AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (5.5 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Publishing Language: Chinese

Automatic classification model for multisource heterogeneous air traffic control operational data security

Baogang CHEN1Jingxuan YANG1Yi ZHANG1,2( )Song YAN3Honglin HE1
Department of Automation, Tsinghua University, Beijing 100084, China
Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies, Nanjing 210096, China
School of Traffic Management, People's Public Security University of China, Beijing 100038, China
Show Author Information

Abstract

Objective

With the continuous advancement of the informationization of air traffic control (ATC) in civil aviation, the ATC system currently acts as a hub supporting the efficient and safe operation of the aviation transportation industry. In this process, a large volume of business data is generated and processed within the ATC system that needs to be exchanged across different domains with external entities or organizations to meet the growing demands of informatization. However, data security, real-time processing, and efficiency issues have become increasingly prominent, posing bottlenecks to the further development of the ATC system. Driven by the promotion of informationization of the ATC system, the application subsystems within the civil aviation ATC system have gradually become fragmented, forming multiple information silos. This not only hinders the effective circulation of information but also limits the overall operational efficiency of the ATC system. Therefore, facilitating information sharing and system integration has become a critical task in the current phase of informationization. The exchange of information across industries, business domains, and organizations is a key aspect of achieving these goals. The process of cross-domain information exchange is considerably more complex than simply transmitting information from one place to another, involving multiple stages such as information storage, metadata registration, user identity authentication, and access control. Moreover, cross-domain information exchange also faces many challenges, including data heterogeneity, platform heterogeneity, distribution, autonomy, and security. This study aims to address these challenges by proposing a model for the automatic classification of multisource heterogeneous ATC operational data security to enhance data management, ensure security, promote information sharing, and facilitate business collaboration within the civil aviation ATC system.

Methods

Herein, first, a dataset is constructed to facilitate the classification of the ATC operational data security. Representative data from various operational categories are selected, and 13 key security attributes are identified to design the data security classification. Five security levels are established based on relevant laws and regulations pertaining to data security and the characteristics of the civil aviation ATC operational data. Subsequently, an automatic classification model is developed based on the AdaBoost algorithm with the classification and regression tree (CART) as the base classifier, considering the unique characteristics of the ATC operational data.

Results

Experimental results demonstrate the effectiveness of the proposed automatic classification model. A comparative analysis of the proposed model against other machine learning algorithms reveals that the proposed model achieves the highest accuracy rate, reaching 95.5%. Thus, the proposed model successfully classifies multisource heterogeneous ATC operational data according to their security attributes, enabling the formulation of tailored security strategies and access control mechanisms for different data security levels.

Conclusions

This proposed model considerably enhances the data management capabilities of the civil aviation ATC system, ensures data security, promotes information sharing, and facilitates business collaboration within the system. Thus, this study provides a robust framework for addressing the challenges associated with data security and integration in complex operational environments, laying a foundation for further advancements in civil aviation ATC informationization.

CLC number: TP309.2 Document code: A Article ID: 1000-0054(2024)09-1565-10

References

[1]

DAI J W, ZHANG H S, WANG Q, et al. Cross domain information exchange methods and technologies[M]. 2nd ed. Beijing: Publishing House of Electronics Industry, 2021. (in Chinese)

[2]

HUANG W Q. A research on the hierarchical and classified management mechanism of data elements under the compliance perspective[J]. Journal of Shanghai University of Political Science and Law (The Rule of Law Forum), 2024, 39(2): 121-140. (in Chinese)

[3]
GONG G J, CHANG Z Y, CHEN Z M, et al. Discussion on classification and grading of distribution network data assets from the perspective of network security[J/OL]. Journal of North China Electric Power University (Natural Science Edition), 2024: 1-14. (2024-03-11)[2024-04-03]. http://kns.cnki.net/kcms/detail/13.1212.tm.20240307.1031.002.html. (in Chinese)
[4]

LUO H N. Practical research on exploring the establishment of data security fortresses in government digital transformation[J]. China Information Security, 2020(11): 42-45. (in Chinese)

[5]

TAWALBEH L, DARWAZEH N S, AL-QASSAS R S, et al. A secure cloud computing model based on data classification[J]. Procedia Computer Science, 2015, 52: 1153-1158.

