Baiting AI: Deceptive Adversary Against AI-Protected Industrial Infrastructures
By: Aryan Pasikhani , Prosanta Gope , Yang Yang and more
This paper explores a new cyber-attack vector targeting Industrial Control Systems (ICS), particularly focusing on water treatment facilities. Developing a new multi-agent Deep Reinforcement Learning (DRL) approach, adversaries craft stealthy, strategically timed, wear-out attacks designed to subtly degrade product quality and reduce the lifespan of field actuators. This sophisticated method leverages DRL methodology not only to execute precise and detrimental impacts on targeted infrastructure but also to evade detection by contemporary AI-driven defence systems. By developing and implementing tailored policies, the attackers ensure their hostile actions blend seamlessly with normal operational patterns, circumventing integrated security measures. Our research reveals the robustness of this attack strategy, shedding light on the potential for DRL models to be manipulated for adversarial purposes. Our research has been validated through testing and analysis in an industry-level setup. For reproducibility and further study, all related materials, including datasets and documentation, are publicly accessible.
Similar Papers
Enhancing Security in Deep Reinforcement Learning: A Comprehensive Survey on Adversarial Attacks and Defenses
Cryptography and Security
Makes smart machines safer from tricky attacks.
The Dark Side of Digital Twins: Adversarial Attacks on AI-Driven Water Forecasting
Machine Learning (CS)
Makes water systems less safe from computer attacks.
Application of Deep Reinforcement Learning for Intrusion Detection in Internet of Things: A Systematic Review
Cryptography and Security
Makes smart devices safer from hackers.