Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study
Author:
Zarzycki Krzysztof1ORCID, Chaber Patryk1ORCID, Cabaj Krzysztof2ORCID, Ławryńczuk Maciej1ORCID, Marusak Piotr1ORCID, Nebeluk Robert1ORCID, Plamowski Sebastian1ORCID, Wojtulewicz Andrzej1ORCID
Affiliation:
1. Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland 2. Institute of Computer Science, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland
Abstract
This work is concerned with the vulnerability of a network industrial control system to cyber-attacks, which is a critical issue nowadays. This is because an attack on a controlled process can damage or destroy it. These attacks use long short-term memory (LSTM) neural networks, which model dynamical processes. This means that the attacker may not know the physical nature of the process; an LSTM network is sufficient to mislead the process operator. Our experimental studies were conducted in an industrial control network containing a magnetic levitation process. The model training, evaluation, and structure selection are described. The chosen LSTM network very well mimicked the considered process. Finally, based on the obtained results, we formulated possible protection methods against the considered types of cyber-attack.
Funder
Vulnerability Analysis (LaVA) of stationary and mobile IT devices and algorithms and software
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference66 articles.
1. Toker, O., and Ozdemir, O. (2020, January 16–18). Physical-layer Cyberattack Resilient OFDM Automotive Radars. Proceedings of the 2020 IEEE Vehicular Networking Conference (VNC), New York, NY, USA. 2. Hou, B., Zeng, S., Xi, B., Jia, S., Guo, Q., Xu, L., and Sun, H. (2021, January 28–30). Performance of Neighborhood-Watch-Based Resilient Distributed Energy Management Algorithm under Different Types of Cyberattacks. Proceedings of the 2021 IEEE 4th International Electrical and Energy Conference (CIEEC), Wuhan, China. 3. Zabetian-Hosseini, A., Mehrizi-Sani, A., and Liu, C.C. (2018, January 21–23). Cyberattack to Cyber-Physical Model of Wind Farm SCADA. Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA. 4. Colter, J., Kinnison, M., Henderson, A., Schlager, S.M., Bryan, S., O’Grady, K.L., Abballe, A., and Harbour, S. (2022, January 18–22). Testing the Resiliency of Consumer Off-the-Shelf Drones to a Variety of Cyberattack Methods. Proceedings of the 2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC), Portsmouth, VA, USA. 5. Buoy Sensor Cyberattack Detection in Offshore Petroleum Cyber-Physical Systems;Mu;IEEE Trans. Serv. Comput.,2020
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|