4.6 Article

Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems

Journal

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 19, Issue 3, Pages 1810-1825

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.3037500

Keywords

Integrated circuits; Detectors; Reconnaissance; Generative adversarial networks; Protocols; Integrated circuit modeling; Machine learning; Machine learning security; intrusion detection systems; industrial control systems; adversarial examples

Funding

  1. National Key Research and Development Program [2018YFB0803501]
  2. National Natural Science Foundation of China [62073285]
  3. Fundamental Research Funds for the Central Universities

Ask authors/readers for more resources

Deploying machine learning-based intrusion detection systems can enhance the security of industrial control systems, but such models are vulnerable to adversarial attacks. This article investigates the possibility of stealthy cyber attacks on intrusion detection systems and proposes two strategies to enhance their robustness. The experiments conducted on a semi-physical testbed demonstrate the effectiveness of the attacks and the adoption of adversarial training improves the detector's resistance against adversarial examples.
Deploying machine learning (ML)-based intrusion detection systems (IDS) is an effective way to improve the security of industrial control systems (ICS). However, ML models themselves are vulnerable to adversarial examples, generated by deliberately adding subtle perturbation to the input sample that some people are not aware of, causing the model to give a false output with high confidence. In this article, our goal is to investigate the possibility of stealthy cyber attacks towards IDS, including injection attack, function code attack and reconnaissance attack, and enhance its robustness to adversarial attack. However, adversarial algorithms are subject to communication protocol and legal range of data in ICS, unlike only limited by the distance between original samples and newly generated samples in image domain. We propose two strategies - optimal solution attack and GAN attack - oriented to flexibility and volume of data, formulating an optimization problem to find stealthy attacks, where the former is appropriate for not too large and more flexible samples while the latter provides a more efficient solution for larger and not too flexible samples. Finally, we conduct experiments on a semi-physical ICS testbed with a high detection performance ensemble ML-based detector to show the effectiveness of our attacks. The results indicate that new samples of reconnaissance and function code attack produced by both optimal solution and GAN algorithm possess 80 percent higher probability to evade the detector, still maintaining the same attack effect. In the meantime, we adopt adversarial training as a method to defend against adversarial attack. After training on the mixture of orginal dataset and newly generated samples, the detector becomes more robust to adversarial examples.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

QoS Optimization for Mobile Ad Hoc Cloud: A Multi-Agent Independent Learning Approach

Fenghui Zhang, Michael Mao Wang, Ruilong Deng, Xiaohu You

Summary: In this paper, a multi-agent independent learning approach is proposed to optimize the quality of service in the mobile ad hoc cloud. Simulation results confirm the effectiveness of the proposed approach.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Automation & Control Systems

False-Data-Injection-Enabled Network Parameter Modifications in Power Systems: Attack and Detection

Chensheng Liu, Wangli He, Ruilong Deng, Yu-Chu Tian, Wenli Du

Summary: This article proposes a practical attack model for detecting malicious modification of critical network parameters. By exploiting the vulnerability of network parameter error processing and utilizing false-data-injection techniques, the requirements on attackers' capability and system information are significantly reduced. An optimal detection strategy is designed to minimize the number of protected measurements needed.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Theory & Methods

SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid

Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, Jianfeng Ma

Summary: In this paper, a stealthy physics-manipulated attack (SPMA) is proposed by masking physical attacks on the flexible AC transmission system (FACTS) with strategic cyberattacks. The impact of physics manipulation on real-time economic dispatch and system operation security is analyzed. Countermeasures against SPMAs are also provided.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Electrical & Electronic

Physics-Constrained Robustness Evaluation of Intelligent Security Assessment for Power Systems

Zhenyong Zhang, Mingyang Sun, Ruilong Deng, Chongqing Kang, Mo-Yuen Chow

Summary: This paper proposes a novel concept called physics-constrained robustness, aiming to compute a lower-bound of adversarial perturbations for the ML-based intelligent security assessment (ISA) for power systems. Extensive experiments are conducted using real-world load profiles from New York State to evaluate the physics-constrained robustness of ISA in static and dynamic cases and provide suggestions for selecting ML models and parameters.

IEEE TRANSACTIONS ON POWER SYSTEMS (2023)

Article Engineering, Electrical & Electronic

PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids

Mengxiang Liu, Chengcheng Zhao, Jinhui Xia, Ruilong Deng, Peng Cheng, Jiming Chen

Summary: In this paper, a proactive distributed detection and localization (PDDL) framework is proposed to defend against stealthy deception attacks in DC microgrids. Attack detection is achieved by observing voltage balancing deviation and current sharing deviation in DC microgrids. Once an anomaly is detected, a proactive perturbation is applied to the primary control gains to invalidate the inferred gains of the attacker, and the constructed stealthy deception attacks can be located using unknown input observer (UIO) based locators. An optimization problem is formulated to determine the magnitude of the perturbation to maximize attack locatability while limiting transient fluctuations on system states. The effectiveness of the PDDL framework is verified through hardware-in-the-loop (HIL) simulations and full-hardware experimental studies.

