Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems

被引:98
作者
Anthi, Eirini [1 ]
Williams, Lowri [1 ]
Rhode, Matilda [1 ]
Burnap, Pete [1 ]
Wedgbury, Adam [2 ]
机构
[1] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, Wales
[2] Airbus, Newport, Shrops, England
基金
英国工程与自然科学研究理事会;
关键词
Industrial Control Systems; Supervised machine learning; Adversarial Machine Learning; Attack detection; Intrusion Detection System; CYBER-ATTACKS; DISTURBANCES; INTRUSION;
D O I
10.1016/j.jisa.2020.102717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation and application of machine learning-based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS). However, the introduction of such IDSs has also created an additional attack vector; the learning models may also be subject to cyber attacks, otherwise referred to as Adversarial Machine Learning (AML). Such attacks may have severe consequences in ICS systems, as adversaries could potentially bypass the IDS. This could lead to delayed attack detection which may result in infrastructure damages, financial loss, and even loss of life. This paper explores how adversarial learning can be used to target supervised models by generating adversarial samples using the Jacobian-based Saliency Map attack and exploring classification behaviours. The analysis also includes the exploration of how such samples can support the robustness of supervised models using adversarial training. An authentic power system dataset was used to support the experiments presented herein. Overall, the classification performance of two widely used classifiers, Random Forest and J48, decreased by 6 and 11 percentage points when adversarial samples were present. Their performances improved following adversarial training, demonstrating their robustness towards such attacks.
引用
收藏
页数:9
相关论文
共 55 条
[1]  
Abdallah I, 2018, SAFETY AND RELIABILITY - SAFE SOCIETIES IN A CHANGING WORLD, P3053
[2]  
[Anonymous], 2017, arXiv
[3]  
[Anonymous], 2020, IND CONTROL SYSTEM S
[4]  
[Anonymous], 2018, WEK 3 DAT MIN OP SOU
[5]  
Anton SD, 2018, 13 INT C AVAILABILIT, P1
[6]   Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors [J].
Apruzzese, Giovanni ;
Colajanni, Michele ;
Marchetti, Mirco .
2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, :193-200
[7]   Addressing Adversarial Attacks Against Security Systems Based on Machine Learning [J].
Apruzzese, Giovanni ;
Colajanni, Michele ;
Ferretti, Luca ;
Marchetti, Mirco .
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, :383-400
[8]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[9]  
Athalye A, 2018, PR MACH LEARN RES, V80
[10]  
Barreno M., 2006, Proceedings of the ACM Symposium on Information, P16