GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks

被引:6
作者
Zarzycki, Krzysztof [1 ]
Chaber, Patryk [1 ,2 ]
Cabaj, Krzysztof
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Nebeluk, Robert [1 ]
Plamowski, Sebastian [1 ]
Wojtulewicz, Andrzej [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00661 Warsaw, Poland
关键词
Generative adversarial networks; Protocols; Process control; Cyberattack; Testing; Neural networks; Fuzzing; GAN neural networks; cyber-security; cyber-attacks; industrial network;
D O I
10.1109/ACCESS.2023.3277250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of computer systems and networks against malicious attacks is particularly important in industrial networked control systems. A successful cyber-attack may cause significant economic losses or even destruction of controlled processes. Therefore, it is necessary to test the vulnerability of process control industrial networks against possible cyber-attacks. Three approaches employing Generative Adversarial Networks (GANs) to generate fake Modbus frames have been proposed in this work, tested for an industrial process control network and compared with the classical approach known from the literature. In the first approach, one GAN generates one byte of a message frame. In the next two approaches, expert knowledge about frame structure is used to generate a part of a message frame, while the remaining parts are generated using single or multiple GANs. The classical single-GAN approach is the worst one. The proposed one-GAN-per-byte approach generates significantly more correct message frames than the classical method. Moreover, all the generated fake frames have been correct in two of the proposed approaches, i.e., single GAN for selected bytes and multiple GANs for selected bytes methods. Finally, we describe the effect of cyber-attacks on the operation of the controlled process.
引用
收藏
页码:49587 / 49600
页数:14
相关论文
共 41 条
[21]  
Nielsen MA, 2015, NEURAL NETWORKS DEEP
[22]  
Orive D, 2019, IEEE INT C EMERG, P1230, DOI [10.1109/ETFA.2019.8869334, 10.1109/etfa.2019.8869334]
[23]   GradFuzz: Fuzzing deep neural networks with gradient vector coverage for adversarial examples [J].
Park, Leo Hyun ;
Chung, Soochang ;
Kim, Jaeuk ;
Kwon, Taekyoung .
NEUROCOMPUTING, 2023, 522 :165-180
[24]  
Rosa Luis, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P741, DOI 10.23919/INM.2017.7987369
[25]  
Sun Weifeng, 2022, 2022 IEEE International Conference on Smart Internet of Things (SmartIoT), P51, DOI 10.1109/SmartIoT55134.2022.00018
[26]   Automatic Steganographic Distortion Learning Using a Generative Adversarial Network [J].
Tang, Weixuan ;
Tan, Shunquan ;
Li, Bin ;
Huang, Jiwu .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (10) :1547-1551
[27]  
Tatjewski P, 2007, ADV IND CONTROL, P1, DOI 10.1007/978-1-84628-635-3
[28]  
Voyiatzis AG, 2015, IEEE INT C EMERG
[29]   ESRGAN: Enhanced Super-Resolution Generative Adversarial Networks [J].
Wang, Xintao ;
Yu, Ke ;
Wu, Shixiang ;
Gu, Jinjin ;
Liu, Yihao ;
Dong, Chao ;
Qiao, Yu ;
Loy, Chen Change .
COMPUTER VISION - ECCV 2018 WORKSHOPS, PT V, 2019, 11133 :63-79
[30]   Streetscape augmentation using generative adversarial networks: Insights related to health and wellbeing [J].
Wijnands, Jasper S. ;
Nice, Kerry A. ;
Thompson, Jason ;
Zhao, Haifeng ;
Stevenson, Mark .
SUSTAINABLE CITIES AND SOCIETY, 2019, 49