GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks

被引:4
|
作者
Zarzycki, Krzysztof [1 ]
Chaber, Patryk [1 ,2 ]
Cabaj, Krzysztof
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Nebeluk, Robert [1 ]
Plamowski, Sebastian [1 ]
Wojtulewicz, Andrzej [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00661 Warsaw, Poland
关键词
Generative adversarial networks; Protocols; Process control; Cyberattack; Testing; Neural networks; Fuzzing; GAN neural networks; cyber-security; cyber-attacks; industrial network;
D O I
10.1109/ACCESS.2023.3277250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of computer systems and networks against malicious attacks is particularly important in industrial networked control systems. A successful cyber-attack may cause significant economic losses or even destruction of controlled processes. Therefore, it is necessary to test the vulnerability of process control industrial networks against possible cyber-attacks. Three approaches employing Generative Adversarial Networks (GANs) to generate fake Modbus frames have been proposed in this work, tested for an industrial process control network and compared with the classical approach known from the literature. In the first approach, one GAN generates one byte of a message frame. In the next two approaches, expert knowledge about frame structure is used to generate a part of a message frame, while the remaining parts are generated using single or multiple GANs. The classical single-GAN approach is the worst one. The proposed one-GAN-per-byte approach generates significantly more correct message frames than the classical method. Moreover, all the generated fake frames have been correct in two of the proposed approaches, i.e., single GAN for selected bytes and multiple GANs for selected bytes methods. Finally, we describe the effect of cyber-attacks on the operation of the controlled process.
引用
收藏
页码:49587 / 49600
页数:14
相关论文
共 50 条
  • [41] Event-based security tracking control for networked control systems against stochastic cyber-attacks
    Liu, Jinliang
    Dong, Yanhui
    Zha, Lijuan
    Tian, Engang
    Xie, Xiangpeng
    INFORMATION SCIENCES, 2022, 612 : 306 - 321
  • [42] Dynamic event-triggered security control of cyber-physical systems against missing measurements and cyber-attacks
    Zha, Lijuan
    Liao, Rongfei
    Liu, Jinliang
    Cao, Jinde
    Xie, Xiangpeng
    NEUROCOMPUTING, 2022, 500 : 405 - 412
  • [43] 1-Order-Smooth Explicit-Time Nonsingular Terminal Sliding Mode Control of Industrial Cyber-Physical Systems Against Cyber-Attacks
    Yan, Wen
    Zhao, Tao
    Yang, Haixin
    Wang, Xin
    Niu, Ben
    IEEE Transactions on Industrial Cyber-Physical Systems, 2023, 1 : 371 - 380
  • [44] Asynchronous secure control for singular nonhomogeneous Markov jump cyber-physical systems against dual cyber-attacks
    Zhang, Shuyu
    Wang, Yanqian
    Zhuang, Guangming
    Lv, Chengxing
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2024, 45 (01): : 106 - 137
  • [45] Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
    Rodofile, Nicholas R.
    Schmidt, Thomas
    Sherry, Sebastian T.
    Djamaludin, Christopher
    Radke, Kenneth
    Foo, Ernest
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 452 - 459
  • [46] Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks
    Anh Tung Nguyen
    Anand, Sribalaji C.
    Teixeira, Andre M. H.
    Medvedev, Alexander
    IFAC PAPERSONLINE, 2023, 56 (02): : 1820 - 1826
  • [47] A Cooperative Control Strategy against Cyber-attacks for Power System with High Penetration Wind Farm
    Yang, Kai
    Li, Jian
    Zhang, Guangdou
    Xing, Yankai
    Bamisile, Olusola
    Huang, Qi
    2022 4TH ASIA ENERGY AND ELECTRICAL ENGINEERING SYMPOSIUM (AEEES 2022), 2022, : 321 - 327
  • [48] Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks
    Hong, Wei-Chih
    Huang, Ding-Ray
    Chen, Chih-Lung
    Lee, Jung-San
    IEEE ACCESS, 2020, 8 : 123297 - 123309
  • [49] Event-Triggered State Estimation for T–S Fuzzy Neural Networks with Stochastic Cyber-Attacks
    Jinliang Liu
    Tingting Yin
    Xiangpeng Xie
    Engang Tian
    Shumin Fei
    International Journal of Fuzzy Systems, 2019, 21 : 532 - 544
  • [50] Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
    Obonna, Ugochukwu Onyekachi
    Opara, Felix Kelechi
    Mbaocha, Christian Chidiebere
    Obichere, Jude-Kennedy Chibuzo
    Akwukwaegbu, Isdore Onyema
    Amaefule, Miriam Mmesoma
    Nwakanma, Cosmas Ifeanyi
    FUTURE INTERNET, 2023, 15 (08):