Identifying Vulnerabilities of Industrial Control Systems using
Evolutionary Multiobjective Optimisation
- URL: http://arxiv.org/abs/2005.13095v1
- Date: Wed, 27 May 2020 00:22:48 GMT
- Title: Identifying Vulnerabilities of Industrial Control Systems using
Evolutionary Multiobjective Optimisation
- Authors: Nilufer Tuptuk and Stephen Hailes
- Abstract summary: We identify vulnerabilities in real-world industrial control systems (ICS) using evolutionary multiobjective optimisation (EMO) algorithms.
Our approach is evaluated on a benchmark chemical plant simulator, the Tennessee Eastman (TE) process model.
A defence against these attacks in the form of a novel intrusion detection system was developed.
- Score: 1.8275108630751844
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper we propose a novel methodology to assist in identifying
vulnerabilities in a real-world complex heterogeneous industrial control
systems (ICS) using two evolutionary multiobjective optimisation (EMO)
algorithms, NSGA-II and SPEA2. Our approach is evaluated on a well known
benchmark chemical plant simulator, the Tennessee Eastman (TE) process model.
We identified vulnerabilities in individual components of the TE model and then
made use of these to generate combinatorial attacks to damage the safety of the
system, and to cause economic loss. Results were compared against random
attacks, and the performance of the EMO algorithms were evaluated using
hypervolume, spread and inverted generational distance (IGD) metrics. A defence
against these attacks in the form of a novel intrusion detection system was
developed, using a number of machine learning algorithms. Designed approach was
further tested against the developed detection methods. Results demonstrate
that EMO algorithms are a promising tool in the identification of the most
vulnerable components of ICS, and weaknesses of any existing detection systems
in place to protect the system. The proposed approach can be used by control
and security engineers to design security aware control, and test the
effectiveness of security mechanisms, both during design, and later during
system operation.
Related papers
- EAIRiskBench: Towards Evaluating Physical Risk Awareness for Task Planning of Foundation Model-based Embodied AI Agents [47.69642609574771]
Embodied artificial intelligence (EAI) integrates advanced AI models into physical entities for real-world interaction.
Foundation models as the "brain" of EAI agents for high-level task planning have shown promising results.
However, the deployment of these agents in physical environments presents significant safety challenges.
This study introduces EAIRiskBench, a novel framework for automated physical risk assessment in EAI scenarios.
arXiv Detail & Related papers (2024-08-08T13:19:37Z) - An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems [3.303448701376485]
Anomaly detection is critical for the secure and reliable operation of industrial control systems.
This paper presents a novel deep generative model to meet this need.
arXiv Detail & Related papers (2024-05-03T23:58:27Z) - FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids [53.2306792009435]
FaultGuard is the first framework for fault type and zone classification resilient to adversarial attacks.
We propose a low-complexity fault prediction model and an online adversarial training technique to enhance robustness.
Our model outclasses the state-of-the-art for resilient fault prediction benchmarking, with an accuracy of up to 0.958.
arXiv Detail & Related papers (2024-03-26T08:51:23Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Design Methodology for Deep Out-of-Distribution Detectors in Real-Time
Cyber-Physical Systems [5.233831361879669]
An out-of-distribution (OOD) detector can run in parallel with an ML model and flag inputs that could lead to undesirable outcomes.
This study proposes a design methodology to tune deep OOD detectors to meet the accuracy and response time requirements of embedded applications.
arXiv Detail & Related papers (2022-07-29T14:06:27Z) - Learning-Based Vulnerability Analysis of Cyber-Physical Systems [10.066594071800337]
This work focuses on the use of deep learning for vulnerability analysis of cyber-physical systems.
We consider a control architecture widely used in CPS (e.g., robotics) where the low-level control is based on e.g., the extended Kalman filter (EKF) and an anomaly detector.
To facilitate analyzing the impact potential sensing attacks could have, our objective is to develop learning-enabled attack generators.
arXiv Detail & Related papers (2021-03-10T06:52:26Z) - An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems [0.0]
Increased dependence on software based control has escalated the vulnerabilities of Cyber Physical Systems.
We propose a Reinforcement Learning (RL) based framework which adaptively sets the parameters of such detectors based on experience learned from attack scenarios.
arXiv Detail & Related papers (2021-03-04T07:38:50Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Securing of Unmanned Aerial Systems (UAS) against security threats using
human immune system [1.2691047660244335]
An Intrusion Detection System (IDS) has been proposed to protect against the security problems using the human immune system (HIS)
The IDSs are used to detect and respond to attempts to compromise the target system.
arXiv Detail & Related papers (2020-03-01T19:05:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.