Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems

被引:5
作者
Liu, Yaru [1 ,2 ]
Xu, Lijuan [1 ,2 ]
Yang, Shumian [1 ,2 ]
Zhao, Dawei [1 ,2 ]
Li, Xin [1 ,2 ]
机构
[1] Qilu Univ Technol, Shandong Comp Sci Ctr, Key Lab Comp Power Network & Informat Secur, Minist Educ,Natl Supercomp Ctr Jinan,Shandong Acad, Jinan 250014, Peoples R China
[2] Shandong Fundamental Res Ctr Comp Sci, Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Industrial control systems; Deep learning; LSTM encoder-decoder; Adversarial sample attack; Adversarial sample defense;
D O I
10.1016/j.cose.2024.103750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The challenge faced by industrial control systems is that they are vulnerable to adversarial sample attacks. In the ICS field, the challenge with adversarial sample attacks is that the adversarial samples generated by the attack do not conform to protocol specifications. The challenge of adversarial sample defense is that it is difficult to design a defense model without information about the adversarial samples. To tackle these challenges, we propose an adversarial sample attack and defense method based on Long Short -Term Memory Networks based Encoder -Decoder (LSTM-ED). The objectives are to address challenges of adversarial samples not conforming to protocol specifications and physical meaning, inefficient generation of adversarial samples, and the difficulty of designing a defense model without information about adversarial samples. Our adversarial sample attack efficiently generates samples conforming to protocol specifications and physical meaning by adding perturbation values to sensors and actuators, while complying with feature constraints. Subsequently, we introduce an LSTMED Feature Weight defense method (LSTM-FWED) designed without explicit adversarial sample information. In LSTM-FWED, we normalize reconstruction errors across different features to prevent anomaly scores from being influenced by poorly predicted features, thereby ensuring robust defense results. We validate the effectiveness of our approach on a real -world critical infrastructure testbed. The proposed adversarial sample attack reduces the precision of the LSTM-ED model by an average of 66.26%, with a maximum adversarial sample generation time of 18 seconds, significantly improving attack efficiency. Furthermore, in comprehensive experiments, LSTMFWED demonstrates an average AUC improvement of 21.83% compared to state-of-the-art anomaly detection baseline methods.
引用
收藏
页数:10
相关论文
共 55 条
[1]  
Ahmed C, 2017, P 3 INT WORKSH CYB P, P25
[2]  
Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638
[3]  
Alamer Maryam, 2021, 2021 International Conference on Information Technology (ICIT), P719, DOI 10.1109/ICIT52682.2021.9491123
[4]  
Albalawi A.M., 2022, J Theor Appl Inf Technol, V100, P2988
[5]  
Almaiah M.A., 2022, Sensors, V22, DOI [10.3390/s22041448, DOI 10.3390/S22041448]
[6]   A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things [J].
Almaiah, Mohammed Amin ;
Ali, Aitizaz ;
Hajjej, Fahima ;
Pasha, Muhammad Fermi ;
Alohali, Manal Abdullah .
SENSORS, 2022, 22 (06)
[7]  
AlMedires M., 2021, P INT C INF TECHN IC, P640
[8]  
Almudaires Fajer, 2021, 2021 International Conference on Information Technology (ICIT), P732, DOI 10.1109/ICIT52682.2021.9491114
[9]   USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data [J].
Alsaedi, Abdullah ;
Tari, Zahir ;
Mahmud, Redowan ;
Moustafa, Nour ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) :724-739
[10]   Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions [J].
Altulaihan, Esra ;
Almaiah, Mohammed Amin ;
Aljughaiman, Ahmed .
ELECTRONICS, 2022, 11 (20)