2023
DOI: 10.3390/s23031634
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Cyber-Physical Systems Using Reinforcement Learning

Abstract: Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functionality, usability, dependability, and cyber security are predicted to be designed and developed using cyber-physical systems (CPSs). In this paper, the security of CPSs is investigated through a case study of a smart grid by using a reinforcement learning (RL) augmented attack graph to effectively highlight the subsystems’ weaknesses. In particular, the state action reward state action (SARSA) RL technique is us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…This helps in identifying the anomalies in the CPS. Reinforcement learning algorithms [42,43] can be used in CPS security and privacy to develop autonomous decision-making systems that can respond to changing environments and emerging threats. Reinforcement learning algorithms learn from feedback and reinforcement signals generated by the environment to adapt and improve their decision-making over time.…”
Section: Ai Techniques Used To Address the Security And Privacy Issuesmentioning
confidence: 99%
“…This helps in identifying the anomalies in the CPS. Reinforcement learning algorithms [42,43] can be used in CPS security and privacy to develop autonomous decision-making systems that can respond to changing environments and emerging threats. Reinforcement learning algorithms learn from feedback and reinforcement signals generated by the environment to adapt and improve their decision-making over time.…”
Section: Ai Techniques Used To Address the Security And Privacy Issuesmentioning
confidence: 99%
“…Amidst the evolving landscape of cybersecurity threats, concerted efforts are being made to harness the potential of RL to fortify cyber defenses. Ibrahim et al delve into the realm of cyber-physical systems with a focus on smart grid security, employing an RLaugmented attack graph to pinpoint vulnerabilities through the SARSA RL technique [34]. Dutta et al advance this frontier with a data-driven DRL framework designed to develop proactive, context-sensitive defense mechanisms that can adapt on-the-fly to changing adversary tactics, all while minimizing operational disruptions [35].…”
Section: Related Workmentioning
confidence: 99%
“…The SARSA-based reward-extended attack graph algorithm was initially applied in our previous work [13] to identify the attacker's best course of action in a smart grid application. The availability of an attack graph created with knowledge of the resources, system design, connections, vulnerabilities, and potential threats is a determining factor.…”
Section: Related Workmentioning
confidence: 99%