GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks

被引:4
|
作者
Zarzycki, Krzysztof [1 ]
Chaber, Patryk [1 ,2 ]
Cabaj, Krzysztof
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Nebeluk, Robert [1 ]
Plamowski, Sebastian [1 ]
Wojtulewicz, Andrzej [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00661 Warsaw, Poland
关键词
Generative adversarial networks; Protocols; Process control; Cyberattack; Testing; Neural networks; Fuzzing; GAN neural networks; cyber-security; cyber-attacks; industrial network;
D O I
10.1109/ACCESS.2023.3277250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of computer systems and networks against malicious attacks is particularly important in industrial networked control systems. A successful cyber-attack may cause significant economic losses or even destruction of controlled processes. Therefore, it is necessary to test the vulnerability of process control industrial networks against possible cyber-attacks. Three approaches employing Generative Adversarial Networks (GANs) to generate fake Modbus frames have been proposed in this work, tested for an industrial process control network and compared with the classical approach known from the literature. In the first approach, one GAN generates one byte of a message frame. In the next two approaches, expert knowledge about frame structure is used to generate a part of a message frame, while the remaining parts are generated using single or multiple GANs. The classical single-GAN approach is the worst one. The proposed one-GAN-per-byte approach generates significantly more correct message frames than the classical method. Moreover, all the generated fake frames have been correct in two of the proposed approaches, i.e., single GAN for selected bytes and multiple GANs for selected bytes methods. Finally, we describe the effect of cyber-attacks on the operation of the controlled process.
引用
收藏
页码:49587 / 49600
页数:14
相关论文
共 50 条
  • [31] CNN based method for the development of cyber-attacks detection algorithms in industrial control systems
    Nedeljkovic, Dusan
    Jakovljevic, Zivana
    Computers and Security, 2022, 114
  • [32] Attack-Tolerant Network Control System Based on the Deception for the Cyber-Attacks
    Yaseen, Amer Atta
    Bayart, Mireille
    2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2015, : 37 - 44
  • [33] Biobjective robust Network-wide traffic signal optimization against Cyber-attacks
    Bao, Ji
    Zheng, Liang
    Ban, Xuegang
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2023, 151
  • [34] Interaction network-based resilient consensus of connected vehicles against cyber-attacks
    Liu, Yonggui
    Li, Zeming
    Guo, Ge
    IET CONTROL THEORY AND APPLICATIONS, 2023, 17 (06): : 744 - 756
  • [35] Detection of False Data Injection Cyber-Attacks in DC Microgrids Based on Recurrent Neural Networks
    Habibi, Mohammad Reza
    Baghaee, Hamid Reza
    Dragicevic, Tomislav
    Blaabjerg, Frede
    IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN POWER ELECTRONICS, 2021, 9 (05) : 5294 - 5310
  • [36] Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems
    Miller, Thomas
    Staves, Alexander
    Maesschalck, Sam
    Sturdee, Miriam
    Green, Benjamin
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 35
  • [37] Adaptive event-triggered synchronization control for complex networks with quantization and cyber-attacks
    Pan, Rongqing
    Tan, Yushun
    Du, Dongsheng
    Fei, Shumin
    NEUROCOMPUTING, 2020, 382 : 249 - 258
  • [38] A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Ansari, Nirwan
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (09): : 1594 - 1606
  • [39] Transient Stability Enhancement of Power Grid by Neural Network Controlled BFCL Considering Cyber-Attacks
    Sadi, Mohammad Ashraf Hossain
    Zheng, Huaxi
    Ali, Mohd. Hasan
    SOUTHEASTCON 2017, 2017,
  • [40] Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks
    Wu, Yingjun
    Chen, Jinfan
    Ru, Yingtao
    Xu, Hao
    Roger, Mbonyineza
    Ni, Ming
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2883 - 2894