Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems

نویسندگان

چکیده

Recently, neural networks (NNs) have been proposed for the detection of cyber attacks targeting industrial control systems (ICSs). Such detectors are often retrained, using data collected during system operation, to cope with evolution monitored signals over time. However, by exploiting this mechanism, an attacker can fake provided corrupted sensors at training time and poison learning process detector allow stay undetected test Previous work explored ability generate adversarial samples that fool anomaly models in ICSs but without compromising their process. With research, we first demonstrate such poisoning on ICS attack online based networks. We propose two distinct algorithms, namely, interpolation- back-gradient-based poisoning, effectiveness. The evaluation is conducted diverse sources: synthetic data, real-world testbed a simulation Tennessee Eastman This practical tool highlights challenges dynamically controlled systems. generality methods under different NN parameters architectures studied. Lastly, analyze some potential mitigation strategies.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Evaluation of Anomaly Detectors under Portscan Attacks

Since the seminal 1998/1999 DARPA evaluations of intrusion detection systems, network attacks have evolved considerably. In particular, after the CodeRed worm of 2001, the volume and sophistication of self-propagating malicious code threats have been increasing at an alarming rate. Many anomaly detectors have been proposed, especially in the past few years, to combat these new and emerging netw...

متن کامل

Attribution of Cyber Attacks on Industrial Control Systems

In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on appropriate recourse. In this paper we identify the current state of the art of attribution in industrial control systems. We highlight the critical ...

متن کامل

Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems

Considerable research has focused on securing SCADA systems and protocols, but an efficient approach for conducting experiments that measure the impact of attacks on the cyber and physical components of the critical infrastructure is not yet available. This paper attempts to address the issue by presenting an innovative experimental framework that incorporates cyber and physical systems. An emu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2022

ISSN: ['0167-4048', '1872-6208']

DOI: https://doi.org/10.1016/j.cose.2022.102901