Abstract
Due to the influence of terrain structure, meteorological conditions and various factors, there are anomalous data in automatic dependent surveillance-broadcast (ADS-B) message. The ADS-B equipment can be used for positioning of general aviation aircraft. Aim to acquire the accurate position information of aircraft and detect anomaly data, the ADS-B anomaly data detection model based on deep learning and difference of Gaussian (DoG) approach is proposed. First, according to the characteristic of ADS-B data, the ADS-B position data are transformed into the coordinate system. And the origin of the coordinate system is set up as the take-off point. Then, based on the kinematic principle, the ADS-B anomaly data can be removed. Moreover, the details of the ADS-B position data can be got by the DoG approach. Finally, the long short-term memory (LSTM) neural network is used to optimize the recurrent neural network (RNN) with severe gradient reduction for processing ADS-B data. The position data of ADS-B are reconstructed by the sequence to sequence (seq2seq) model which is composed of LSTM neural network, and the reconstruction error is used to detect the anomalous data. Based on the real flight data of general aviation aircraft, the simulation results show that the anomaly data can be detected effectively by the proposed method of reconstructing ADS-B data with the seq2seq model, and its running time is reduced. Compared with the RNN, the accuracy of anomaly detection is increased by 2.7%. The performance of the proposed model is better than that of the traditional anomaly detection models.
The automatic dependent surveillance-broadcast (ADS-B) data which reflect the flight state and operation state of the aircraft are a series of flight parameters. The state of the aircraft and the operational behavior of pilots were recorded by the parameters of the aircraf
Anomaly detection refers to finding data patterns in the data that contradict with the expected behaviors. In time series, there is often a context dependent relationship (time or space) among adjacent data points. Point anomalies due to the breakdown of dependencies can also be called context exception
In recent years, a number of anomaly detection methods based on deep learning have been proposed in various fields. Deep learning methods can automatically learn task-related features through end-to-end training, and obtain high-level abstract representation of raw data through multilayer nonlinear transformation.
In order to detect the anomalies, the intelligence methods were used for detection, like neural network
The research showed that the method based on deep learning had completely surpassed the traditional metho
The contribution of this paper is to propose an approach for anomalies based on deep learning and DoG approach. And this paper is organized as follows. A new method is presented for converting coordinate system with less computation and constrains for outliers in Section 1. In Section 2, DoG is used for enhancing the detail of ADS-B data. Seq2seq model and ADS-B anomaly data detection are proposed in Section 3. In the other sections of the paper, the problem is formulated, the method is described and the experiment validations are presented.
In order to get the tracks of the common aero vehicle, the ADS-B designed for common aero vehicle was used. First of all, the positions of the aircraft were positioned by BeiDou Navigation Satellite System (BDS) or Global Positioning System (GPS). Then, the tracks would be consisted by the points. Finally, the data of flights would be displayed on terminal and saved in database(

