SlideShare a Scribd company logo
1 of 25
Download to read offline
Threats to AI-Driven Industry
4.O From Neural Backdoors
Presented By: Penta Tech
Department ofComputer Science and Engineering,
F.O.E.T, K.M.C.LULucknow
Introduction
● Industry 4.0 involves integrating advanced digital technologies into manufacturing and
industrial processes.
● It relies on IoT, AI, big data analytics, cloud computing, and robotics to enable automation
and data exchange.
● This study focuses on enhancing cybersecurity in the context of Industry 4.0 and industrial
control systems (ICS).
● It emphasizes the importance of protecting ICS, particularly SCADA systems, from evolving
cyber threats.
● Backdoors, which are covert access points, pose a significant risk to Industry 4.0 systems.
● The paper explores adversarial learning techniques and strategies to enhance model
robustness and mitigate overfitting risks.
Industry 4.0 and Industrial Control System
● Industrial Control Systems (ICS) are used to automate and operate industrial processes in
sectors like energy, transportation, and manufacturing.
● Components of ICS systems include process sensors, control logic, actuators, human-
machine interfaces (HMIs), and networks.
● Physical security involves controlling access and protecting the physical environment.
● Network security includes firewalls, intrusion detection systems, and encryption to
secure the network infrastructure.
● ICS security is a complex field that requires staying updated on the latest threats and
trends.
● Application security involves secure coding practices and regularly scanning for
vulnerabilities.
ICS operation
ICS Components
● Components of an ICS system include control loops, human interfaces, and remote
diagnostics and maintenance tools.
● Control loops consist of a sensor, controller, and actuator to measure, interpret, and control
the process.
● Design factors for an ICS system include control timing, geographic distribution, hierarchy,
control complexity, availability, and impact of failures.
● Security is a crucial design factor to protect against unauthorized access or disruption.
● Cost-effectiveness is considered to meet security and reliability requirements.
● Performance is important to ensure the ICS system meets process performance needs.
SCADA
● SCADA systems are crucial for controlling and monitoring dispersed assets in various industries such as water
distribution, oil and gas pipelines, and electrical utilities.
● The control server stores and processes data from the field sites, while the RTUs and PLCs handle local control.
● SCADA systems use software programs to define monitoring parameters, acceptable ranges, and response
actions for deviations.
● Redundancy and fault tolerance are important considerations in SCADA system design to ensure reliability.
● The control center collects and logs information, displays it on the HMI, and generates actions based on events.
● SCADA communication topologies can vary, such as point-to-point, series, series-star, and multi-drop
configurations.
Digital Twins
● A digital twin is a virtual representation of a physical object or system used to monitor,
analyze, and optimize its performance.
● In industrial control systems (ICS), digital twins can improve efficiency, reduce risk, and
enhance decision-making.
● Digital twins can monitor ICS components, simulate performance under different conditions,
and train operators.
● They can help identify potential problems, test new configurations, and optimize ICS
performance.
● Digital twins are a relatively new technology with the potential to revolutionize how we
operate ICS systems.
● Specific uses of digital twins in ICS include real-time monitoring, simulation of performance,
and operator training.
Adversarial Learning
● Adversarial learning focuses on understanding and defending against adversarial attacks in
machine learning.
● Adversarial examples are inputs intentionally modified to deceive machine learning models.
● Adversarial learning aims to understand vulnerabilities and enhance model robustness and
security.
● Different types of adversarial attacks include evasion attacks, poisoning attacks, and model
inversion attacks.
● Evasion attacks modify inputs to cause misclassification, while poisoning attacks manipulate
training data to bias the model's learning process.
● Model inversion attacks aim to infer sensitive information about the training data or the
model itself.
Consider this demonstration from Explaining and Harnessing Adversarial
Examples:
Overfitting
● Overfitting occurs when a machine learning model performs well on the training data but
fails to generalize to new, unseen data.
● Signs of overfitting include low training error but high test error, a large gap between
training and test performance, and an overly complex model.
● Overfitting is more likely to happen with a small training dataset, a complex model,
excessive training iterations, or noisy or irrelevant features.
● To address overfitting, techniques such as increasing training data, feature selection or
reduction, regularization, cross-validation, and early stopping can be applied.
Neural Backdoors
● Neural backdoors are security threats in machine learning where a malicious actor
manipulates a neural network to exhibit undesired behavior.
● Backdoor patterns or triggers are inserted during the training phase to cause specific, often
malicious, outputs.
● Neural backdoors are designed to be inconspicuous and difficult to detect during normal
operation.
● They can be used for misclassification, data exfiltration, or extracting sensitive information
from the model.
● Backdoors are triggered by specific input patterns that are carefully crafted by the attacker.
ICS and Adversarial Attack
● Industrial Control Systems (ICS) are critical for managing infrastructure but are increasingly
exposed to cyber attacks due to connectivity and remote access.
● Integrating traditional IT security mechanisms into ICS systems is challenging due to
resource constraints and legacy devices lacking modern security measures.
● Intrusion Detection Systems (IDS) tailored for ICS are being developed to monitor network
and sensor data for attacks and anomalies.
● Adversarial Machine Learning (AML) poses a risk to ICS by manipulating data to bypass IDS,
potentially causing delayed detection, information leakage, financial loss, and safety risks.
● Thorough evaluation of IDS against AML attacks is essential as machine learning-based
detection mechanisms become more prevalent.
