Exposing Cyber-Physical System Weaknesses by Implicitly Learning their Underlying Models

Napoleon Costilla-Enriquez, Yang Weng
Proceedings of The 13th Asian Conference on Machine Learning, PMLR 157:1333-1348, 2021.

Abstract

Cyber-Physical Systems (CPS) plays a critical role in today’s social life, especially with occasional pandemic events. With more reliance on the cyber operation of infrastructures, it is important to understand attacking mechanisms in CPS for potential solutions and defenses, where False Data Injection Attack (FDIA) is an important class. FDIA methods in the literature require the mathematical CPS model and state variable values to create an efficient attack vector, unrealistic for many attackers in the real world. Also, they do not have performance guarantee. This paper shows that it is possible to deploy a FDIA without having the CPS model and state variables information. Additionally, we prove a theoretic bound for the proposed method. Specifically, we design a scheme that learns an implicit CPS model to create tampered sensor measurements to deploy an attack based only on historical data. The proposed framework utilizes a Wasserstein generative adversarial network with two regularization terms to create such tampered measurements also known as adversarial examples. To build an attack with confidence, we present a proof based on convergence in distribution and Lipschitz norm to show that our method captures the real observed measurement distribution. This means that our model learns the complex underlying processes from the CPSs. We demonstrate the robustness and universality of our proposed framework based on two diversified adversarial examples with different systems, domains, and datasets.

Cite this Paper


BibTeX
@InProceedings{pmlr-v157-costilla-enriquez21a, title = {Exposing Cyber-Physical System Weaknesses by Implicitly Learning their Underlying Models}, author = {Costilla-Enriquez, Napoleon and Weng, Yang}, booktitle = {Proceedings of The 13th Asian Conference on Machine Learning}, pages = {1333--1348}, year = {2021}, editor = {Balasubramanian, Vineeth N. and Tsang, Ivor}, volume = {157}, series = {Proceedings of Machine Learning Research}, month = {17--19 Nov}, publisher = {PMLR}, pdf = {https://proceedings.mlr.press/v157/costilla-enriquez21a/costilla-enriquez21a.pdf}, url = {https://proceedings.mlr.press/v157/costilla-enriquez21a.html}, abstract = {Cyber-Physical Systems (CPS) plays a critical role in today’s social life, especially with occasional pandemic events. With more reliance on the cyber operation of infrastructures, it is important to understand attacking mechanisms in CPS for potential solutions and defenses, where False Data Injection Attack (FDIA) is an important class. FDIA methods in the literature require the mathematical CPS model and state variable values to create an efficient attack vector, unrealistic for many attackers in the real world. Also, they do not have performance guarantee. This paper shows that it is possible to deploy a FDIA without having the CPS model and state variables information. Additionally, we prove a theoretic bound for the proposed method. Specifically, we design a scheme that learns an implicit CPS model to create tampered sensor measurements to deploy an attack based only on historical data. The proposed framework utilizes a Wasserstein generative adversarial network with two regularization terms to create such tampered measurements also known as adversarial examples. To build an attack with confidence, we present a proof based on convergence in distribution and Lipschitz norm to show that our method captures the real observed measurement distribution. This means that our model learns the complex underlying processes from the CPSs. We demonstrate the robustness and universality of our proposed framework based on two diversified adversarial examples with different systems, domains, and datasets.} }
Endnote
%0 Conference Paper %T Exposing Cyber-Physical System Weaknesses by Implicitly Learning their Underlying Models %A Napoleon Costilla-Enriquez %A Yang Weng %B Proceedings of The 13th Asian Conference on Machine Learning %C Proceedings of Machine Learning Research %D 2021 %E Vineeth N. Balasubramanian %E Ivor Tsang %F pmlr-v157-costilla-enriquez21a %I PMLR %P 1333--1348 %U https://proceedings.mlr.press/v157/costilla-enriquez21a.html %V 157 %X Cyber-Physical Systems (CPS) plays a critical role in today’s social life, especially with occasional pandemic events. With more reliance on the cyber operation of infrastructures, it is important to understand attacking mechanisms in CPS for potential solutions and defenses, where False Data Injection Attack (FDIA) is an important class. FDIA methods in the literature require the mathematical CPS model and state variable values to create an efficient attack vector, unrealistic for many attackers in the real world. Also, they do not have performance guarantee. This paper shows that it is possible to deploy a FDIA without having the CPS model and state variables information. Additionally, we prove a theoretic bound for the proposed method. Specifically, we design a scheme that learns an implicit CPS model to create tampered sensor measurements to deploy an attack based only on historical data. The proposed framework utilizes a Wasserstein generative adversarial network with two regularization terms to create such tampered measurements also known as adversarial examples. To build an attack with confidence, we present a proof based on convergence in distribution and Lipschitz norm to show that our method captures the real observed measurement distribution. This means that our model learns the complex underlying processes from the CPSs. We demonstrate the robustness and universality of our proposed framework based on two diversified adversarial examples with different systems, domains, and datasets.
APA
Costilla-Enriquez, N. & Weng, Y.. (2021). Exposing Cyber-Physical System Weaknesses by Implicitly Learning their Underlying Models. Proceedings of The 13th Asian Conference on Machine Learning, in Proceedings of Machine Learning Research 157:1333-1348 Available from https://proceedings.mlr.press/v157/costilla-enriquez21a.html.

Related Material