| With the increasing use of satellite positioning systems in all walks of life,global satellite positioning services are gradually being used in all aspects of people’s lives.However,while satellite positioning brings convenience to the majority of users,there are also some security risks.In the Global Navigation Satellite System(GNSS),unencrypted signals are used for civilian signals,and the signal frequency band and data content are open standards.As a result,satellite positioning data can be easily tampered with to achieve spoofing attacks on satellite receivers.This paper mainly studies the spoofing attack detection method for satellite data and designs and implements the satellite receiver spoofing attack detection subsystem.The main work accomplished in this paper is as follows:First,the satellite positioning data analysis is realized based on the satellite general standard.According to the RINEX satellite general file format standard,the satellite binary data is parsed into RINEX satellite general files that can be used for position calculation,velocity calculation and data analysis,including satellite observation files,satellite navigation files and satellite ephemeris files,etc.,for subsequent spoofing attacks Inspection work provides inspection data.Second,a detection method of satellite spoofing attack is designed based on the isolation forest algorithm.The isolation forest algorithm is used to analyze the discreteness of data to realize the detection of spoofing attacks.Compared with various existing satellite spoofing attack detection algorithms,this method does not need to use labeled data to pre-train the detection model,so it can effectively detect asynchronous satellite spoofing attacks.And it can adapt to the continuous changes of satellite positioning data,does not need frequent model iteration,and can quickly give detection results.Third,based on the above-mentioned spoofing attack detection method,a spoofing attack detection subsystem is designed and implemented.The functional architecture and database design scheme of the subsystem are given,and three core functional modules are described:the satellite positioning data file management module,the spoofing attack detection module and the processing flow and specific implementation of the user rights management module.Finally,the core functions of the subsystem are tested for usability and accuracy,as well as stress tests for important interfaces,which show that the system has good usability and accuracy and can run normally under high load conditions. |