2023
DOI: 10.3390/s23156778
|View full text |Cite
|
Sign up to set email alerts
|

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study

Krzysztof Zarzycki,
Patryk Chaber,
Krzysztof Cabaj
et al.

Abstract: This work is concerned with the vulnerability of a network industrial control system to cyber-attacks, which is a critical issue nowadays. This is because an attack on a controlled process can damage or destroy it. These attacks use long short-term memory (LSTM) neural networks, which model dynamical processes. This means that the attacker may not know the physical nature of the process; an LSTM network is sufficient to mislead the process operator. Our experimental studies were conducted in an industrial cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 64 publications
0
3
0
Order By: Relevance
“…The control plant used in the experiments is part of a more extensive laboratory test bed depicted in Figure 1 used by the authors during testing advanced attack methods [ 29 , 30 ]. Three control processes are available: high-speed magnetic levitation, the MPS FESTO workstation, and the thermal heating and cooling stand.…”
Section: Methodsmentioning
confidence: 99%
“…The control plant used in the experiments is part of a more extensive laboratory test bed depicted in Figure 1 used by the authors during testing advanced attack methods [ 29 , 30 ]. Three control processes are available: high-speed magnetic levitation, the MPS FESTO workstation, and the thermal heating and cooling stand.…”
Section: Methodsmentioning
confidence: 99%
“…Several techniques exist for the detection and prevention of cyberattacks. In a recent study [31,32], neural networks were explored as a novel approach due to their high level of automation in the learning process, meaning that they require less prior knowledge of the system being safeguarded. Additionally, recommendations suggest the implementation of redundancy in communication protocols, encryption, monitoring for unusual signal behavior through statistical properties and isolating the communication network from external connections (according to [33], the internet is the most commonly used method of cyberattack).…”
Section: Cyber Attack On Communication Networkmentioning
confidence: 99%
“…The authors of [27] carried out an exercise on image encryption, since the correct transmission of images was fundamental for their study. Additionally, the authors of [28] used neural networks to create methods for protection against cyberattacks. Moreover, the authors of [29] implemented techniques to improve image authentication.…”
mentioning
confidence: 99%