[6]
SABETTA A, BEZZI M. A practical approach to the automatic classification of security-relevant commits[C]// 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). Madrid, Spain: IEEE, 2018: 579-582.
[7]

PENG J F, XU B M, ZHANG Y X. Key technologies and research on railway sensitive data security based on equal protection 2.0[J]. Network Security Technology & Application, 2021(1): 138-142. (in Chinese)

[8]

HU N P, LIU X G. Research on the application of Internet enterprise data security management[J]. Network Security Technology & Application, 2020(12): 76-77. (in Chinese)

[9]

ZHANG X Y, YANG S F, WANG C H, et al. Research on industrial Internet data security classification and grading protection framework[J]. Information Technology and Network Security, 2021, 40(1): 2-9. (in Chinese)

[10]

LIU L, CHEN X L, LI Z M, et al. Study on security classification of big data application in precision medicine[J]. Journal of Medical Informatics, 2021, 42(1): 9-15, 35. (in Chinese)

[11]

CHENG J J, DU S X, YAO Y Z. Reflections on data security and open sharing in the digital economy environment[J]. China Information Security, 2021(5): 52-54. (in Chinese)

[12]

LI Y L. Current status and development of data classification and grading[J]. China Information Security, 2021(5): 55-56. (in Chinese)

[13]

CHEN J N, ZHANG J W. China's solution for cross-border data flow governance: From the perspective of Data Security Law (Draft)[J]. Journal of Changchun University of Science and Technology (Social Sciences Edition), 2021, 34(2): 35-40. (in Chinese)

[14]

HUANG C C, QI Y N. Preliminary study on data security protection scheme of civil aviation A-CDM system[J]. Journal of Information Security Research, 2023, 9(5): 482-489. (in Chinese)

[15]

BAI Y C. Design of network security prevention and control system based on private cloud data platform in Northwest Air Traffic Management Bureau[J]. Network Security Technology & Application, 2022(11): 57-59. (in Chinese)

[16]

LIU L G. Research on association algorithm of heterogeneous network security monitoring[J]. Netinfo Security, 2022, 22(4): 58-66. (in Chinese)

[17]

HUANG H, LIU Z L, YU D T. An intelligent model of data classification and protection[J]. Journal of Beijing University of Technology, 2011, 37(6): 921-927. (in Chinese)

[18]

ZHU J, ROSSET S, ZOU H, et al. Multi-class AdaBoost[J]. Statistics and Its Interface, 2009, 2(3): 349-360.

[19]

LOH W Y. Classification and regression trees[J]. WIREs Data Mining and Knowledge Discovery, 2011, 1(1): 14-23.

[20]
MONTGOMERY D C, PECK E A, VINING G G. Introduction to linear regression analysis[M]. 6th ed. Hoboken, USA: John Wiley & Sons, 2021.
[21]

MCDONALD G C. Ridge regression[J]. WIREs Computational Statistics, 2009, 1(1): 93-100.

[22]

RANSTAM J, COOK J A. LASSO regression[J]. British Journal of Surgery, 2018, 105(10): 1348-1348.

[23]

ZOU H, HASTIE T. Regularization and variable selection via the elastic net[J]. Journal of the Royal Statistical Society Series B: Statistical Methodology, 2005, 67(2): 301-320.

[24]

RIGATTI S J. Random forest[J]. Journal of Insurance Medicine, 2017, 47(1): 31-39.

[25]
SHARAFF A, GUPTA H. Extra-tree classifier with metaheuristics approach for email classification[M]// BHATIA S, TIWARI S, MISHRA K, et al. Advances in computer communication and computational sciences: Proceedings of IC4S 2018. Singapore: Springer, 2019: 189-197.
[26]

BREIMAN L. Bagging predictors[J]. Machine Learning, 1996, 24(2): 123-140.

[27]

NATEKIN A, KNOLL A. Gradient boosting machines, a tutorial[J]. Frontiers in Neurorobotics, 2013, 7: 21.

[28]
CHEN T, HE T, BENESTY M, et al. XGBoost: Extreme gradient boosting[Z]. R Package Version 0.4-2. 2015: 1-4.
[29]

ZHANG W G, WU C Z, ZHONG H Y, et al. Prediction of undrained shear strength using extreme gradient boosting and random forest based on Bayesian optimization[J]. Geoscience Frontiers, 2021, 12(1): 469-477.

Journal of Tsinghua University (Science and Technology)
Pages 1565-1574
Cite this article:
CHEN B, YANG J, ZHANG Y, et al. Automatic classification model for multisource heterogeneous air traffic control operational data security. Journal of Tsinghua University (Science and Technology), 2024, 64(9): 1565-1574. https://doi.org/10.16511/j.cnki.qhdxxb.2024.22.036

44

Views

3

Downloads

0

Crossref

0

Scopus

0

CSCD

Altmetrics

Received: 24 April 2024
Published: 15 September 2024
© Journal of Tsinghua University (Science and Technology). All rights reserved.
Return