CGAN-based cyber deception framework against reconnaissance attacks in ICS

被引:0
|
作者
Qin, Xingsheng [1 ]
Jiang, Frank [1 ]
Qin, Xingguo [2 ]
Ge, Lina [3 ]
Lu, Meiqu [3 ]
Doss, Robin [1 ]
机构
[1] Deakin Univ, Deakin Cyber Res & Innovat Ctr, Sch Informat Technol, Geelong, Vic, Australia
[2] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin, Peoples R China
[3] Guangxi Minzu Univ, Sch Artificial Intelligence, Nanning, Peoples R China
关键词
CGAN; Cyber deception; Hybrid defense; ICS; SDN; SOFTWARE-DEFINED NETWORKING; SECURITY;
D O I
10.1016/j.comnet.2024.110655
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Industrial Control Systems (ICSs) have faced increasing vulnerability to cyber attacks due to their integration with the Internet. Despite efforts to enhance cybersecurity, reconnaissance attacks remain a significant threat, prompting the need for innovative defensive strategies. This paper introduces a novel approach to strengthen the defensive capabilities of ICS networks against reconnaissance attacks using machine learning-driven cyber deception techniques. Leveraging Conditional Generative Adversarial Networks (CGANs), the proposed framework dynamically generates defensive network topologies to network shuffling and implement deception strategies, prioritizing system availability. Extensive simulations demonstrate the superior efficacy of the proposed framework in enhancing cybersecurity while minimizing computational overhead. By effectively mitigating reconnaissance attacks, this solution reinforces the resilience of ICS networks, safeguarding critical industrial infrastructure from evolving cyber threats. These findings underscore the significance of adopting machine learning-based cyber deception as a pragmatic security measure for protecting ICS networks in real-world industrial contexts.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
    Li, Huanruo
    Guo, Yunfei
    Huo, Shumin
    Hu, Hongchao
    Sun, Penghao
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [2] Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
    Huanruo LI
    Yunfei GUO
    Shumin HUO
    Hongchao HU
    Penghao SUN
    Science China(Information Sciences), 2022, 65 (07) : 67 - 85
  • [3] Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
    Huanruo Li
    Yunfei Guo
    Shumin Huo
    Hongchao Hu
    Penghao Sun
    Science China Information Sciences, 2022, 65
  • [4] Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory
    Anwar, Ahmed H.
    Zhu, Mu
    Wan, Zeilin
    Cho, Jin-Hee
    Kamhoua, Charles A.
    Singh, Munindar P.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3393 - 3398
  • [5] Mirage: cyber deception against autonomous cyber attacks in emulation and simulation
    Kouremetis, Michael
    Lawrence, Dean
    Alford, Ron
    Cheuvront, Zoe
    Davila, David
    Geyer, Benjamin
    Haigh, Trevor
    Michalak, Ethan
    Murphy, Rachel
    Russo, Gianpaolo
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (11-12) : 803 - 817
  • [6] Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
    Aydeger, Abdullah
    Saputro, Nico
    Akkaya, Kemal
    PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 279 - 285
  • [7] Empirical Study on Reconnaissance Attacks in SDN-aware Network for Evaluating Cyber Deception
    Do Thi Thu Hien
    Hien Do Hoang
    Van-Hau Pham
    2021 RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES (RIVF 2021), 2021, : 295 - 300
  • [8] Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems
    Kamdem, Priva Chassem
    Zemkoho, Alain B.
    Njilla, Laurent
    Nkenlifack, Marcellin
    Kamhoua, Charles A.
    IEEE ACCESS, 2024, 12 : 171559 - 171570
  • [9] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [10] Resilience Against Sensor Deception Attacks on Cyber-Physical Control Systems
    Lafortune, Stephane
    Dotoli, Mariagrazia
    Gregoire, Amphitheatre A.
    2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019), 2019,