● Empirical investigation and analysis of supervised machine learning algorithms in ICS
environments help understand the impact of AML attacks.
Industrial control system: Power system
Dataset splitting:dataset is divided into 60% training and 40% testing data points,
Evaluation of machine learning models: Identify the best ml model for intrusion detection in
the ICS system.
Adversarial sample generation: Adversarial samples are generated using the Jacobian-
based Saliency map method, which introduces perturbations to the data points to create
adversarial instances.
Performance evaluation: The trained models identified in step 2 are tested using the
generated adversarial samples to assess their performance under attack conditions.
Adversarial sample inclusion and retraining: A percentage of the generated adversarial
samples from step 3 is included in the training data.
Power system framework testbed
for used for generating dataset
● G1 and G2 are the main
generators.
● R1, R2, R3, and R4 are
Intelligent Electronic Devices
(IEDs) responsible for switching
the breakers (BR1, BR2, BR3,
BR4).
● Other network monitoring
devices, such as SNORT and
Syslog servers, are connected
to the testbed.
Supervised Machine Learning
Datasets
● A dataset was generated from a power system testbed, including both benign and malicious
data points
● The data points were classified into three categories: 'no event', 'natural event', and 'attack
event'.
● The 'no event' and 'natural event' instances were grouped together to represent benign
activity.
Attacks generated from dataset
Data injection attack
Relay setting change attack
Remote tripping command injection attack
Line maintenance
Short-circuit fault
Feature selection
Identify which attributes best describe the dataset.
The data points within the power system dataset contain attributes associated with synchrophasor
measurements.
The dataset contains 128 features.
Synchrophasor Measurements:
29 types of measurements from each
synchrophasor measurement unit (PMU).
4 PMUs in the power system testbed, resulting in
116 synchrophasor measurement columns.
These measurements capture electrical
parameters such as voltage, current, power,
frequency, and phase angle at specific locations
in the power system.
Control Panel Logs, Snort Alerts, and Relay Logs:
12 types of measurements derived from control
panel logs, snort alerts, and relay logs.
These measurements come from the four
synchrophasor measurement units and relays.
They provide information about system control
operations, security alerts from the Snort
intrusion detection system, and relay-related
events.
Model training
● The power system dataset was used to evaluate supervised machine learning algorithms for detecting
cyber attacks in an ICS environment.
● The choice of algorithm depends on its performance for the specific problem and the data
characteristics.
● Generative models (Bayesian Network, Naive Bayes) and discriminative models (J48 Decision Tree,
Support Vector Machine) were evaluated.
● The dataset was split into 60% for training and 40% for testing.
● Class balancing techniques were applied to address the uneven distribution of class labels in the training
dataset.
● Random Forest and J48 decision tree without pruning showed the highest performance among the
evaluated classifiers.
● The study emphasizes the importance of selecting appropriate classifiers and considering dataset
characteristics for developing machine learning-based IDSs in ICS systems.
Attacker Model
● Assumption: The attacker has access to the dataset and its features in the power
system scenario.
● The attacker, as the chief network engineer, knows the features used by the IDS for
classification but lacks knowledge of the exact algorithm configuration.
● Goal: Bypass the IDS to cause further damage or share information with competitors
for harming the organization.
● No protective measures are in place to safeguard against AML attacks or protect
leaked information and the ICS.
● The attack is classified as a grey box attack due to the partial knowledge the adversary
possesses about the IDS.
Defending Adversarial machine learning
Adversarial Training: It involves retraining the machine learning model on a dataset that includes both original
and adversarial samples. This technique has shown improved efficiency against adversarial samples, as
demonstrated by Goodfellow et al. in the field of visual computing.
Adversarial Sample Detection: This technique focuses on detecting the presence of adversarial samples using
mechanisms such as direct classification, neural network uncertainty, or input processing. However, these
detection mechanisms have been found to be weak in defending against adversarial machine learning attacks.
Robustness Evaluation using Adversarial Training: The paper further evaluates the robustness of supervised
machine learning classifiers against adversarial machine learning using adversarial training. A 10-fold cross-
validation method is employed, and random samples of 10% of the adversarial data points in the testing dataset
are included in the original training dataset. The average F1-score is calculated across the 10 models, and the
results are reported.
Increase in Classification Performance: The experiments show that including adversarial samples in the training
data improves the classification performance of the Random Forest and J48 models for several combinations of
JSMA's parameters. The Random Forest model achieves a greater overall increase in classification performance
compared to the J48 model, indicating its robustness in classifying adversarial samples.
Ensemble Models: The performance improvement of the Random Forest model suggests the robustness of
ensemble machine learning algorithms against adversarial techniques. Random Forests are ensembles of decision
trees, whereas J48 is a single decision tree, explaining the difference in their classification performance increases.
Conclusions
Machine learning-based Intrusion Detection Systems (IDSs) are important tools for detecting cyber attacks in
Industrial Control Systems (ICS). However, these systems are vulnerable to attacks known as Adversarial Machine
Learning (AML), where adversaries manipulate data to bypass the IDS and cause damage. To develop more robust
IDSs, it is crucial to understand how AML attacks can be applied in ICS systems and use adversarial training to
make the models more resistant to such attacks.
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf

More Related Content

Similar to Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf

IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueIRJET Journal
 
EPR coverage-smart meter
EPR coverage-smart meterEPR coverage-smart meter
EPR coverage-smart meterethandoyle
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIRJET Journal
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfPrabaKaran649935
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfglan Glandeva
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
 
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...Osama M. Khaled
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED
 

Similar to Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf (20)

IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
EPR coverage-smart meter
EPR coverage-smart meterEPR coverage-smart meter
EPR coverage-smart meter
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdf
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdf
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
 
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 

Recently uploaded

Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
Low Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookLow Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookPeterJack13
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological universityMohd Saifudeen
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...IJECEIAES
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfMadan Karki
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdfKamal Acharya
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 

Recently uploaded (20)

Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Low Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookLow Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s Handbook
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 

Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf

  • 1. Threats to AI-Driven Industry 4.O From Neural Backdoors Presented By: Penta Tech Department ofComputer Science and Engineering, F.O.E.T, K.M.C.LULucknow
  • 2. Introduction ● Industry 4.0 involves integrating advanced digital technologies into manufacturing and industrial processes. ● It relies on IoT, AI, big data analytics, cloud computing, and robotics to enable automation and data exchange. ● This study focuses on enhancing cybersecurity in the context of Industry 4.0 and industrial control systems (ICS). ● It emphasizes the importance of protecting ICS, particularly SCADA systems, from evolving cyber threats. ● Backdoors, which are covert access points, pose a significant risk to Industry 4.0 systems. ● The paper explores adversarial learning techniques and strategies to enhance model robustness and mitigate overfitting risks.
  • 3. Industry 4.0 and Industrial Control System ● Industrial Control Systems (ICS) are used to automate and operate industrial processes in sectors like energy, transportation, and manufacturing. ● Components of ICS systems include process sensors, control logic, actuators, human- machine interfaces (HMIs), and networks. ● Physical security involves controlling access and protecting the physical environment. ● Network security includes firewalls, intrusion detection systems, and encryption to secure the network infrastructure. ● ICS security is a complex field that requires staying updated on the latest threats and trends. ● Application security involves secure coding practices and regularly scanning for vulnerabilities.
  • 5. ICS Components ● Components of an ICS system include control loops, human interfaces, and remote diagnostics and maintenance tools. ● Control loops consist of a sensor, controller, and actuator to measure, interpret, and control the process. ● Design factors for an ICS system include control timing, geographic distribution, hierarchy, control complexity, availability, and impact of failures. ● Security is a crucial design factor to protect against unauthorized access or disruption. ● Cost-effectiveness is considered to meet security and reliability requirements. ● Performance is important to ensure the ICS system meets process performance needs.
  • 6. SCADA ● SCADA systems are crucial for controlling and monitoring dispersed assets in various industries such as water distribution, oil and gas pipelines, and electrical utilities. ● The control server stores and processes data from the field sites, while the RTUs and PLCs handle local control. ● SCADA systems use software programs to define monitoring parameters, acceptable ranges, and response actions for deviations. ● Redundancy and fault tolerance are important considerations in SCADA system design to ensure reliability. ● The control center collects and logs information, displays it on the HMI, and generates actions based on events. ● SCADA communication topologies can vary, such as point-to-point, series, series-star, and multi-drop configurations.
