Autonomous Attack Mitigation for Industrial Control Systems

被引:1
|
作者
Mern, John [1 ]
Hatch, Kyle [2 ]
Silva, Ryan [3 ]
Hickert, Cameron [3 ]
Sookoor, Tamim [3 ]
Kochenderfer, Mykel J. [1 ]
机构
[1] Stanford Univ, Aeronaut & Astronaut, Stanford, CA USA
[2] Stanford Univ, Comp Sci, Stanford, CA USA
[3] Johns Hopkins Univ, Appl Phys Lab, Baltimore, MD USA
关键词
reinforcement learning; artificial intelligence; machine learning; industrial control systems;
D O I
10.1109/DSN-W54100.2022.00015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Defending industrial control systems and other networks from cyber attack requires timely responses to alerts and threat intelligence. Decisions about how to respond involve coordinating actions across multiple nodes based on imperfect indicators of compromise while minimizing disruptions to network operations. Currently, playbooks are used to automate portions of a response process, but often leave complex decision-making to a human analyst. In this work, we present a deep reinforcement learning approach to autonomous response and recovery in large industrial control networks. We propose an attention-based neural architecture that is flexible to the size of the network under protection. To train and evaluate the autonomous defender agent, we present an industrial control network simulation environment suitable for reinforcement learning. Experiments show that the learned agent can effectively mitigate advanced attacks that progress with few observable signals over several months before execution. The proposed application of AI/ML techniques for security outperforms a fully automated playbook method in simulation, taking less disruptive actions while also defending more nodes on the network. The learned policy is also more robust to changes in attacker behavior than playbook approaches.
引用
收藏
页码:28 / 36
页数:9
相关论文
共 50 条
  • [2] Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems
    Sandor, Hunor
    Genge, Bela
    Szanto, Zoltan
    Marton, Lorinc
    Haller, Piroska
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 25 : 152 - 168
  • [3] On Attack Mitigation in Supervisory Control Systems: A Tolerant Control Approach
    Yao, Jingshi
    Yin, Xiang
    Li, Shaoyuan
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 4504 - 4510
  • [4] Control Logic Obfuscation Attack in Industrial Control Systems
    Zubair, Nauman
    Ayub, Adeen
    Yoo, Hyunguk
    Ahmed, Irfan
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 267 - 272
  • [5] DEFINING ATTACK PATTERNS FOR INDUSTRIAL CONTROL SYSTEMS
    Chan, Raymond
    Chow, Kam-Pui
    Chan, Chun-Fai
    CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 289 - 309
  • [6] Autonomous Attack Mitigation Through Firewall Reconfiguration
    Bringhenti, Daniele
    Pizzato, Francesco
    Sisto, Riccardo
    Valenza, Fulvio
    International Journal of Network Management, 1
  • [7] Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
    Lakshminarayana, Subhash
    Teng, Teo Zhan
    Yau, David K. Y.
    Tan, Rui
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS (E-ENERGY'17), 2017, : 179 - 190
  • [8] Mitigation of sensor attacks on legacy industrial control systems
    Combita, Luis F.
    Cardenas, Alvaro A.
    Quijano, Nicanor
    2017 IEEE 3RD COLOMBIAN CONFERENCE ON AUTOMATIC CONTROL (CCAC), 2017,
  • [9] Misusing Sensory Channel to Attack Industrial Control Systems
    Rasapour, Farhad
    Mehrpouyan, Hoda
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 158 - 160
  • [10] Attack detection/prevention system against cyber attack in industrial control systems
    Yilmaz, Ercan Nurcan
    Gonen, Serkan
    COMPUTERS & SECURITY, 2018, 77 : 94 - 105