Towards Low-Barrier Cybersecurity Research and Education for Industrial
Control Systems
- URL: http://arxiv.org/abs/2308.16769v2
- Date: Mon, 4 Sep 2023 02:58:33 GMT
- Title: Towards Low-Barrier Cybersecurity Research and Education for Industrial
Control Systems
- Authors: Colman McGuan, Chansu Yu, Qin Lin
- Abstract summary: We develop a framework to automatically launch cyberattacks, collect data, train machine learning models, and evaluate for practical chemical and manufacturing processes.
On our testbed, we validate our proposed intrusion detection model called Minimal Threshold and Window SVM.
Results show that MinTWin SVM minimizes false positives and is responsive to physical process anomalies.
- Score: 1.2584276673531931
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The protection of Industrial Control Systems (ICS) that are employed in
public critical infrastructures is of utmost importance due to catastrophic
physical damages cyberattacks may cause. The research community requires
testbeds for validation and comparing various intrusion detection algorithms to
protect ICS. However, there exist high barriers to entry for research and
education in the ICS cybersecurity domain due to expensive hardware, software,
and inherent dangers of manipulating real-world systems. To close the gap,
built upon recently developed 3D high-fidelity simulators, we further showcase
our integrated framework to automatically launch cyberattacks, collect data,
train machine learning models, and evaluate for practical chemical and
manufacturing processes. On our testbed, we validate our proposed intrusion
detection model called Minimal Threshold and Window SVM (MinTWin SVM) that
utilizes unsupervised machine learning via a one-class SVM in combination with
a sliding window and classification threshold. Results show that MinTWin SVM
minimizes false positives and is responsive to physical process anomalies.
Furthermore, we incorporate our framework with ICS cybersecurity education by
using our dataset in an undergraduate machine learning course where students
gain hands-on experience in practicing machine learning theory with a practical
ICS dataset. All of our implementations have been open-sourced.
Related papers
- Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study [4.2751988244805466]
In this paper, we use automata learning to derive state machines from network-traffic data.
We apply our approach to a commercial network intrusion detection system developed by our industry partner, RabbitRun Technologies.
Our approach results in an average 67.5% reduction in the number of states and transitions of the learned state machines.
arXiv Detail & Related papers (2024-05-18T02:10:41Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Vulnerability Assessment of Industrial Control System with an Improved
CVSS [3.9596068699962323]
This study proposes a method to assess the risk of cyberattacks on ICS with an improved Common Vulnerability Scoring System (CVSS)
Results show the physical system levels of ICS have the highest severity once cyberattacked.
arXiv Detail & Related papers (2023-06-14T16:48:06Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Ensemble learning techniques for intrusion detection system in the
context of cybersecurity [0.0]
Intrusion Detection System concept was used with the application of the Data Mining and Machine Learning Orange tool to obtain better results.
The main objective of the study was to investigate the Ensemble Learning technique using the Stacking method, supported by the Support Vector Machine (SVM) and kNearest Neighbour (kNN) algorithms.
arXiv Detail & Related papers (2022-12-21T10:50:54Z) - Support Vector Machines under Adversarial Label Contamination [13.299257835329868]
We evaluate the security of Support Vector Machines (SVMs) to well-crafted, adversarial label noise attacks.
In particular, we consider an attacker that aims to formalize the SVM's classification error by flipping a number of labels.
We argue that our approach can also provide useful insights for developing more secure SVM learning algorithms.
arXiv Detail & Related papers (2022-06-01T09:38:07Z) - Multi Agent System for Machine Learning Under Uncertainty in Cyber
Physical Manufacturing System [78.60415450507706]
Recent advancements in predictive machine learning has led to its application in various use cases in manufacturing.
Most research focused on maximising predictive accuracy without addressing the uncertainty associated with it.
In this paper, we determine the sources of uncertainty in machine learning and establish the success criteria of a machine learning system to function well under uncertainty.
arXiv Detail & Related papers (2021-07-28T10:28:05Z) - Federated Learning with Unreliable Clients: Performance Analysis and
Mechanism Design [76.29738151117583]
Federated Learning (FL) has become a promising tool for training effective machine learning models among distributed clients.
However, low quality models could be uploaded to the aggregator server by unreliable clients, leading to a degradation or even a collapse of training.
We model these unreliable behaviors of clients and propose a defensive mechanism to mitigate such a security risk.
arXiv Detail & Related papers (2021-05-10T08:02:27Z) - Extending Isolation Forest for Anomaly Detection in Big Data via K-Means [8.560480662599407]
We propose a novel unsupervised machine learning approach that combines the K-Means algorithm with the Isolation Forest for anomaly detection in industrial big data scenarios.
We utilize the Apache Spark framework to implement our proposed model which was trained in large network traffic data.
We find that our proposed system can be used for real-time anomaly detection in the industrial setup.
arXiv Detail & Related papers (2021-04-27T16:21:48Z) - Adversarial defense for automatic speaker verification by cascaded
self-supervised learning models [101.42920161993455]
More and more malicious attackers attempt to launch adversarial attacks at automatic speaker verification (ASV) systems.
We propose a standard and attack-agnostic method based on cascaded self-supervised learning models to purify the adversarial perturbations.
Experimental results demonstrate that the proposed method achieves effective defense performance and can successfully counter adversarial attacks.
arXiv Detail & Related papers (2021-02-14T01:56:43Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.