期刊文献+

面向低维工控网数据集的对抗样本攻击分析 被引量:10

Adversarial Example Attack Analysis of Low-Dimensional Industrial Control Network System Dataset
下载PDF
导出
摘要 针对工业控制系统的网络攻击日趋增加,凸显工业控制网络入侵异常检测的必需性.研究工作者已经提出了各种基于机器学习算法的工控网流量异常检测模型,然而对抗样本攻击阻碍了机器学习模型的广泛应用.目前关于对抗样本攻击的成果集中在特征丰富的数据集上.然而,工控系统由于网络拓扑结构相对固定,所以数据集特征较少.针对一个低维(特征少)的天然气工控网数据集,通过实验分析4个常见优化算法SGD,RMSProp,AdaDelta和Adam与对抗样本攻击能力的关系,分析典型机器学习算法防御对抗样本攻击的能力,并研究对抗训练对提高深度学习算法抗对抗样本白盒攻击的能力.此外,提出了一个新指标“同比损失率”来评估对抗样本的白盒攻击能力.大量实验结果表明:对于这个低维数据集,优化算法确实影响了对抗样本的白盒攻击能力;对抗样本对各典型机器学习算法具有黑盒攻击能力;和决策树、随机森林,支持向量机、AdaBoost、逻辑回归、卷积神经网络(CNN)等典型分类器相比,循环神经网络(RNN)具有最强的防对抗样本黑盒攻击能力;此外,对抗样本训练能够提高深度学习模型防御对抗样本白盒攻击的能力. The growth in cyber attacks on industrial control systems(ICS)highlights the need for network intrusion anomaly detection.Researchers have proposed various anomaly detection models for industrial control network traffic based on machine learning algorithms.However,adversarial example attacks are hindering the widespread application of machine learning models.Existing researches on adversarial example attacks focused on feature-rich high-dimensional datasets.However,due to the relatively fixed network topology of the industrial control network system,the number of features in an ICS dataset is small.It is unknown whether the existing researches on adversarial examples work well for low-dimensional ICS datasets.We aim to analyze the relationship between four common optimization algorithms(namely,SGD,RMSProp,AdaDelta and Adam)and adversarial sample attacking capability,and analyze the defending capability of typical machine learning algorithms against adversarial example attacks through experiments on a low-dimensional natural Gas dataset.We also investigate whether adversarial examples-based training can improve the anti-attack ability of deep learning algorithms.Moreover,a new index“Year-to-Year Loss Rate”is proposed to evaluate the white-box attacking ability of adversarial examples.Experimental results show that for the natural Gas dataset:1)the optimization algorithm does have an impact on the white-box attacking ability of adversarial examples;2)the adversarial example has the ability in carrying out black-box attacks to each typical machine learning algorithm;3)compared with decision tree,random forest,support vector machine,AdaBoost,logistic regression and convolutional neural network,recurrent neural network has the best capability in resisting black-box attack of adversarial examples;4)adversarial example training can improve the defending ability of deep learning models.
作者 周文 张世琨 丁勇 陈曦 Zhou Wen;Zhang Shikun;Ding Yong;Chen Xi(School of Software and Microelectronics,Peking University,Beijing 100871;National Engineering Research Center for Software Engineering,Peking University,Beijing 100871;China National Aviation Fuel Group Limited,Beijing 100088;Peng Cheng Laboratory,Shenzhen,Guangdong 518000;China Software Testing Center,Beijing 100048)
出处 《计算机研究与发展》 EI CSCD 北大核心 2020年第4期736-745,共10页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61772150) 鹏城实验室基金项目(PCL2018KP004)。
关键词 对抗样本 深度学习 入侵检测 工业控制系统 机器学习 adversarial example deep learning intrusion detection industrial control system machine learning
  • 相关文献

参考文献2

二级参考文献63

  • 1周东华,孙优贤,席裕庚,张钟俊.一类非线性系统参数偏差型故障的实时检测与诊断[J].自动化学报,1993,19(2):184-189. 被引量:26
  • 2李渭华,萧德云,方崇智.一种基于自适应滑动窗格形滤波算法的故障检测器[J].自动化学报,1996,22(2):251-253. 被引量:7
  • 3Stouffer K, Falco J, Scarfone K. SP 800--82 Guide to Industrial Control Systems ( ICS ) Security [S] Gaithersburg, MD: National Institute of Standards and Technology (NIST), 2011.
  • 4EricD.Knapp.工业网络安全:智能电网.SCADA和其他工业控制系统等关键基础设施的安全[M].周秦,郭冰逸,贺惠民,等译.北京:国防工业出版社,2014.
  • 5US Department of Homeland Security. Executive Order 13636--Improving Critical Infrastructure Cybersecurity [EB/OL]. [2015-05 -31]. http://www, dhs. gov/publication eo 13636-improving-cVcybersecurity Office of the Press Secretary, The White House.
  • 6Presidential Policy Directive--Critical Infrastructure Security and Resilience [EB/OI.]. [2015-05-313. http://www, whitehouse. gov/the-press office/2013/O2/12/presidential-policy-directive- critical-infrastructure seeurity-and-resil Industrial Control Systems Cyber Emergency Response Team.
  • 7ICS-CERT year in review 2013, 13-50369 [R/OL]. Arlington County, Virginia, USA: National Cyberseeurity and Communications Integration Center, 2013 [2015-05-31]. https ://ics-eert. us-cert, gov/ICS-CERT Year-Review-2013.
  • 8Cheminod M, Durante L, Valenzano A. Review of security issues in industrial networks [J]. IEEE Trans on Industrial Informatics, 2013, 9(1): 277-293.
  • 9OPC Foundation. OPC unified architecture specification [S]. Scottsdale, Arizona, USA: OPC Foundation, 2006.
  • 10Computer security [EB/OL]. [ 2015-05-31 ]. http://en. wikipedia, org/wiki/Comput er security.

共引文献96

同被引文献84

引证文献10

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部