Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey

被引:8
作者
Wang, Shunyao [1 ]
Ko, Ryan K. L. [1 ]
Bai, Guangdong [1 ]
Dong, Naipeng [1 ]
Choi, Taejun [1 ]
Zhang, Yanjun [2 ]
机构
[1] Univ Queensland, Sch Elect Engn & Comp Sci, Brisbane, Qld 4072, Australia
[2] Univ Technol Sydney, Sch Comp Sci, Sydney, NSW 2007, Australia
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 02期
关键词
Surveys; Taxonomy; Data models; Tutorials; Training; Adaptation models; Systematics; Evasion attack; adversarial machine learning; Internet of Things; cyber physical systems; cybersecurity; deep learning; GENERATIVE ADVERSARIAL NETWORKS; IDENTIFICATION METHOD; NEURAL-NETWORK; TIME-SERIES; INTRUSION; CLASSIFICATION; PREDICTION; INDUSTRIAL; ROBUSTNESS; ALGORITHMS;
D O I
10.1109/COMST.2023.3344808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPS) are increasingly relying on machine learning (ML) techniques to reduce labor costs and improve efficiency. However, the adoption of ML also exposes CPS to potential adversarial ML attacks witnessed in the literature. Specifically, the increased Internet connectivity in CPS has resulted in a surge in the volume of data generation and communication frequency among devices, thereby expanding the attack surface and attack opportunities for ML adversaries. Among various adversarial ML attacks, evasion attacks are one of the most well-known ones. Therefore, this survey focuses on summarizing the latest research on evasion attack and defense techniques, to understand state-of-the-art ML model security in CPS. To assess the attack effectiveness, this survey proposes an attack taxonomy by introducing quantitative measures such as perturbation level and the number of modified features. Similarly, a defense taxonomy is introduced based on four perspectives demonstrating the defensive techniques from models' inputs to their outputs. Furthermore, the survey identifies gaps and promising directions that researchers and practitioners can explore to address potential challenges and threats caused by evasion attacks and lays the groundwork for understanding and mitigating the attacks in CPS.
引用
收藏
页码:930 / 966
页数:37
相关论文
共 50 条
[31]   Defense as a Service Cloud for Cyber-Physical Systems [J].
Azab, Mohamed ;
Eltoweissy, Mohamed .
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, :392-401
[32]   A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions [J].
Chui, Kwok Tai ;
Gupta, Brij B. ;
Liu, Jiaqi ;
Arya, Varsha ;
Nedjah, Nadia ;
Almomani, Ammar ;
Chaurasia, Priyanka .
INFORMATION, 2023, 14 (07)
[33]   Enabling cyber-physical systems with machine-to-machine technologies [J].
Wan, Jiafu ;
Yan, Hehua ;
Liu, Qiang ;
Zhou, Keliang ;
Lu, Rongshuang ;
Li, Di .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 13 (3-4) :187-196
[34]   A survey on the security of cyber-physical systems [J].
Wu G. ;
Sun J. ;
Chen J. .
Control Theory and Technology, 2016, 14 (1) :2-10
[35]   A Hybrid Cyber Attack Model for Cyber-Physical Power Systems [J].
Tu, Haicheng ;
Xia, Yongxiang ;
Tse, Chi K. ;
Chen, Xi .
IEEE ACCESS, 2020, 8 :114876-114883
[36]   Moving Target Defense for Cyber-Physical Systems Using IoT-Enabled Data Replication [J].
Giraldo, Jairo A. ;
El Hariri, Mohamad ;
Parvania, Masood .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) :13223-13232
[37]   Optimal defense and control of dynamic systems modeled as cyber-physical systems [J].
Niu, Haifeng ;
Jagannathan, S. .
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04) :423-438
[38]   A Brief Survey of Security Approaches For Cyber-Physical Systems [J].
Bou-Harb, Elias .
2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
[39]   Deep Reinforecement Learning Based Optimal Defense for Cyber-Physical System in presence of Unknown Cyber-attack [J].
Feng, Ming ;
Xu, Hao .
2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, :1642-1649
[40]   Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey [J].
Li, Jiao ;
Liu, Yang ;
Chen, Tao ;
Xiao, Zhen ;
Li, Zhenjiang ;
Wang, Jianping .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) :5103-5115