Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Adversarial attacks on machine learning cybersecurity defences in industrial control systems

Anthi, Eirini, Williams, Lowri, Rhode, Matilda, Burnap, Peter ORCID: https://orcid.org/0000-0003-0396-633X and Wedgbury, Adam 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58 , 102717. 10.1016/j.jisa.2020.102717

[thumbnail of 1-s2.0-S2214212620308607-main.pdf]
Preview
PDF - Published Version
Available under License Creative Commons Attribution.

Download (1MB) | Preview

Abstract

The proliferation and application of machine learning-based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS). However, the introduction of such IDSs has also created an additional attack vector; the learning models may also be subject to cyber attacks, otherwise referred to as Adversarial Machine Learning (AML). Such attacks may have severe consequences in ICS systems, as adversaries could potentially bypass the IDS. This could lead to delayed attack detection which may result in infrastructure damages, financial loss, and even loss of life. This paper explores how adversarial learning can be used to target supervised models by generating adversarial samples using the Jacobian-based Saliency Map attack and exploring classification behaviours. The analysis also includes the exploration of how such samples can support the robustness of supervised models using adversarial training. An authentic power system dataset was used to support the experiments presented herein. Overall, the classification performance of two widely used classifiers, Random Forest and J48, decreased by 6 and 11 percentage points when adversarial samples were present. Their performances improved following adversarial training, demonstrating their robustness towards such attacks.

Item Type: Article
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Additional Information: This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
Publisher: Elsevier
ISSN: 2214-2126
Funders: EPSRC
Date of First Compliant Deposit: 2 December 2020
Date of Acceptance: 1 December 2020
Last Modified: 02 May 2023 12:09
URI: https://orca.cardiff.ac.uk/id/eprint/136716

Citation Data

Cited 25 times in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item

Downloads

Downloads per month over past year

View more statistics