Your browser doesn't support javascript.
loading
Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study.
Zarzycki, Krzysztof; Chaber, Patryk; Cabaj, Krzysztof; Lawrynczuk, Maciej; Marusak, Piotr; Nebeluk, Robert; Plamowski, Sebastian; Wojtulewicz, Andrzej.
  • Zarzycki K; Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
  • Chaber P; Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
  • Cabaj K; Institute of Computer Science, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
  • Lawrynczuk M; Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
  • Marusak P; Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
  • Nebeluk R; Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
  • Plamowski S; Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
  • Wojtulewicz A; Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.
Sensors (Basel) ; 23(15)2023 Jul 28.
Article en En | MEDLINE | ID: mdl-37571561
This work is concerned with the vulnerability of a network industrial control system to cyber-attacks, which is a critical issue nowadays. This is because an attack on a controlled process can damage or destroy it. These attacks use long short-term memory (LSTM) neural networks, which model dynamical processes. This means that the attacker may not know the physical nature of the process; an LSTM network is sufficient to mislead the process operator. Our experimental studies were conducted in an industrial control network containing a magnetic levitation process. The model training, evaluation, and structure selection are described. The chosen LSTM network very well mimicked the considered process. Finally, based on the obtained results, we formulated possible protection methods against the considered types of cyber-attack.
Palabras clave