Attack rules: an adversarial approach to generate attacks for Industrial Control Systems using machine learning

Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

9 Citations (Scopus)
23 Downloads (Pure)

Abstract

Adversarial learning is used to test the robustness of machine learning algorithms under attack and create attacks that deceive the anomaly detection methods in Industrial Control System (ICS). Given that security assessment of an ICS demands that an exhaustive set of possible attack patterns is studied, in this work, we propose an association rule mining-based attack generation technique. The technique has been implemented using data from a Secure Water Treatment plant. The proposed technique was able to generate more than 110,000 attack patterns constituting a vast majority of new attack vectors which were not seen before. Automatically generated attacks improve our understanding of the potential attacks and enable the design of robust attack detection techniques.

Original languageEnglish
Title of host publicationCPSIoTSec 2021 - Proceedings of the 2nd Workshop on CPS and IoT Security and Privacy, co-located with CCS 2021
Place of PublicationNew York, NY.
Pages35–40
Number of pages6
DOIs
Publication statusPublished - 15 Nov 2021
EventCPSIoTSec 2021: The 2nd Joint Workshop on CPS & IoT Security and Privacy - Seoul, Korea, Republic of
Duration: 15 Nov 202115 Nov 2021
https://cpsiotsec.github.io/

Conference

ConferenceCPSIoTSec 2021
Country/TerritoryKorea, Republic of
CitySeoul
Period15/11/2115/11/21
Internet address

Keywords

  • attack detection
  • attack generation
  • ICS security
  • machine learning
  • adversarial learning
  • association rule mining

Fingerprint

Dive into the research topics of 'Attack rules: an adversarial approach to generate attacks for Industrial Control Systems using machine learning'. Together they form a unique fingerprint.

Cite this