IEEE TRANSACTIONS ON SMART GRID (2023)

Letter Automation & Control Systems

Detecting the One-Shot Dummy Attack on the Power Industrial Control Processes With an Unsupervised Data-Driven Approach

Zhenyong Zhang, Yan Qin, Jingpei Wang, Hui Li, Ruilong Deng

Summary: In this letter, a detection method is proposed for the one-shot dummy attack (DA), a deep and stealthy data integrity attack that hides corrupted measurements in power industrial control processes. The method formulates an optimization problem to generate one-shot DAs, and then proposes an unsupervised data-driven approach based on a modified local outlier factor (MLOF) to detect them. Experimental results on real-world load data demonstrate the effectiveness of the proposed approach.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2023)

Letter Automation & Control Systems

Impact Analysis of MTD on the Frequency Stability in Smart Grid

Zhenyong Zhang, Ruilong Deng

Summary: To enhance the security of the smart grid against false data injection attacks (FDIAs), the recently proposed moving target defense (MTD) strategy perturbs branch susceptances. However, previous research mainly focuses on the defending performance and the impact of MTD on static factors, neglecting the system dynamics. This letter studies the analytical impact of MTD on frequency stability, providing the condition for maintaining grid frequency stability and analyzing the effect of susceptance perturbation on frequency stability. The defending cost of MTD is also optimized considering defending performance and frequency stability constraints.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2023)

Article Engineering, Electrical & Electronic

Physics-Constrained Vulnerability Assessment of Deep Reinforcement Learning-Based SCOPF

Lanting Zeng, Mingyang Sun, Xu Wan, Zhenyong Zhang, Ruilong Deng, Yan Xu

Summary: This paper proposes a physics-constrained vulnerability assessment framework for DRL-based power system operation and control, addressing the vulnerabilities and security threats. A novel adversarial example generation method is developed to conduct targeted adversarial attacks and evade bad data detection mechanisms. Case studies on the winners' models of the L2RPN competitions demonstrate the severe impacts on system operation and control.

IEEE TRANSACTIONS ON POWER SYSTEMS (2023)

Article Automation & Control Systems

Security Enhancement of Power System State Estimation With an Effective and Low-Cost Moving Target Defense

Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Mo-Yuen Chow

Summary: This article investigates the mechanism of Moving Target Defense (MTD) in power systems to counter False Data Injection Attacks (FDIAs) and develops an effective and low-cost MTD. A sufficient and necessary condition for protecting buses from intended FDIAs is provided, along with a new metric to quantify the level of protection and an efficient algorithm to minimize the number of required D-FACTS devices. Two strategies are proposed to reduce the operation cost of activating MTD, and the impact of MTD on system dynamics, particularly on small signal stability, is analyzed.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2023)

Editorial Material Computer Science, Information Systems

Guest Editorial Introduction to Special Issue on Cloud-Edge-End Orchestrated Computing for Smart Grid

Ruilong Deng, Chee-Wooi Ten, Chaojie Li, Dusit Niyato, Fei Teng

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Engineering, Electrical & Electronic

Dual-Triggered Adaptive Torque Control Strategy for Variable-Speed Wind Turbine Against Denial-of-Service Attacks

Shiyi Zhao, Jinhui Xia, Ruilong Deng, Peng Cheng, Qinmin Yang, Xuguo Jiao

Summary: The increasing use of wind energy necessitates attention to cybersecurity. This paper proposes a resilient torque control strategy for the wind turbine to counter denial-of-service attacks. By establishing mathematical models and designing a neural network observer, the proposed strategy can enhance attack resilience capability and ensure optimal rotor speed tracking.

IEEE TRANSACTIONS ON SMART GRID (2023)

Article Green & Sustainable Science & Technology

Adaptive Observer-Based Resilient Control Strategy for Wind Turbines Against Time-Delay Attacks on Rotor Speed Sensor Measurement

Shiyi Zhao, Jinhui Xia, Ruilong Deng, Peng Cheng, Qinmin Yang

Summary: With the increasing proportion of wind power generation in the power system, the vulnerabilities of the cyber links of wind turbines are gradually exposed. This paper develops an adaptive observer-based resilient control method to defend against time-delay attacks (TDA) in wind turbines. The proposed control scheme effectively mitigates the impact of TDA and ensures the output performance of the wind turbine system.

IEEE TRANSACTIONS ON SUSTAINABLE ENERGY (2023)

Article Computer Science, Information Systems

Cybersecurity Analysis of Data-Driven Power System Stability Assessment

Zhenyong Zhang, Ke Zuo, Ruilong Deng, Fei Teng, Mingyang Sun

Summary: This article explores the vulnerability of machine learning-based intelligent systems enhanced with Internet of Things technologies in the stability assessment of electricity grids. It focuses on decision tree-based stability assessment approaches and investigates the feasibility of constructing a physics-constrained adversarial attack.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Theory & Methods

Detection-Performance Tradeoff for Watermarking in Industrial Control Systems

Hengye Zhu, Mengxiang Liu, Chongrong Fang, Ruilong Deng, Peng Cheng

Summary: This paper proposes an optimal watermarking design method for ICSs considering the tradeoff between detection performance. The watermark container is shifted from data points to segments, and detection metrics are updated to reduce noise interference. The proposed method is validated through numerical simulations and experiments.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Automation & Control Systems

Joint Meter Coding and Moving Target Defense for Detecting Stealthy False Data Injection Attacks in Power System State Estimation

Chensheng Liu, Yang Tang, Ruilong Deng, Min Zhou, Wenli Du

Summary: Enabled by distributed flexible alternating current transmission system devices, MTD is considered an effective way to detect stealthy FDI attacks. However, limitations in power system topology prevent all attacks from being detected. In this article, the authors propose a joint MC-MTD method to improve detection by integrating MC with MTD. Theoretical analysis is performed on detection conditions and requirements, and an optimization is formulated to enhance effectiveness with low cost.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

No Data Available