Fig.1 Transmission of ADS-B data
Because of the terrain structure, meteorological conditions and various factors, there are anomalies in ADS-B message. Tracks selected for processing should not preferably include tracks with the following exceptions.
(1) Incomplete points on track. Because of terrain and other reasons, message might be lost during the transmission processes. The points or a section of track will be incomplete. Some incomplete tracks with a spot of missing points can be completed with the interpolation method, but other incomplete tracks with many missing points must be deleted, which contain massive loss of points. An incomplete track is a whole track with too many missing points. The removal of a whole track does not affect the continuity of other tracks.
(2) Repeated points on track. Because of the error of clock or multi-path, the track data were received twice or more at the same time. In addition, the same points of track might be received at the different time due to the lack of data inspection. So, the less the repeated points, the better the tracks. And the tracks with less repeated points were chosen.
(3) Interference points on track. Different points on incomplete tracks of different flights might be received at the same time due to the similarity. Therefore, it is necessary for us to separate the independent tracks.
The received ADS-B position data were written in World Geodetic System-84 (WGS-84). Because of the large computation in WGS-84 and Cartesian Coordinate System (CCS), the position can be converted into a new coordinate system where the origin was defined by springboard as follows
(1) |
where is the plane distance of A and B, A the aircraft position and B the take-off point position; means the difference-value of the latitude between A and B; is the difference-value of the longitude between A and B; is the latitude of A and the latitude of B. The radius of the earth is 6 387.137 km. When the distance is calculated on the X-axis, . The positive direction on X-axis is east. When the distance is calculated on the Y-axis, . The positive direction on Y-axis is south. When , the value on X-axis is negative. When , the value on X-axis is negative in Northern Hemisphere. The value on Z-axis is difference-value of altitude between A and B. In this model, the value of B is minuend. And spatial distance of A and B is
(2) |
where is the difference-value in height between A and B.
The constraints were calculated from the datasheet of the general aviation aircraft named RX1E, shown in
From
(3) |
where are the velocities of the aircraft, the altitude of the aircraft, and the time when the data were received.
The acceleration produced by gravity was decomposed to three directions including X-axis, Y-axis, Z‑axis, shown as
(4) |
where is a matrix, represents the angle between the direction of the flight speed and the positive direction of the X-axis, and the angle between the direction of the flight speed and the positive direction of Y‑axis. According to the Newton’s second law and the instantaneous, accelerations of gravity were calculated as
(5) |
where is a matrix, and the maximum acceleration () of the aircraft has been obtained according to the data sheet of the aircraft. Thus, the theoretical maximum values of accelerations including () were calculated as
(6) |
where is a matrix. According to the velocity of the aircraft at the moment of , the actual accelerations of in three directions are less than the theoretical maximum, that is
(7) |
where is a matrix, are the accelerations at time of (), and is the time difference between time of and . The actual accelerations in the X-axis, Y-axis, and Z-axis were calculated according to the flight data. And the constraints were calculated at time of as
(8) |
where . If conflict with the constraints, the velocity is the abnormal data at time of .
After removing the outlier in the flight data by using the constraint condition of acceleration, there may also be a continuous sequence of anomaly in the flight data that cannot be detected. In order to exclude outliers from these data, the aircraft data sheet and kinematics were used for detecting anomaly by calculating the theoretical position of the aircraft
(9) |
where ,, are the theoretical positions of the aircraft on the X-axis, Y-axis, and Z-axis, such as
(10) |
where , is the actual position of the aircraft at the time of . If the above constraints are not met, the positions of the aircraft on the X-axis, Y‑axis and Z-axis are abnormal data.
There are two dimensions in ADS-B data: time series and position series. When ADS-B data are arranged in two dimensions on a plane, it is different from the data arranged in one dimension on a line. In order to provide more information and more variation, the section will be used for exacting the position series of the ADS-B position data.
The set was composed by consecutive time series which include the points of tracks from 0 to , and is the length of the time series. is a vector where the length of sequence is , shown as
(11) |
There is only one feature for each dimension. The contents for each vector, including position, course angle, height, etc., were broadcasted by ADS-B, shown as
(12) |
where are the positions on X-axis, Y-axis, Z-axis, velocity and angle of aircraft on time of .
In order to extract the position sequence from , multiple cross sections are extracted from the position sequence, and sample observations are selected on these cross sections to form the sample data. And each section starts at the same time.
(13) |
where are the position sections. In order to make the algorithm invariant to data scaling and reduce the influence of data changes on series, the method of establishing data Gaussian space to form data pyramid structure will be used.
Data pyramid is a series of data from the same original section which is arranged in pyramid shape and gradually reduces resolution. It is the basis of multi-scale calculation based on the gradient data of the original section, the up-sampled data and the down-sampled data adjacent to the gradient data, shown in

Fig.2 Block diagram of pyramid data
The data details play an irreplaceable role in recognition of anomaly data. Anomalies are usually reflected in the details of the data, which are the result of the accumulation of local details. The local details of the section will be calculated by DoG. As an enhancement algorithm, DOG can be used to increase the visibility of edges and other details.
The level of detail for position sections will be reduced according to the function of Gaussian smoothing. Different scales of Gaussian smoothing have different smoothing effects on position sections. Each layer of data pyramid is smoothed data pyramid, forming three‑layer Gaussian smoothing position sections.
(14) |
where , denotes the convolution operation, is the section of X, the time, and the value of dimension.
As shown in
(15) |

Fig.3 Block diagram of DoG
The pyramid data of each layer produce three-layer DoG data. The data obtained by Gaussian difference are a local detail description of the data at different scales. The detail description of the data can improve the expression ability of the position data section to the details. Pyramid data on each layer are superimposed with three-layer DoG data of this layer section. To prevent overflow, the average value of data superposition is taken to form the detail superposition data, as shown in
(16) |

