ANALYSE -- Learning to Attack Cyber-Physical Energy Systems With
Intelligent Agents
- URL: http://arxiv.org/abs/2305.09476v1
- Date: Fri, 21 Apr 2023 11:36:18 GMT
- Title: ANALYSE -- Learning to Attack Cyber-Physical Energy Systems With
Intelligent Agents
- Authors: Thomas Wolgast, Nils Wenninghoff, Stephan Balduin, Eric Veith, Bastian
Fraune, Torben Woltjen, Astrid Nie{\ss}e
- Abstract summary: ANALYSE is a machine-learning-based software suite to let learning agents autonomously find attacks in cyber-physical energy systems.
It is designed to find yet unknown attack types and to reproduce many known attack strategies in cyber-physical energy systems from the scientific literature.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The ongoing penetration of energy systems with information and communications
technology (ICT) and the introduction of new markets increase the potential for
malicious or profit-driven attacks that endanger system stability. To ensure
security-of-supply, it is necessary to analyze such attacks and their
underlying vulnerabilities, to develop countermeasures and improve system
design. We propose ANALYSE, a machine-learning-based software suite to let
learning agents autonomously find attacks in cyber-physical energy systems,
consisting of the power system, ICT, and energy markets. ANALYSE is a modular,
configurable, and self-documenting framework designed to find yet unknown
attack types and to reproduce many known attack strategies in cyber-physical
energy systems from the scientific literature.
Related papers
- Intelligent Attacks on Cyber-Physical Systems and Critical Infrastructures [0.0]
This chapter provides an overview of the evolving landscape of attacks in cyber-physical systems and critical infrastructures.
It highlights the possible use of Artificial Intelligence (AI) algorithms to develop intelligent cyberattacks.
arXiv Detail & Related papers (2025-01-22T09:54:58Z) - Modern Hardware Security: A Review of Attacks and Countermeasures [1.7265013728931]
In this paper, we review the current state of vulnerabilities and mitigation strategies in contemporary computing systems.
We discuss cache side-channel attacks (including Spectre and Meltdown), power side-channel attacks (such as Simple Power Analysis), and advanced techniques like Voltage Glitching and Electromagnetic Analysis.
The paper concludes with an analysis of the RISC-V architecture's unique security challenges.
arXiv Detail & Related papers (2025-01-08T10:14:19Z) - Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - The Shadow of Fraud: The Emerging Danger of AI-powered Social Engineering and its Possible Cure [30.431292911543103]
Social engineering (SE) attacks remain a significant threat to both individuals and organizations.
The advancement of Artificial Intelligence (AI) has potentially intensified these threats by enabling more personalized and convincing attacks.
This survey paper categorizes SE attack mechanisms, analyzes their evolution, and explores methods for measuring these threats.
arXiv Detail & Related papers (2024-07-22T17:37:31Z) - Threat analysis and adversarial model for Smart Grids [1.7482569079741024]
The cyber domain of this smart power grid opens a new plethora of threats.
Different stakeholders including regulation bodies, industry and academy are making efforts to provide security mechanisms to mitigate and reduce cyber-risks.
Recent work shows a lack of agreement among grid practitioners and academic experts on the feasibility and consequences of academic-proposed threats.
This is in part due to inadequate simulation models which do not evaluate threats based on attackers full capabilities and goals.
arXiv Detail & Related papers (2024-06-17T16:33:46Z) - GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction [53.2306792009435]
We propose GAN-GRID a novel adversarial attack targeting the stability prediction system of a smart grid tailored to real-world constraints.
Our findings reveal that an adversary armed solely with the stability model's output, devoid of data or model knowledge, can craft data classified as stable with an Attack Success Rate (ASR) of 0.99.
arXiv Detail & Related papers (2024-05-20T14:43:46Z) - ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management [65.0114141380651]
ThreatKG is an automated system for OSCTI gathering and management.
It efficiently collects a large number of OSCTI reports from multiple sources.
It uses specialized AI-based techniques to extract high-quality knowledge about various threat entities.
arXiv Detail & Related papers (2022-12-20T16:13:59Z) - Artificial Intelligence-Based Smart Grid Vulnerabilities and Potential
Solutions for Fake-Normal Attacks: A Short Review [0.0]
Smart grid systems are critical to the power industry, however their sophisticated architectural design and operations expose them to a number of cybersecurity threats.
Artificial Intelligence (AI)-based technologies are becoming increasingly popular for detecting cyber assaults in a variety of computer settings.
The present AI systems are being exposed and vanquished because of the recent emergence of sophisticated adversarial systems such as Generative Adversarial Networks (GAN)
arXiv Detail & Related papers (2022-02-14T21:41:36Z) - A Framework for Evaluating the Cybersecurity Risk of Real World, Machine
Learning Production Systems [41.470634460215564]
We develop an extension to the MulVAL attack graph generation and analysis framework to incorporate cyberattacks on ML production systems.
Using the proposed extension, security practitioners can apply attack graph analysis methods in environments that include ML components.
arXiv Detail & Related papers (2021-07-05T05:58:11Z) - Internet of Predictable Things (IoPT) Framework to Increase
Cyber-Physical System Resiliency [0.0]
This paper proposes the concept of the Internet of Predictable Things (IoPT)
It incorporates advanced data analytics and machine learning methods to increase the resiliency of cyber-physical systems against cybersecurity risks.
arXiv Detail & Related papers (2021-01-19T19:01:56Z) - Security and Machine Learning in the Real World [33.40597438876848]
We build on our experience evaluating the security of a machine learning software product deployed on a large scale to broaden the conversation to include a systems security view of vulnerabilities.
We propose a list of short-term mitigation suggestions that practitioners deploying machine learning modules can use to secure their systems.
arXiv Detail & Related papers (2020-07-13T16:57:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.