospace brings with it an increasing amount
of potential cyber hazards and attacks. Consequently, the variety of attack
vectors is greater than ever. Recognized Good Practice standards such as DO
326A and ED 202A attempt to address this by providing guidelines for cyber
security on in-service aircraft, though implementation work for such
initiatives is still in early stages. From previous work on in service
aircraft, the authors have determined that one of the key challenges is that of
the retrospective application of new regulations to existing designs. This can
present significant requirements for time, money, and Suitably Qualified and
Experienced Personnel resource, things which are often in already limited
supply in military environments. The authors have previously explored efficient
ways of approaching compliance, with promising results. There is still the need
to consider this retroactivity challenge in tandem with other key factors
affecting the application of CSA, in order to determine any more potential
mitigating actions that could lower the barrier to effective and efficient
implementation of secure approaches in the air domain. This work explores the
interrelated challenges surrounding real-world applications of CSA and the
beginnings of how these may be overcome.
Related papers
- Intercepting Unauthorized Aerial Robots in Controlled Airspace Using Reinforcement Learning [2.519319150166215]
The proliferation of unmanned aerial vehicles (UAVs) in controlled airspace presents significant risks.
This work addresses the need for robust, adaptive systems capable of managing such threats through the use of Reinforcement Learning (RL)
We present a novel approach utilizing RL to train fixed-wing UAV pursuer agents for intercepting dynamic evader targets.
arXiv Detail & Related papers (2024-07-09T14:45:47Z) - Aquatic Navigation: A Challenging Benchmark for Deep Reinforcement Learning [53.3760591018817]
We propose a new benchmarking environment for aquatic navigation using recent advances in the integration between game engines and Deep Reinforcement Learning.
Specifically, we focus on PPO, one of the most widely accepted algorithms, and we propose advanced training techniques.
Our empirical evaluation shows that a well-designed combination of these ingredients can achieve promising results.
arXiv Detail & Related papers (2024-05-30T23:20:23Z) - Safety through Permissibility: Shield Construction for Fast and Safe Reinforcement Learning [57.84059344739159]
"Shielding" is a popular technique to enforce safety inReinforcement Learning (RL)
We propose a new permissibility-based framework to deal with safety and shield construction.
arXiv Detail & Related papers (2024-05-29T18:00:21Z) - A Safe Harbor for AI Evaluation and Red Teaming [124.89885800509505]
Some researchers fear that conducting such research or releasing their findings will result in account suspensions or legal reprisal.
We propose that major AI developers commit to providing a legal and technical safe harbor.
We believe these commitments are a necessary step towards more inclusive and unimpeded community efforts to tackle the risks of generative AI.
arXiv Detail & Related papers (2024-03-07T20:55:08Z) - A Review on Internet of Things for Defense and Public Safety [0.9320657506524147]
The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures.
This survey analyzes the great potential for applying IoT technologies to revolutionize modern warfare and provide benefits similar to those in industry.
It identifies scenarios where Defense and Public Safety could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders.
arXiv Detail & Related papers (2024-02-06T00:16:01Z) - MADRL-based UAVs Trajectory Design with Anti-Collision Mechanism in
Vehicular Networks [1.9662978733004604]
In upcoming 6G networks, unmanned aerial vehicles (UAVs) are expected to play a fundamental role by acting as mobile base stations.
One of the most challenging problems is the design of trajectories for multiple UAVs, cooperatively serving the same area.
We propose a rank-based binary masking approach to address these issues.
arXiv Detail & Related papers (2024-01-21T20:08:32Z) - Towards Engineering Fair and Equitable Software Systems for Managing
Low-Altitude Airspace Authorizations [40.00051324311249]
Small Unmanned Aircraft Systems (sUAS) have gained widespread adoption across a diverse range of applications.
FAA is developing a UAS Traffic Management (UTM) system to control access to airspace based on an sUAS's predicted ability to safely complete its mission.
This paper explores stakeholders' perspectives on factors that should be considered in an automated system.
arXiv Detail & Related papers (2024-01-14T19:40:32Z) - Safeguarded Progress in Reinforcement Learning: Safe Bayesian
Exploration for Control Policy Synthesis [63.532413807686524]
This paper addresses the problem of maintaining safety during training in Reinforcement Learning (RL)
We propose a new architecture that handles the trade-off between efficient progress and safety during exploration.
arXiv Detail & Related papers (2023-12-18T16:09:43Z) - Evaluating Model-free Reinforcement Learning toward Safety-critical
Tasks [70.76757529955577]
This paper revisits prior work in this scope from the perspective of state-wise safe RL.
We propose Unrolling Safety Layer (USL), a joint method that combines safety optimization and safety projection.
To facilitate further research in this area, we reproduce related algorithms in a unified pipeline and incorporate them into SafeRL-Kit.
arXiv Detail & Related papers (2022-12-12T06:30:17Z) - Proceedings - AI/ML for Cybersecurity: Challenges, Solutions, and Novel
Ideas at SIAM Data Mining 2021 [6.647584840410018]
Malicious cyber activity is ubiquitous and its harmful effects have dramatic and often irreversible impacts on society.
The challenges in this space are quite different from those associated with applying AI in other domains such as computer vision.
In spite of these challenges, machine learning has been applied to this domain and has achieved some success in the realm of detection.
A growing part of the commercial sector is providing ML-enhanced capabilities as a service.
arXiv Detail & Related papers (2021-04-27T17:35:31Z) - Conservative Safety Critics for Exploration [120.73241848565449]
We study the problem of safe exploration in reinforcement learning (RL)
We learn a conservative safety estimate of environment states through a critic.
We show that the proposed approach can achieve competitive task performance while incurring significantly lower catastrophic failure rates.
arXiv Detail & Related papers (2020-10-27T17:54:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.