Fig.4 Block diagram of superposition
After enhancing the details of the position section data, the details of the information are more abundant, and the extracted local features are more representative.
The seq2seq model, which was used for conversion of sequence, is a model with the frame of Encoder-Decoder and often used in automatic abstracting, machine translation, deep learning and so forth. Encoder, decoder and state vector were included by seq2seq. State vector is a connection between encode and decoder. Recurrent neural network (RNN) is a unit used by encoder and decode
The sequence of input will be learned by encoder and then be encoded into a fixed size state vector, which is then transmitted to the decoder part. Finally, the decoder learns the state vector to carry out the relevant output.
Because of the advantage of short-term memory for RNN, it is often used as the first choice neural network for the training of time sequence data. With the length of training data for RNN increasing, the gradients for training data will fade away. The gradients will disappear and the process of training will be broken while the length of training data is long enough. So, the limit time interval is essential for training data when RNN is used. The length of the position data which is broadcasted by ADS-B in flights is so long that the feature can not be obtained by RNN. In order to resolve this problem, the improved long short-term memory (LSTM) units were used in seq2seq, which have excellent effects on many problems and now have been widely used, shown in

Fig.5 Chart for LSTM struction
In
The forgetting gate , where is the weight matrix of the forgetting gate, the function of sigmoid, the bias term of forgetting gate, the output at time of , the input at time of , and and are all apart of input of gate, shown as
(17) |
where is the hyperbolic function, the weight matrix of , and the weight matrix of .The unit state at the current time is the product of the input of the forgetting gate and the state at the previous time adds the product of the two parts of the input gate( and ), shown as
(18) |
Finally, the sigmoid function is used to calculate information that needs to be output , and then the output is obtained by multiplying the value which was calculated by hyperbolic function for current cell state.
(19) |
So, there are three gates: forgetting gate, input gate and output gate. In this model, LSTM was used. Core model consists of three parts for LSTM units of encoder and decoder, as well as the state vector (eocoder state), respectively. In the training process, the training data are input to the encoder and encoded to a fixed state vector. Then, the vector is transferred to the decoder, and its sequence is reconstructed by the decoder.
The reconstruction error between the realistic time sequence and the predicted time sequence will be detected by using Cosine Similarity, that is
(20) |
where is the dimension, and the reconstruction sequence. So the abnormal-probability pa can be de calculated as
(21) |
There are five main steps in this improved model (

Fig.6 Main steps in this improved model
Step 1 Data (latitude, longitude, height) of ADS-B in WGS-84 were converted to the data in a new coordinate, the origin of which is defined by the springboard.
Step 2 The constraint was created by the datasheet of the flight and the kinematical equation. And the data which meet the constraints will be selected by the comparison between constraint and data. The constraints and the outliers will be detected.
Step 3 Extract position sections of the ADS-B data. And DoG will be used for detail enhancement of section.
Step 4 Parameters in seq2seq model were initialized. The original time series length is 12, the loss function used in the training is mean square error (MSE), the number of LMST unit is 256 with the batch-size of 128, and the ratio of dropout is 25%. The seq2seq model will be used for predicting the data. And the error between the realistic time sequence and the predicted time sequence will be detected by using this model.
Step 5 The abnormal data will be detected by Cosine similarity. After training, the threshold of the training sets is calculated. For actual flight data, the value of the anomalous score is defined with a threshold of 97.5%.
The data come from the ADS-B which is broadcasted by common aero vehicle named RX1E. Some anomalies like outliers were produced while the data broadcasting. Outliers were detected by constraints.
Some anomalies were deliberately injected such as network delay, route replacement, random noise and velocity drift, and almost all of them will be detected by seq2seq.
In the selected ADS-B sequence, for every 10 consecutive messages, only the first message is retained and the last nine messages are deleted. This situation simulates the reality that the receiver can only receive valid message if the time interval is large enough.
Given a certain route massage, another correct route massage is injected to replace the selected ADS-B sequence.
Part of the original ADS-B data are mulitiplied by a number between 0 and 2 randomly. Seven trajectory points of random noise will be injected per 180 track points.
The speed characteristic information contained in ADS-B message is gradually changed as a multiple of five sections. Specifically, in the selected ADS-B sequence, the speed characteristic contained in the first vector is increased by five sections, and the second by 10 sections.
In the course of the experiment, after the operations of normalization, the complete data of 10 flights from take-off to landing for seven consecutive days were selected as training samples, and the data of each flight were between 1 500 and 2 000. The data of flight for 20 min and 180 points in track were used for test set. And the test sets were taken from the flight records of Ruixiang RX1E aircraft in Faku General Aviation Airport of Shenyang at 10 o’clock on November 13, 2019. Its track is shown in

Fig.7 Flight track of Ruixiang RX1E aircraft
After the operations for outliers, the model of seq2seq was used for anomalies in altitude.

