4.6 Article

A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios

Journal

IEEE ACCESS
Volume 10, Issue -, Pages 124582-124594

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3224930

Keywords

Industries; Deep learning; Perturbation methods; Neural networks; Transforms; Detectors; Robustness; Adversarial attacks; evasion attacks; industrial control systems; machine learning; deep learning; robustness

Funding

  1. Spanish Ministry of Science, Innovation and Universities, State Research Agency
  2. FEDER Funds [RTI2018O5855-B-I00]
  3. Swiss Federal Office for Defense Procurement (Armasuisse) with the CyberSpec [CYD-C-2020003]
  4. European Commission Horizon 2020 Programme [H2020-SU-DS-2019/883335 -PALANTIR]
  5. European Commission (FEDER/ERDF)

Ask authors/readers for more resources

Anomaly detection systems based on machine and deep learning are promising solutions for detecting cyberattacks in the industry. This paper presents a methodology to calculate the robustness of these models in industrial scenarios and shows that 1D-CNN is significantly more robust than LSTM for detecting anomalies in a simulated chemical process.
Anomaly Detection systems based on Machine and Deep learning are the most promising solutions to detect cyberattacks in the industry. However, these techniques are vulnerable to adversarial attacks that downgrade prediction performance. Several techniques have been proposed to measure the robustness of Anomaly Detection in the literature. However, they do not consider that, although a small perturbation in an anomalous sample belonging to an attack, i.e., Denial of Service, could cause it to be misclassified as normal while retaining its ability to damage, an excessive perturbation might also transform it into a truly normal sample, with no real impact on the industrial system. This paper presents a methodology to calculate the robustness of Anomaly Detection models in industrial scenarios. The methodology comprises four steps and uses a set of additional models called support models to determine if an adversarial sample remains anomalous. We carried out the validation using the Tennessee Eastman process, a simulated testbed of a chemical process. In such a scenario, we applied the methodology to both a Long-Short Term Memory (LSTM) neural network and 1-dimensional Convolutional Neural Network (1D-CNN) focused on detecting anomalies produced by different cyberattacks. The experiments showed that 1D-CNN is significantly more robust than LSTM for our testbed. Specifically, a perturbation of 60% (empirical robustness of 0.6) of the original sample is needed to generate adversarial samples for LSTM, whereas in 1D-CNN the perturbation required increases up to 111% (empirical robustness of 1.11).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available