2017
DOI: 10.48550/arxiv.1709.06397
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Deep Learning-based Framework for Conducting Stealthy Attacks in Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 28 publications
0
17
0
Order By: Relevance
“…Generative models can be used to learn the distribution of normal traffic, and then automate the generation of attacks that look benign. For example, Feng et al [75] use deep learning to automatically learn what normal traffic entering the system looks like, and then generate samples from this distribution. Lin et al [142] use GAN's training method to train a generator against a discriminator, creating adversarial traffic samples that can evade the target detector.…”
Section: Intrusion Attacksmentioning
confidence: 99%
“…Generative models can be used to learn the distribution of normal traffic, and then automate the generation of attacks that look benign. For example, Feng et al [75] use deep learning to automatically learn what normal traffic entering the system looks like, and then generate samples from this distribution. Lin et al [142] use GAN's training method to train a generator against a discriminator, creating adversarial traffic samples that can evade the target detector.…”
Section: Intrusion Attacksmentioning
confidence: 99%
“…These schemes make use of publicly available attack dataset [11] and modify those attacks to generate a limited number of stealthy attacks for the specific detection method. In [10,15], the authors used Generative Adversarial Networks (GANs) for learning anomaly detector classifiers and for the generation of malicious sensor measurements that will go undetected. A gradient-based adversarial attack scheme was proposed in [13] which was able to deceive Recurrent Neural Network (RNN) based anomaly detector in two-real world CPS namely WADI [4] and SWaT [17].…”
Section: Related Workmentioning
confidence: 99%
“…A number of recent studies have focused on evasion attacks on CPS anomaly detectors. In [22], the authors showed that generative adversarial networks (GANs) can be used for realtime learning of an unknown ICS anomaly detector (more specifically, a classifier) and for the generation of malicious sensor measurements that will go undetected.…”
Section: Related Workmentioning
confidence: 99%
“…First and foremost, all of the abovementioned papers examined evasion attacks, while our research focuses on poisoning attacks. Second, [22], [6], [8] considered a threat model in which the attacker manipulates the detector's input data in addition to manipulating the sensor data fed to the PLC. Such a model provides a lot of freedom for the adversary to make changes to both types of data.…”
Section: Related Workmentioning
confidence: 99%