Raytheon system warns air crews of cyber-hijacking attempts

Oct. 10, 2019
A MIL-STD-1553 avionics databus that connects functions such as autopilot, GPS, and fuel valve switches is particularly vulnerable to hackers.

ARLINGTON, Va. – As adversaries like Russia and China continue to hack U.S. networks and up their game in sophisticated techniques that can disrupt battlefield weapons or aircraft, one defense company says it has a solution to detect hacks in real time and warn troops in the fight. Military.com reports. Continue reading original article

The Military & Aerospace Electronics take:

10 Oct. 2019 -- Raytheon Co. last week showed off its Cyber Anomaly Detection System, or CADS, which when applied to an aircraft or ground vehicles, can check for abnormal behavior and cyber attack.

Greg Fry, cyber-resiliency product manager at Raytheon, explained that a MIL-STD-1553 avionics databus that connects functions such as autopilot, GPS, fuel valve switches and other avionics equipment, is particularly vulnerable to hackers.

Attacks could come wirelessly into the cockpit over the avionics databus, or through a direct connection -- something as simple as plugging in a cell phone with suspicious software on it that can disrupt operations, he said. CADS essentially spots the malware. During a simulation exercise, Fry demonstrated how CADS identified the anomaly as it entered the system on a helicopter.

Related: Navy moves DOD program forward to improve testing of MIL-STD-1553 avionics databuses

Related: PC/104 cards for MIL STD 1553 and ARINC 429 avionics data buses from DDC chosen by ADL

Related: NAI offers MIL STD 1553 aircraft avionics data bus in VME and CompactPCI boards

John Keller, chief editor
Military & Aerospace Electronics

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!