ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

被引:30
作者
Li, Jiangnan [1 ]
Yang, Yingyuan [2 ]
Sun, Jinyuan Stella [1 ]
Tomsovic, Kevin [1 ]
Qi, Hairong [1 ]
机构
[1] Univ Tennessee, Knoxville, TN 37996 USA
[2] Univ Illinois, Springfield, IL 62703 USA
来源
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
美国国家科学基金会;
关键词
adversarial machine learning; cyber-physical system; intrusion detection;
D O I
10.1145/3433210.3437513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research demonstrated that the superficially well-trained machine learning (ML) models are highly vulnerable to adversarial examples. As ML techniques are becoming a popular solution for cyber-physical systems (CPSs) applications in research literatures, the security of these applications is of concern. However, current studies on adversarial machine learning (AML) mainly focus on pure cyberspace domains. The risks the adversarial examples can bring to the CPS applications have not been well investigated. In particular, due to the distributed property of data sources and the inherent physical constraints imposed by CPSs, the widely-used threat models and the state-of-the-art AML algorithms in previous cyberspace research become infeasible. We study the potential vulnerabilities of ML applied in CPSs by proposing Constrained Adversarial Machine Learning (ConAML), which generates adversarial examples that satisfy the intrinsic constraints of the physical systems. We first summarize the difference between AML in CPSs and AML in existing cyberspace systems and propose a general threat model for ConAML. We then design a best-effort search algorithm to iteratively generate adversarial examples with linear physical constraints. We evaluate our algorithms with simulations of two typical CPSs, the power grids and the water treatment system. The results show that our ConAML algorithms can effectively generate adversarial examples which significantly decrease the performance of the ML models even under practical constraints.
引用
收藏
页码:52 / 66
页数:15
相关论文
共 50 条
[1]   Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS [J].
Ahmed, Chuadhry Mujeeb ;
Zhou, Jianying ;
Mathur, Aditya P. .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :566-581
[2]   PRACTICAL METHOD FOR THE DIRECT ANALYSIS OF TRANSIENT STABILITY [J].
ATHAY, T ;
PODMORE, R ;
VIRMANI, S .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1979, 98 (02) :573-584
[3]  
Ayad A, 2018, INNOV SMART GRID TEC
[4]  
Bi SZ, 2011, IEEE GLOBE WORK, P1162, DOI 10.1109/GLOCOMW.2011.6162362
[5]  
Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513
[6]  
Chakraborty A, 2018, Arxiv, DOI arXiv:1810.00069
[7]   Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System [J].
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :648-660
[8]  
Choromanska A, 2015, Arxiv, DOI arXiv:1412.0233
[9]   State Space Models for Forecasting Water Quality Variables An Application in Aquaculture Prawn Farming [J].
Dabrowski, Joel Janek ;
Rahman, Ashfaqur ;
George, Andrew ;
Arnold, Stuart ;
McCulloch, John .
KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2018, :177-185
[10]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193