Crafting Adversarial Samples for Anomaly Detectors in Industrial Control Systems
Autor: | Alberto Huertas Celdrán, Lorenzo Fernández Maimó, Ángel Luis Perales Gómez, Félix J. García Clemente, Frances Cleary |
---|---|
Rok vydání: | 2021 |
Předmět: |
Process (engineering)
Computer science Evasion (network security) 020206 networking & telecommunications 02 engineering and technology Industrial control system Intrusion detection system Computer security computer.software_genre Networking hardware Adversarial system 0202 electrical engineering electronic engineering information engineering General Earth and Planetary Sciences Factory (object-oriented programming) 020201 artificial intelligence & image processing Anomaly detection computer General Environmental Science |
Zdroj: | ANT/EDI40 |
ISSN: | 1877-0509 |
DOI: | 10.1016/j.procs.2021.03.072 |
Popis: | The increasing adoption of the Industry 4.0 paradigm encompasses digitally interconnected factories which enables many advantages. However, it is still necessary to dedicate effort towards investigating protection mechanisms against cyberattacks in these scenarios. Despite the power demonstrated by Anomaly Detection-based Intrusion Detection Systems in industrial scenarios, their vulnerabilities to adversarial attacks, especially to evasion attacks, make Machine Learning and Deep Learning models ineffective for real scenarios. These type of attacks craft samples misclassified by the Intrusion Detection System and potentially reach industrial devices, causing potentially damaging impacts to factory workers and industry resources. Adversarial attacks linked to industrial scenarios are currently in early stages of development, hence most of them have the capability to craft samples misclassified by the IDS but not reach industrial devices. In this work, we present a new adversarial attack named Selective and Iterative Gradient Sign Method that overcomes the limitation of the adversarial attacks present in the literature. To complement this work we also detail a study of how the detection rate of an Intrusion Detection System is degraded and the time required by each technique to generate adversarial samples. The experiments were carried out using a dataset named Electra, collected from an Electric Traction Substation, and showed that adversarial attacks evaluated crafted samples misclassified by the IDS. However, only the method we proposed generated samples that can be understood by intermediate network devices and, therefore, reach their destination. Our experiment outputs demonstrate a lower period of time to achieve and craft adversarial samples using out our iterative based process method as opposed to other current iterative methods currently available. |
Databáze: | OpenAIRE |
Externí odkaz: |