Fig.8 Anomaly processed by seq2seq for altitude
Similarly,

Fig.9 Anomaly processed by seq2seq for X-axis
After the operation for outliers, the model of seq2seq is used for abnormal of Y-axis. The detection result is shown in

Fig.10 Anomaly processed by seq2seq for Y-axis

Fig.11 Anomaly processed by seq2seq for track
Running time is the time of converting ADS-B data to the corresponding coordinate system.
Precision indicates the number of correctly classified samples to the total number of samples for a given data set, shown as
(22) |
where is the true positive, the false negative, the false positive, and the true negative. In this paper, precision refers to the proportion of the correctly detected abnormal ADS-B samples to the actual detected abnormal samples.
As shown in
Aim to analyze the average precision in different models, the Bayes, SVM and 4D-flight track prediction are used for comparison. After converting the data to the coordinate system of this model, the same training and test sets are selected to train and test the SVM model. These models use the known track characteristics to predict the track points at future moments.
The kernel function of SVM is radial kernel function (RKF). The parameters of the model were optimized by using the grid search method. The kernel width parameter and the regularization parameter are determined.
The 180 track points constitute a set of observation data. Distribution parameters are calculated from training sets. The posterior probability can be calculated by Bayesian formula using prior probability and likelihood function.
The maximum likelihood law and Newton-Raphson iterative algorithm are used to identify the corrected airspeed in the model. Finally, the identification results and equiangular track prediction model are used to calculate the aircraft’s track. The parameter identification is calculated by using maximum likelihood estimation. After 40 iterations of the calculation, the parameter identification is determined to be 221.6.
Bayes and SVM are prediction models based on classification and have strict requirements on training set samples. Therefore, when the actual flight samples are used as training sets, the accuracy is lower than 4D-flight track prediction. In the process, the model can effectively capture the characteristics of a track, so its accuracy is higher than that of Bayes and SVM models. The seq2seq model in which neural network is composed of LSTM units has a good abnormal detection effect for ADS-B time series. And it takes into account the target change information in the adjacent time of the current point, so the detection performance is high and the accuracy can be improved by locking the target into a sequence. When the data are processed by network delay, route replacement, random noise, and velocity drift, there is a better performance in this model than in Bayes, SVM, and 4D-flight track prediction models.
The ADS-B anomaly data detection model based on deep learning and DoG approach is proposed. In order to reduce the complexity of this model, the kinematics theory is used for removing the outliers. The reconstruction error which is produced by seq2seq is used to detect the anomaly data. Through the simulation and verification, compared with SVM, Bayes, 4D-track models, the average precision is improved, and the running time is decreased.
Contributions Statement
Prof. WANG Ershen designed the study, revised and modified the manuscript. Mr. SONG Yuanshang simulated the model. Prof. GUO Jing contributed to data for the analysis of the model. Mr. XU Song contributed to the background of the study. Dr. HONG Chen contributed to the discussion of the study. Prof. QU Pingping contributed to the analysis of the model. Dr. PANG Tao conducted the analysis of the results. Mr. ZHANG Jiantong contributed to the discussion of the study. All authors commented on the manuscript draft and approved the submission.
Acknowledgements