  • 7. Digital Twins ● A digital twin is a virtual representation of a physical object or system used to monitor, analyze, and optimize its performance. ● In industrial control systems (ICS), digital twins can improve efficiency, reduce risk, and enhance decision-making. ● Digital twins can monitor ICS components, simulate performance under different conditions, and train operators. ● They can help identify potential problems, test new configurations, and optimize ICS performance. ● Digital twins are a relatively new technology with the potential to revolutionize how we operate ICS systems. ● Specific uses of digital twins in ICS include real-time monitoring, simulation of performance, and operator training.
  • 8. Adversarial Learning ● Adversarial learning focuses on understanding and defending against adversarial attacks in machine learning. ● Adversarial examples are inputs intentionally modified to deceive machine learning models. ● Adversarial learning aims to understand vulnerabilities and enhance model robustness and security. ● Different types of adversarial attacks include evasion attacks, poisoning attacks, and model inversion attacks. ● Evasion attacks modify inputs to cause misclassification, while poisoning attacks manipulate training data to bias the model's learning process. ● Model inversion attacks aim to infer sensitive information about the training data or the model itself.
  • 9. Consider this demonstration from Explaining and Harnessing Adversarial Examples:
  • 10. Overfitting ● Overfitting occurs when a machine learning model performs well on the training data but fails to generalize to new, unseen data. ● Signs of overfitting include low training error but high test error, a large gap between training and test performance, and an overly complex model. ● Overfitting is more likely to happen with a small training dataset, a complex model, excessive training iterations, or noisy or irrelevant features. ● To address overfitting, techniques such as increasing training data, feature selection or reduction, regularization, cross-validation, and early stopping can be applied.
  • 11. Neural Backdoors ● Neural backdoors are security threats in machine learning where a malicious actor manipulates a neural network to exhibit undesired behavior. ● Backdoor patterns or triggers are inserted during the training phase to cause specific, often malicious, outputs. ● Neural backdoors are designed to be inconspicuous and difficult to detect during normal operation. ● They can be used for misclassification, data exfiltration, or extracting sensitive information from the model. ● Backdoors are triggered by specific input patterns that are carefully crafted by the attacker.
  • 12. ICS and Adversarial Attack ● Industrial Control Systems (ICS) are critical for managing infrastructure but are increasingly exposed to cyber attacks due to connectivity and remote access. ● Integrating traditional IT security mechanisms into ICS systems is challenging due to resource constraints and legacy devices lacking modern security measures. ● Intrusion Detection Systems (IDS) tailored for ICS are being developed to monitor network and sensor data for attacks and anomalies. ● Adversarial Machine Learning (AML) poses a risk to ICS by manipulating data to bypass IDS, potentially causing delayed detection, information leakage, financial loss, and safety risks. ● Thorough evaluation of IDS against AML attacks is essential as machine learning-based detection mechanisms become more prevalent. ● Empirical investigation and analysis of supervised machine learning algorithms in ICS environments help understand the impact of AML attacks.
  • 13. Industrial control system: Power system Dataset splitting:dataset is divided into 60% training and 40% testing data points, Evaluation of machine learning models: Identify the best ml model for intrusion detection in the ICS system. Adversarial sample generation: Adversarial samples are generated using the Jacobian- based Saliency map method, which introduces perturbations to the data points to create adversarial instances. Performance evaluation: The trained models identified in step 2 are tested using the generated adversarial samples to assess their performance under attack conditions. Adversarial sample inclusion and retraining: A percentage of the generated adversarial samples from step 3 is included in the training data.
  • 14. Power system framework testbed for used for generating dataset ● G1 and G2 are the main generators. ● R1, R2, R3, and R4 are Intelligent Electronic Devices (IEDs) responsible for switching the breakers (BR1, BR2, BR3, BR4). ● Other network monitoring devices, such as SNORT and Syslog servers, are connected to the testbed.
  • 16. Datasets ● A dataset was generated from a power system testbed, including both benign and malicious data points ● The data points were classified into three categories: 'no event', 'natural event', and 'attack event'. ● The 'no event' and 'natural event' instances were grouped together to represent benign activity.
