Transfer adversarial attacks across industrial intelligent systems

被引:4
|
作者
Yin, Zhenqin [1 ]
Zhuo, Yue [1 ]
Ge, Zhiqiang [1 ]
机构
[1] Zhejiang Univ, Coll Control Sci & Engn, Key Lab Ind Control Technol, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Intelligent systems security; Industrial intelligent systems; Adversarial attack; Transfer-based attack; Adversarial defense; SECURITY;
D O I
10.1016/j.ress.2023.109299
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As indispensable parts of industrial production control, data-driven industrial intelligent systems (IIS) achieve efficient executions of significant tasks such as fault classification (FC), fault detection (FD), and soft sensing (SS). Recently, machine learning models have been proven vulnerable to adversarial attacks, where the transfer-based attacks provide highly feasible attacks on systems in real-world black-box scenarios. In this paper, to study the practical security risks of IIS, we investigate transferable adversarial attacks from: (1) showing the existence of transferable adversarial examples across different industrial tasks; (2) exploring factors (e.g., data feature, model structure, and attack method) affecting transferability under multi-scenarios; (3) proposing a new method to enhance the transferability; (4) providing guidelines on practical system deployments to defend against transferable adversarial threats. The attacks demonstrate generality on two types of datasets, Tennessee Eastman industrial process (TEP) and WM-811K wafer map dataset, and the experiment results show that: (1) transfer is asymmetric and complex models are relatively stable with low sample transferability; (2) iterative and single-step methods have opposite performance characteristics under the intra-and cross-task transfer; (3) overfitting of optimization methods leads to weak transferability; (4) smoothing gradients and widening intermediate layer perturbations are effective directions for improving transferability.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Adversarial Attacks in Industrial Control Cyber Physical Systems
    Figueroa, Henry
    Wang, Yi
    Giakos, George C.
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGING SYSTEMS AND TECHNIQUES (IST 2022), 2022,
  • [2] Adversarial Attacks in Industrial Control Cyber Physical Systems
    Figueroa, Henry
    Wang, Yi
    Giakos, George C.
    IST 2022 - IEEE International Conference on Imaging Systems and Techniques, Proceedings, 2022,
  • [3] Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems
    Anthi, Eirini
    Williams, Lowri
    Rhode, Matilda
    Burnap, Pete
    Wedgbury, Adam
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [4] Exploring Adversarial Attacks in Semantic Communication Systems across Diverse Channel Environments
    Shi, Mingjia
    Yang, Yandie
    Lin, Yun
    2024 INTERNATIONAL CONFERENCE ON UBIQUITOUS COMMUNICATION, UCOM 2024, 2024, : 522 - 526
  • [5] Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems
    Zizzo, Giulio
    Hankin, Chris
    Maffeis, Sergio
    Jones, Kevin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 900 - 911
  • [6] Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems
    Yao, Likai
    Shao, Sicong
    Hariri, Salim
    2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [7] Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems
    Liu, Yaru
    Xu, Lijuan
    Yang, Shumian
    Zhao, Dawei
    Li, Xin
    COMPUTERS & SECURITY, 2024, 140
  • [8] DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems
    Li, Gaolei
    Ota, Kaoru
    Dong, Mianxiong
    Wu, Jun
    Li, Jianhua
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) : 3267 - 3277
  • [9] Adversarial Attacks on Speech Separation Systems
    Trinh, Kendrick
    Moh, Melody
    Moh, Teng-Sheng
    2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 703 - 708
  • [10] Evolutionary Adversarial Attacks on Payment Systems
    Kumar, Nishant
    Vimal, Siddharth
    Kayathwal, Kanishka
    Dhama, Gaurav
    20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 813 - 818