Autonomous Attack Mitigation for Industrial Control Systems

被引:1
|
作者
Mern, John [1 ]
Hatch, Kyle [2 ]
Silva, Ryan [3 ]
Hickert, Cameron [3 ]
Sookoor, Tamim [3 ]
Kochenderfer, Mykel J. [1 ]
机构
[1] Stanford Univ, Aeronaut & Astronaut, Stanford, CA USA
[2] Stanford Univ, Comp Sci, Stanford, CA USA
[3] Johns Hopkins Univ, Appl Phys Lab, Baltimore, MD USA
关键词
reinforcement learning; artificial intelligence; machine learning; industrial control systems;
D O I
10.1109/DSN-W54100.2022.00015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Defending industrial control systems and other networks from cyber attack requires timely responses to alerts and threat intelligence. Decisions about how to respond involve coordinating actions across multiple nodes based on imperfect indicators of compromise while minimizing disruptions to network operations. Currently, playbooks are used to automate portions of a response process, but often leave complex decision-making to a human analyst. In this work, we present a deep reinforcement learning approach to autonomous response and recovery in large industrial control networks. We propose an attention-based neural architecture that is flexible to the size of the network under protection. To train and evaluate the autonomous defender agent, we present an industrial control network simulation environment suitable for reinforcement learning. Experiments show that the learned agent can effectively mitigate advanced attacks that progress with few observable signals over several months before execution. The proposed application of AI/ML techniques for security outperforms a fully automated playbook method in simulation, taking less disruptive actions while also defending more nodes on the network. The learned policy is also more robust to changes in attacker behavior than playbook approaches.
引用
收藏
页码:28 / 36
页数:9
相关论文
共 50 条
  • [21] Towards Attack Models in Autonomous Systems of Systems
    Surkovic, Amer
    Hanic, Dzana
    Lisova, Elena
    Causevic, Aida
    Wenslandt, David
    Falk, Carl
    2018 13TH ANNUAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2018, : 583 - 585
  • [22] Command Disaggregation Attack and Mitigation in Industrial Internet of Things
    Xun, Peng
    Zhu, Pei-Dong
    Hu, Yi-Fan
    Cui, Peng-Shuai
    Zhang, Yan
    SENSORS, 2017, 17 (10)
  • [23] A model predictive approach for cyber-attack detection and mitigation in control systems
    Rosich, Albert
    Voos, Holger
    Li, Yumei
    Darouach, Mohamed
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 6621 - 6626
  • [24] Performance and Resilience of Cyber-Physical Control Systems With Reactive Attack Mitigation
    Lakshminarayana, Subhash
    Karachiwala, Jabir Shabbir
    Teng, Teo Zhan
    Tan, Rui
    Yau, David K. Y.
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (06) : 6640 - 6654
  • [25] Attack Detection and Mitigation Techniques in Industrial Control System - Smart Grid DNP3
    Darwish, Ihab
    Saadawi, Tarek
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 131 - 134
  • [26] A hybrid cyber defense framework for reconnaissance attack in industrial control systems
    Qin, Xingsheng
    Jiang, Frank
    Dong, Chengzu
    Doss, Robin
    COMPUTERS & SECURITY, 2024, 136
  • [27] A systematic literature review on past attack analysis on industrial control systems
    Goel, Swati
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (06):
  • [28] LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems
    Le, Anhtuan
    Roedig, Utz
    Rashid, Awais
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017, 2017, 10379 : 36 - 52
  • [29] Detection and mitigation of deception attacks on cloud-based industrial control systems
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 106 - 110
  • [30] Automatic Attack Surface Reduction in Next-Generation Industrial Control Systems
    Obermeier, Sebastian
    Wahler, Michael
    Sivanthi, Thanikesavan
    Schlegel, Roman
    Monot, Aurelien
    2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2014, : 42 - 49