The work was supported by the National Key R & D Program of China (No. 2018AAA010080⁃4), the Talent Project of Revitalization Liaoning (No. XLYC1907022), the Key R & D Projects of Liaoning Province(No. 2020JH2/10100045), the Capacity Building of Civil Aviation Safety (No.TMSA1614), the Natural Science Foundation of Liaoning Province (No. 2019-MS-251), the Scientific Research Project of Liaoning Provincial Department of Education (Nos. L201705, L201716), the High-Level Innovation Talent Project of Shenyang (No. RC190030), and the Second Young and Middle-Aged Talents Support Program of Shenyang Aerospace University.
Conflict of Interest
The authors declare no competing interests.
References
MATTHEWS B, DAS S, BHADURI K, et al. Discovering anomalous aviation safety events using scalable data mining algorithms[J]. Journal of Aerospace Information Systems, 2014, 11(7): 482. [百度学术]
LI Tengyao, WANG Buhong, SHANG Fute, et al. Dynamic temporal ADS-B data attack detection based on sHDP-HMM[J]. Computers & Security, 2020. DOI: 10.1016/j.cose.2020.101789. [百度学术]
ZHANG Jun, LIU Wei, ZHU Yanbo. Study of ADS-B data evaluation[J]. Chinese Journal of Aeronautics, 2011, 24(4): 461-466. [百度学术]
DING Songbin, GU Qianqian, LIU Jiayu. Flight safety system evaluation and optimal linear prediction[J]. Transactions of Nanjing University of Aeronautics and Astronautics, 2019, 36(2): 205-213. [百度学术]
CHANDOLA V, BANERJEE A, KUMAR V. Anomaly detection: A survey[J]. ACM Computing Surveys, 2009, 41(3):15.1-15.58. [百度学术]
PURANIK T G, MAVRIS D N. Identifying instantaneous anomalies in general aviation operations[C]//Proceedings of the 17th AIAA Aviation Technology, Integration and Operations Conference. [S.l.]: AIAA, 2017: 3779-3794. [百度学术]
LEE J G, HAN J, LI X. Trajectory outlier detection: A partition-and-detect framework[C]//Proceedings of ICDE 2008. Washington: Computer Society, 2008: 140-149. [百度学术]
LI Ruiying, KANG Rui. Failure rate forecasting method based on neural networks[J]. Acta Aeronautica et Astronautica Sinica, 2008, 29(2): 357-363. (in Chinese) [百度学术]
GRAVES A, JURGEN S. Framewise phoneme classification with bidirectional LSTM and other neural network architectures[J]. Neural Networks, 2005, 18(5/6): 602-610. [百度学术]
DING Jianli, ZOU Yunkai, WANG Jing, et al. ADS-B anomaly data detection model based on deep learning[J]. Acta Aeronautica et Astronautica Sinica, 2019, 40(12):167-177.(in Chinese) [百度学术]
LI Kexin, LI Jing, LIU Shuji, et al. GA-iForest: An efficient isolated forest framework based on genetic algorithm for numerical data outlier detection[J]. Transactions of Nanjing University of Aeronautics and Astronautics, 2019, 36(6): 1026-1038. [百度学术]
KEOGH E, LIN J, LEE S H, et al. Finding the most unusual time series subsequence: Algorithms and applications[J]. Knowledge & Information Systems, 2007, 11(1): 1-27. [百度学术]
ZHOU S, LIANG Y, WAN J, et al. Facial expression recognition based on multi-scale CNNs[C]//Proceedings of Chinese Conference on Biometric Recognition. [S.l.]: Springer International Publishing, 2016: 503-510. [百度学术]
YANG Youqiong. Analysis of the strategy of wisdom library service implementation[J]. Guizhou Library Publication, 2018 (2): 67-70. (in Chinese) [百度学术]
YANG H, HUANG R, WANG X, et al. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR[J]. Chinese Journal of Aeronautics, 2014, 27(3): 688-696. [百度学术]
WESSON K D, HUMPHREYS T E, EVANS B L. Can cryptography secure next generation air traffic surveillance?[J]. IEEE Security & Privacy, 2018. DOI: http://radionavlab.ae.utexas.edu/images/stories/files/papers/adsb_for_submission.pdf. [百度学术]
EDAN H, ASAF S. Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages[J]. Computers & Security, 2018(78): 155-173. [百度学术]
HUAN-KAI P, RADU M, GOMEZ S. Multiscale compositionality: Identifying the compositional structures of social dynamics using deep learning[J]. Plos One, 2015, 10(4): e0118309. [百度学术]
BAEK J, HABLEEL E, BYON Y J, et al. How to protect ADS-B: Confidentiality framework and efficient realization based on staged identity-based encryption[J]. IEEE Transactions on Intelligent Transportation Systems, 2016. DOI: http://10.1109/TITS.2016.2586301. [百度学术]