2021
DOI: 10.1016/j.jisa.2020.102717
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0
5

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 91 publications
(55 citation statements)
references
References 14 publications
0
50
0
5
Order By: Relevance
“…Further cyber risk assessment challenges emerge from compiling of connected systems, devices and platforms [9]. This creates cyber risk (e.g., from data in transit) [10] and requires standardisation of processes [11]. We combine literature analysis on these topics, with epistemological analysis to uncover the best method to define a risk assessment for IoT cyber risk.…”
Section: Methodsmentioning
confidence: 99%
“…Further cyber risk assessment challenges emerge from compiling of connected systems, devices and platforms [9]. This creates cyber risk (e.g., from data in transit) [10] and requires standardisation of processes [11]. We combine literature analysis on these topics, with epistemological analysis to uncover the best method to define a risk assessment for IoT cyber risk.…”
Section: Methodsmentioning
confidence: 99%
“…With the increased use of ML in Intrusion Detection Systems (IDS) and IDPS systems within cyber security packages of SME communities, there suddenly lies the introduction of a new type of attack called Adversarial Machine Learning (AML) [ 1 ]. In a paper by Anthi et al [ 17 ] states that with the introduction of ML IDSs, comes the creation of additional attack vectors specifically trying to break the ML algorithms and causing a bypass to these IDS and IDPS systems. This causes the learning models of ML algorithms subject to cyber-attacks, often referred to as AML.…”
Section: Cybersecuritymentioning
confidence: 99%
“…These AMLs are thought to be detrimental as they can cause further delayed attack detection which could result in infrastructure damages, financial loss, and even loss of life. As [ 17 ] suggests, the emergence of Industrial Control Systems (ICS) plays a critical part on national infrastructure such as manufacturing, power/smart grids, water treatment plants, gas and oil refineries, and health-care. With ICS becoming more integrated and connected to the internet, the degree of remote access and monitoring functionalities increases thus becoming a vulnerable point target for cyber war.…”
Section: Cybersecuritymentioning
confidence: 99%
“…The authors in [20] explore the consequences of adversarial attacks and show how adversarial training can support the robustness of supervised models. They use confusion matrices and classification performance of J48 and Random Forest models trained on adversarial samples generated.…”
Section: Related Workmentioning
confidence: 99%
“…They use confusion matrices and classification performance of J48 and Random Forest models trained on adversarial samples generated. Notably, [20] addresses the unique challenges of implementing adversarial attacks in the cybersecurity domain. Although the paper discusses the FGSM attack, unlike our proposal, it does not use CNN.…”
Section: Related Workmentioning
confidence: 99%