Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427660
|View full text |Cite
|
Sign up to set email alerts
|

Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 49 publications
(39 citation statements)
references
References 43 publications
0
39
0
Order By: Relevance
“…* A group of researchers demonstrated that these models may be vulnerable to manipulation through adversarial attacks, just as other machine learning systems are. 36 An adversarial attack uses information about the target model-which can be learned by probing the target with inputs and recording the responses-to create an input (like ICS data) that causes the target to fail at its job. 37 The researchers trained an ML model using adversarial learning techniques to generate false sensor data which could deceive the defensive systems and help enable an attack.…”
Section: Adversarial Machine Learning Attacks On Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…* A group of researchers demonstrated that these models may be vulnerable to manipulation through adversarial attacks, just as other machine learning systems are. 36 An adversarial attack uses information about the target model-which can be learned by probing the target with inputs and recording the responses-to create an input (like ICS data) that causes the target to fail at its job. 37 The researchers trained an ML model using adversarial learning techniques to generate false sensor data which could deceive the defensive systems and help enable an attack.…”
Section: Adversarial Machine Learning Attacks On Intrusion Detection Systemsmentioning
confidence: 99%
“…The fake data created by the adversarial attack acted as a camouflage for the real attack being carried out simultaneously. 42 If human operators were to examine the screens of the HMIs at the plant, nothing would seem abnormal. The proof-of-concept provides clear evidence of the vulnerabilities inherent to intrusion detection systems based in machine learning.…”
Section: Adversarial Machine Learning Attacks On Intrusion Detection Systemsmentioning
confidence: 99%
“…Recent work in [28] generated adversarial attacks for ICS when attacking an autoencoder IDS. Their attacker substitutes the original data for readings within normal sensor range.…”
Section: Related Work For Intrusion Detectionmentioning
confidence: 99%
“…Additional work in [23] investigated adversarial attacks targeting an autoencoder IDS. Unlike [28], the work in [23] modelled their attacker as not having control of the communications to the IDS independently of the programmable logic controller (PLC). Therefore, the adversarial data had to fool the IDS and fulfill the original cyber-physical attack.…”
Section: Related Work For Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation