scholarly journals Adversarial Campaign Mitigation via ROC-Centric Prognostics

2019 ◽  
Vol 11 (1) ◽  
Author(s):  
Javier Echauz ◽  
Keith Kenemer ◽  
Sarfaraz Hussein ◽  
Jay Dhaliwal ◽  
Saurabh Shintre ◽  
...  

Machine learning models are vulnerable to adversarial inputs that induce seemingly unjustifiable errors. As automated classifiers are increasingly used in industrial control systems and machinery, these adversarial errors could grow to be a serious problem. Despite numerous studies over the past few years, the field of adversarial ML is still considered alchemy, with no practical unbroken defenses demonstrated to date, leaving PHM practitioners with few meaningful ways of addressing the problem. We introduce “turbidity detection” as a practical superset of the adversarial input detection problem, coping with adversarial campaigns rather than statistically invisible one-offs. This perspective is coupled with ROC-theoretic design guidance that prescribes an inexpensive domain adaptation layer at the output of a deep learning model during an attack campaign. The result aims to approximate the Bayes optimal mitigation that ameliorates the detection model’s degraded health. A proactively reactive type of prognostics is achieved via Monte Carlo simulation of various adversarial campaign scenarios, by sampling from the model’s own turbidity distribution to quickly deploy the correct mitigation during a real-world campaign.

Energies ◽  
2021 ◽  
Vol 14 (17) ◽  
pp. 5501
Author(s):  
Chenyang Liu ◽  
Yazeed Alrowaili ◽  
Neetesh Saxena ◽  
Charalambos Konstantinou

Cybersecurity threats targeting industrial control systems (ICS) have significantly increased in the past years. Moreover, the need for users/operators to understand the consequences of attacks targeting these systems and protect all assets is vital. This work explores asset discovery in ICS and how to rank these assets based on their criticality. This paper also discusses asset discovery and its components. We further present existing solutions and tools for asset discovery. We implement a method to identify critical assets based on their connection and discuss related results and evaluation. The evaluation utilises four attack scenarios to stress the importance of protecting these critical assets since the failure to protect them can lead to serious consequences. Using a 12-bus system case, our results show that targeting such a system can increase and overload transmission lines values to 120% and 181% MVA, which can affect the power supply and disrupt service, and it can increase the cost up to 60%, affecting the productivity of this electric grid.


2021 ◽  
Author(s):  
Chia-Mei Chen ◽  
Zheng-Xun Cai ◽  
Gu-Hsin Lai

The “Industry 4.0” revolution and Industry Internet of Things (IIoT) has dramatically transformed how manufacturing and industrial companies operate. Industrial control systems (ICS) process critical function, and the past ICS attacks have caused major damage and disasters in the communities. IIoT devices in an ICS environment communicate in heterogeneous protocols and the attack vectors might exhibit different misbehavior patterns. This study proposes a classification model to detect anomalies in ICS environments. The evaluation has been conducted by using ICS datasets from multiple sources and the results show that the proposed LSTM detection model performs effectively.


Sign in / Sign up

Export Citation Format

Share Document