Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning

07/11/2021
by   Muhammad Azmi Umer, et al.
0

Adversarial learning is used to test the robustness of machine learning algorithms under attack and create attacks that deceive the anomaly detection methods in Industrial Control System (ICS). Given that security assessment of an ICS demands that an exhaustive set of possible attack patterns is studied, in this work, we propose an association rule mining-based attack generation technique. The technique has been implemented using data from a secure Water Treatment plant. The proposed technique was able to generate more than 300,000 attack patterns constituting a vast majority of new attack vectors which were not seen before. Automatically generated attacks improve our understanding of the potential attacks and enable the design of robust attack detection techniques.

READ FULL TEXT

page 2

page 4

research
09/13/2018

Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems

A hackfest named SWaT Security Showdown (S3) has been organized consecut...
research
08/09/2023

Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning

ModSecurity is widely recognized as the standard open-source Web Applica...
research
12/10/2019

Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques

Machine learning techniques help to understand patterns of a dataset to ...
research
04/16/2020

Learning the Associations of MITRE ATT CK Adversarial Techniques

The MITRE ATT CK Framework provides a rich and actionable repository o...
research
05/27/2020

Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation

In this paper we propose a novel methodology to assist in identifying vu...
research
11/16/2022

Analysis and Detectability of Offline Data Poisoning Attacks on Linear Systems

A recent body of literature has investigated the effect of data poisonin...
research
08/10/2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Attack graphs are one of the main techniques used to automate the risk a...

Please sign up or login with your details

Forgot password? Click here to reset