  • 17. Attacks generated from dataset Data injection attack Relay setting change attack Remote tripping command injection attack Line maintenance Short-circuit fault
  • 18. Feature selection Identify which attributes best describe the dataset. The data points within the power system dataset contain attributes associated with synchrophasor measurements. The dataset contains 128 features.
  • 19. Synchrophasor Measurements: 29 types of measurements from each synchrophasor measurement unit (PMU). 4 PMUs in the power system testbed, resulting in 116 synchrophasor measurement columns. These measurements capture electrical parameters such as voltage, current, power, frequency, and phase angle at specific locations in the power system. Control Panel Logs, Snort Alerts, and Relay Logs: 12 types of measurements derived from control panel logs, snort alerts, and relay logs. These measurements come from the four synchrophasor measurement units and relays. They provide information about system control operations, security alerts from the Snort intrusion detection system, and relay-related events.
  • 20. Model training ● The power system dataset was used to evaluate supervised machine learning algorithms for detecting cyber attacks in an ICS environment. ● The choice of algorithm depends on its performance for the specific problem and the data characteristics. ● Generative models (Bayesian Network, Naive Bayes) and discriminative models (J48 Decision Tree, Support Vector Machine) were evaluated. ● The dataset was split into 60% for training and 40% for testing. ● Class balancing techniques were applied to address the uneven distribution of class labels in the training dataset. ● Random Forest and J48 decision tree without pruning showed the highest performance among the evaluated classifiers. ● The study emphasizes the importance of selecting appropriate classifiers and considering dataset characteristics for developing machine learning-based IDSs in ICS systems.
  • 21. Attacker Model ● Assumption: The attacker has access to the dataset and its features in the power system scenario. ● The attacker, as the chief network engineer, knows the features used by the IDS for classification but lacks knowledge of the exact algorithm configuration. ● Goal: Bypass the IDS to cause further damage or share information with competitors for harming the organization. ● No protective measures are in place to safeguard against AML attacks or protect leaked information and the ICS. ● The attack is classified as a grey box attack due to the partial knowledge the adversary possesses about the IDS.
  • 22. Defending Adversarial machine learning Adversarial Training: It involves retraining the machine learning model on a dataset that includes both original and adversarial samples. This technique has shown improved efficiency against adversarial samples, as demonstrated by Goodfellow et al. in the field of visual computing. Adversarial Sample Detection: This technique focuses on detecting the presence of adversarial samples using mechanisms such as direct classification, neural network uncertainty, or input processing. However, these detection mechanisms have been found to be weak in defending against adversarial machine learning attacks.
  • 23. Robustness Evaluation using Adversarial Training: The paper further evaluates the robustness of supervised machine learning classifiers against adversarial machine learning using adversarial training. A 10-fold cross- validation method is employed, and random samples of 10% of the adversarial data points in the testing dataset are included in the original training dataset. The average F1-score is calculated across the 10 models, and the results are reported. Increase in Classification Performance: The experiments show that including adversarial samples in the training data improves the classification performance of the Random Forest and J48 models for several combinations of JSMA's parameters. The Random Forest model achieves a greater overall increase in classification performance compared to the J48 model, indicating its robustness in classifying adversarial samples. Ensemble Models: The performance improvement of the Random Forest model suggests the robustness of ensemble machine learning algorithms against adversarial techniques. Random Forests are ensembles of decision trees, whereas J48 is a single decision tree, explaining the difference in their classification performance increases.
  • 24. Conclusions Machine learning-based Intrusion Detection Systems (IDSs) are important tools for detecting cyber attacks in Industrial Control Systems (ICS). However, these systems are vulnerable to attacks known as Adversarial Machine Learning (AML), where adversaries manipulate data to bypass the IDS and cause damage. To develop more robust IDSs, it is crucial to understand how AML attacks can be applied in ICS systems and use adversarial training to make the models more resistant to such attacks.