TY - JOUR
T1 - Crafting adversarial samples for anomaly detectors in industrial control systems
AU - Gómez, Ángel Luis Perales
AU - Maimó, Lorenzo Fernández
AU - Celdrán, Alberto Huertas
AU - García Clemente, Félix J.
AU - Cleary, Frances
N1 - Funding Information:
This work has been funded by Spanish Ministry of Science, Innovation and Universities, State Research Agency, FEDER funds, under Grant RTI2018-095855-B-I00, the Swiss Federal Office for Defence Procurement (armasuisse) (project code and CYD-C-2020003) and the Government of Ireland, through the IRC post-doc fellowship (grant code GOIPD/2018/466).
Publisher Copyright:
© 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
PY - 2021
Y1 - 2021
N2 - The increasing adoption of the Industry 4.0 paradigm encompasses digitally interconnected factories which enables many advantages. However, it is still necessary to dedicate effort towards investigating protection mechanisms against cyberattacks in these scenarios. Despite the power demonstrated by Anomaly Detection-based Intrusion Detection Systems in industrial scenarios, their vulnerabilities to adversarial attacks, especially to evasion attacks, make Machine Learning and Deep Learning models ineffective for real scenarios. These type of attacks craft samples misclassified by the Intrusion Detection System and potentially reach industrial devices, causing potentially damaging impacts to factory workers and industry resources. Adversarial attacks linked to industrial scenarios are currently in early stages of development, hence most of them have the capability to craft samples misclassified by the IDS but not reach industrial devices. In this work, we present a new adversarial attack named Selective and Iterative Gradient Sign Method that overcomes the limitation of the adversarial attacks present in the literature. To complement this work we also detail a study of how the detection rate of an Intrusion Detection System is degraded and the time required by each technique to generate adversarial samples. The experiments were carried out using a dataset named Electra, collected from an Electric Traction Substation, and showed that adversarial attacks evaluated crafted samples misclassified by the IDS. However, only the method we proposed generated samples that can be understood by intermediate network devices and, therefore, reach their destination. Our experiment outputs demonstrate a lower period of time to achieve and craft adversarial samples using out our iterative based process method as opposed to other current iterative methods currently available.
AB - The increasing adoption of the Industry 4.0 paradigm encompasses digitally interconnected factories which enables many advantages. However, it is still necessary to dedicate effort towards investigating protection mechanisms against cyberattacks in these scenarios. Despite the power demonstrated by Anomaly Detection-based Intrusion Detection Systems in industrial scenarios, their vulnerabilities to adversarial attacks, especially to evasion attacks, make Machine Learning and Deep Learning models ineffective for real scenarios. These type of attacks craft samples misclassified by the Intrusion Detection System and potentially reach industrial devices, causing potentially damaging impacts to factory workers and industry resources. Adversarial attacks linked to industrial scenarios are currently in early stages of development, hence most of them have the capability to craft samples misclassified by the IDS but not reach industrial devices. In this work, we present a new adversarial attack named Selective and Iterative Gradient Sign Method that overcomes the limitation of the adversarial attacks present in the literature. To complement this work we also detail a study of how the detection rate of an Intrusion Detection System is degraded and the time required by each technique to generate adversarial samples. The experiments were carried out using a dataset named Electra, collected from an Electric Traction Substation, and showed that adversarial attacks evaluated crafted samples misclassified by the IDS. However, only the method we proposed generated samples that can be understood by intermediate network devices and, therefore, reach their destination. Our experiment outputs demonstrate a lower period of time to achieve and craft adversarial samples using out our iterative based process method as opposed to other current iterative methods currently available.
KW - Adversarial attacks
KW - Anomaly detection
KW - Deep learning
KW - Industrial control systems
UR - http://www.scopus.com/inward/record.url?scp=85106726514&partnerID=8YFLogxK
U2 - 10.1016/j.procs.2021.03.072
DO - 10.1016/j.procs.2021.03.072
M3 - Conference article
AN - SCOPUS:85106726514
SN - 1877-0509
VL - 184
SP - 573
EP - 580
JO - Procedia Computer Science
JF - Procedia Computer Science
T2 - 12th International Conference on Ambient Systems, Networks and Technologies, ANT 2021 / 4th International Conference on Emerging Data and Industry 4.0, EDI40 2021 / Affiliated Workshops
Y2 - 23 March 2021 through 26 March 2021
ER -