Published October 29, 2018 | Version v1
Conference paper Restricted

Countering Real-Time Stream Poisoning: An Architecture for Detecting Vessel Spoofing in Streams of AIS Data

  • 1. Institute of Informatics & Telecommunications, National Centre for Scientific Research (NCSR) Demokritos, Athens, Greece
  • 2. MarineTraffic

Description

“Well poisoning” is an ancient war stratagem which was frequently used as a "scorched earth tactic". Today this tactic has been adapted by malicious attackers to the digital world and evolved into “stream poisoning”, in which corrupt or fallacious data is injected into a data lake, so as to corrupt the integrity of the information stored there. Numerous maritime surveillance systems nowadays rely on the Automatic Identification System (AIS), which is compulsory for vessels over 299 Gross Tones, for vessel tracking purposes. Ship AIS spoofing involves creating a nonexistent vessel or masquerading a vessel's true identity, resulting in hiding or transmitting false positional data, so that a vessel appears to behave legitimately, thus deceiving stakeholders and authorities. Due to the volume and velocity of data received traditional approaches fail to automatically detect these spoofing events in real time. We focus on an industrial use case of detecting spoofing events in AIS streams and validate our approach in real world conditions.

Files

Restricted

The record is publicly accessible, but files are restricted to users with access.

Request access

If you would like to request access to these files, please fill out the form below.

You need to satisfy these conditions in order for this request to be accepted:

Paper is subject to IEEE copyrights and is available through IEEE Xplore

You are currently not logged in. Do you have an account? Log in here

Additional details

Funding

European Commission
BigDataOcean - BigDataOcean - Exploiting Ocean's of Data for Maritime Applications 732310