2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 2018
DOI: 10.1109/dasc/picom/datacom/cyberscitec.2018.00139
|View full text |Cite
|
Sign up to set email alerts
|

Countering Real-Time Stream Poisoning: An Architecture for Detecting Vessel Spoofing in Streams of AIS Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…On the other hand, trajectory clustering approaches are often employed to form groups of AIS positions with similar spatiotemporal behaviors, uncovering behaviors that are harder to predefine. Although there is an abundance of studies in the literature regarding offline trajectory classification and clustering [1][2][3][4][5], fewer works have focused on steam processing of events in the maritime domain [6][7][8][9][10]. Event processing methodologies are faced with significant challenges when employed on streaming data where the requirements for such applications demand low memory consumption and decreased latencies.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, trajectory clustering approaches are often employed to form groups of AIS positions with similar spatiotemporal behaviors, uncovering behaviors that are harder to predefine. Although there is an abundance of studies in the literature regarding offline trajectory classification and clustering [1][2][3][4][5], fewer works have focused on steam processing of events in the maritime domain [6][7][8][9][10]. Event processing methodologies are faced with significant challenges when employed on streaming data where the requirements for such applications demand low memory consumption and decreased latencies.…”
Section: Introductionmentioning
confidence: 99%
“…In this work, we showcased a few real world examples which our model managed to accurately detect. Identifying specific cases of anomalous behavior [10,11,23,24] will allow us to fine-tune, improve and exploit the proposed unsupervised technique as a basis for a supervised model for the detection of events of interest in the maritime sector. As a future work, we intend to exploit the proposed network abstraction in order to identify events of interest to the maritime authorities.…”
Section: Conclusion and Future Stepsmentioning
confidence: 99%
“…The authors of [13] mainly solved the problem of position spoofing by comparing the estimated AIS emitter position and position reported in AIS data, but it required related domain knowledge. The authors of [14] calculated the speed based on the distance and duration between two AIS points, and determined whether a spoofing event occurred based on the speed, this method was suitable for resolving spoofing events with large changes in position. However, there is less research on MMSI spoofing and AIS closing detection, and it is easier for ships to perform these two behaviors in illegal activities.…”
Section: Introductionmentioning
confidence: 99%