scholarly journals Destructive Cyber Operations and Machine Learning

2020 ◽  
Author(s):  
Dakota Cary ◽  
Daniel Cebul

Machine learning may provide cyber attackers with the means to execute more effective and more destructive attacks against industrial control systems. As new ML tools are developed, CSET discusses the ways in which attackers may deploy these tools and the most effective avenues for industrial system defenders to respond.

2021 ◽  
Vol 58 ◽  
pp. 102717
Author(s):  
Eirini Anthi ◽  
Lowri Williams ◽  
Matilda Rhode ◽  
Pete Burnap ◽  
Adam Wedgbury

Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 407 ◽  
Author(s):  
Sohrab Mokhtari ◽  
Alireza Abbaspour ◽  
Kang K. Yen ◽  
Arman Sargolzaei

Attack detection problems in industrial control systems (ICSs) are commonly known as a network traffic monitoring scheme for detecting abnormal activities. However, a network-based intrusion detection system can be deceived by attackers that imitate the system’s normal activity. In this work, we proposed a novel solution to this problem based on measurement data in the supervisory control and data acquisition (SCADA) system. The proposed approach is called measurement intrusion detection system (MIDS), which enables the system to detect any abnormal activity in the system even if the attacker tries to conceal it in the system’s control layer. A supervised machine learning model is generated to classify normal and abnormal activities in an ICS to evaluate the MIDS performance. A hardware-in-the-loop (HIL) testbed is developed to simulate the power generation units and exploit the attack dataset. In the proposed approach, we applied several machine learning models on the dataset, which show remarkable performances in detecting the dataset’s anomalies, especially stealthy attacks. The results show that the random forest is performing better than other classifier algorithms in detecting anomalies based on measured data in the testbed.


Sign in / Sign up

Export Citation Format

Share Document