GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks

被引:4
|
作者
Zarzycki, Krzysztof [1 ]
Chaber, Patryk [1 ,2 ]
Cabaj, Krzysztof
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Nebeluk, Robert [1 ]
Plamowski, Sebastian [1 ]
Wojtulewicz, Andrzej [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00661 Warsaw, Poland
关键词
Generative adversarial networks; Protocols; Process control; Cyberattack; Testing; Neural networks; Fuzzing; GAN neural networks; cyber-security; cyber-attacks; industrial network;
D O I
10.1109/ACCESS.2023.3277250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of computer systems and networks against malicious attacks is particularly important in industrial networked control systems. A successful cyber-attack may cause significant economic losses or even destruction of controlled processes. Therefore, it is necessary to test the vulnerability of process control industrial networks against possible cyber-attacks. Three approaches employing Generative Adversarial Networks (GANs) to generate fake Modbus frames have been proposed in this work, tested for an industrial process control network and compared with the classical approach known from the literature. In the first approach, one GAN generates one byte of a message frame. In the next two approaches, expert knowledge about frame structure is used to generate a part of a message frame, while the remaining parts are generated using single or multiple GANs. The classical single-GAN approach is the worst one. The proposed one-GAN-per-byte approach generates significantly more correct message frames than the classical method. Moreover, all the generated fake frames have been correct in two of the proposed approaches, i.e., single GAN for selected bytes and multiple GANs for selected bytes methods. Finally, we describe the effect of cyber-attacks on the operation of the controlled process.
引用
收藏
页码:49587 / 49600
页数:14
相关论文
共 50 条
  • [31] Secure smart contract-enabled control of battery energy storage systems against cyber-attacks
    Mhaisen, Naram
    Fetais, Noora
    Massoud, Ahmed
    ALEXANDRIA ENGINEERING JOURNAL, 2019, 58 (04) : 1291 - 1300
  • [32] An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
    Saharkhizan, Mahdis
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    Parizi, Reza M.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8852 - 8859
  • [33] Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns
    Yang, Shaohua
    Lao, Keng-Weng
    Hui, Hongxun
    Chen, Yulin
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (06) : 7277 - 7290
  • [34] False Data Injection Cyber-Attacks Mitigation in Parallel DC/DC Converters Based on Artificial Neural Networks
    Habibi, Mohammad Reza
    Baghaee, Hamid Reza
    Dragicevic, Tomislav
    Blaabjerg, Frede
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2021, 68 (02) : 717 - 721
  • [35] Adaptive dynamic event-triggered cluster synchronization in an array of coupled neural networks subject to cyber-attacks
    Li, Hongjie
    Cao, Jinde
    Kashkynbayev, Ardak
    Cai, Shuiming
    NEUROCOMPUTING, 2022, 511 : 380 - 398
  • [36] Event-triggered secure control for Markov jump neural networks with time-varying delays and subject to cyber-attacks via state estimation fuzzy approach
    Rajchakit, Grienggrai
    Banu, K. Asmiya
    Aparna, T.
    Lim, C. P.
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2025, 56 (02) : 211 - 226
  • [37] Piecewise Linear Neural Network for Process Control in Industrial Environment
    Dolezel, Pelf
    Gago, Lumir
    PROCEEDINGS OF THE 2016 17TH INTERNATIONAL CARPATHIAN CONTROL CONFERENCE (ICCC), 2016, : 161 - 165
  • [38] Main Control Computer Security Model of Closed Network Systems Protection against Cyber Attacks
    Seymen, Bilal
    CYBER SENSING 2014, 2014, 9097
  • [39] Adaptive event-triggered synchronization of neural networks under stochastic cyber-attacks with application to Chua's circuit
    Xu, Yao
    Yang, Chunyu
    Zhou, Linna
    Ma, Lei
    Zhu, Song
    NEURAL NETWORKS, 2023, 166 : 11 - 21
  • [40] Detection of Cyber-Attacks and Power Disturbances in Smart Digital Substations using Continuous Wavelet Transform and Convolution Neural Networks
    Nassar, Abu
    Morsi, W. G.
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 229