GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks

被引:6
作者
Zarzycki, Krzysztof [1 ]
Chaber, Patryk [1 ,2 ]
Cabaj, Krzysztof
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Nebeluk, Robert [1 ]
Plamowski, Sebastian [1 ]
Wojtulewicz, Andrzej [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00661 Warsaw, Poland
关键词
Generative adversarial networks; Protocols; Process control; Cyberattack; Testing; Neural networks; Fuzzing; GAN neural networks; cyber-security; cyber-attacks; industrial network;
D O I
10.1109/ACCESS.2023.3277250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of computer systems and networks against malicious attacks is particularly important in industrial networked control systems. A successful cyber-attack may cause significant economic losses or even destruction of controlled processes. Therefore, it is necessary to test the vulnerability of process control industrial networks against possible cyber-attacks. Three approaches employing Generative Adversarial Networks (GANs) to generate fake Modbus frames have been proposed in this work, tested for an industrial process control network and compared with the classical approach known from the literature. In the first approach, one GAN generates one byte of a message frame. In the next two approaches, expert knowledge about frame structure is used to generate a part of a message frame, while the remaining parts are generated using single or multiple GANs. The classical single-GAN approach is the worst one. The proposed one-GAN-per-byte approach generates significantly more correct message frames than the classical method. Moreover, all the generated fake frames have been correct in two of the proposed approaches, i.e., single GAN for selected bytes and multiple GANs for selected bytes methods. Finally, we describe the effect of cyber-attacks on the operation of the controlled process.
引用
收藏
页码:49587 / 49600
页数:14
相关论文
共 41 条
[1]  
Aggarwal C.C., 2006, Neural Networks and Deep Learning
[2]  
Akpinar KO, 2018, 2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), P142
[3]  
Antipov G, 2017, IEEE IMAGE PROC, P2089, DOI 10.1109/ICIP.2017.8296650
[4]  
Bishop C. M., 1995, Neural networks for pattern recognition
[5]   Dualattn-GAN: Text to Image Synthesis With Dual Attentional Generative Adversarial Network [J].
Cai, Yali ;
Wang, Xiaoru ;
Yu, Zhihong ;
Li, Fu ;
Xu, Peirong ;
Li, Yueli ;
Li, Lixian .
IEEE ACCESS, 2019, 7 :183706-183716
[6]   A Facial Expression Recognition Method Using Deep Convolutional Neural Networks Based on Edge Computing [J].
Chen, An ;
Xing, Hang ;
Wang, Feiyu .
IEEE ACCESS, 2020, 8 :49741-49751
[7]   A novel online detection method of data injection attack against dynamic state estimation in smart grid [J].
Chen, Rui ;
Li, Xue ;
Zhong, Huixin ;
Fei, Minrui .
NEUROCOMPUTING, 2019, 344 :73-81
[8]   Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph [J].
Cho, Mingi ;
Jin, Hoyong ;
An, Dohyeon ;
Kwon, Taekyoung .
IEEE ACCESS, 2021, 9 :157267-157277
[9]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[10]  
Hagan M. T., 2014, Neural network design, V2nd