• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于长短期记忆神经网络的伪造网络攻击:一个实验案例研究

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study.

作者信息

Zarzycki Krzysztof, Chaber Patryk, Cabaj Krzysztof, Ławryńczuk Maciej, Marusak Piotr, Nebeluk Robert, Plamowski Sebastian, Wojtulewicz Andrzej

机构信息

Institute of Control and Computation Engineering, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.

Institute of Computer Science, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, Poland.

出版信息

Sensors (Basel). 2023 Jul 28;23(15):6778. doi: 10.3390/s23156778.

DOI:10.3390/s23156778
PMID:37571561
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10422211/
Abstract

This work is concerned with the vulnerability of a network industrial control system to cyber-attacks, which is a critical issue nowadays. This is because an attack on a controlled process can damage or destroy it. These attacks use long short-term memory (LSTM) neural networks, which model dynamical processes. This means that the attacker may not know the physical nature of the process; an LSTM network is sufficient to mislead the process operator. Our experimental studies were conducted in an industrial control network containing a magnetic levitation process. The model training, evaluation, and structure selection are described. The chosen LSTM network very well mimicked the considered process. Finally, based on the obtained results, we formulated possible protection methods against the considered types of cyber-attack.

摘要

这项工作关注的是网络工业控制系统对网络攻击的脆弱性,这在当今是一个关键问题。这是因为对受控过程的攻击可能会损坏或摧毁它。这些攻击使用长短期记忆(LSTM)神经网络,该网络对动态过程进行建模。这意味着攻击者可能不知道该过程的物理性质;一个LSTM网络就足以误导过程操作员。我们的实验研究是在一个包含磁悬浮过程的工业控制网络中进行的。描述了模型训练、评估和结构选择。所选的LSTM网络很好地模拟了所考虑的过程。最后,基于所获得的结果,我们制定了针对所考虑的网络攻击类型的可能保护方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/3179c55f7b24/sensors-23-06778-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/3b71bcf5d943/sensors-23-06778-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/a6374ca19969/sensors-23-06778-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/0c4de144ca8c/sensors-23-06778-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/8fb55b5f118e/sensors-23-06778-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/53e559a42770/sensors-23-06778-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/7d2770bf119d/sensors-23-06778-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/7644a404c1e6/sensors-23-06778-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/3179c55f7b24/sensors-23-06778-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/3b71bcf5d943/sensors-23-06778-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/a6374ca19969/sensors-23-06778-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/0c4de144ca8c/sensors-23-06778-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/8fb55b5f118e/sensors-23-06778-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/53e559a42770/sensors-23-06778-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/7d2770bf119d/sensors-23-06778-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/7644a404c1e6/sensors-23-06778-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a540/10422211/3179c55f7b24/sensors-23-06778-g008.jpg

相似文献

1
Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study.基于长短期记忆神经网络的伪造网络攻击:一个实验案例研究
Sensors (Basel). 2023 Jul 28;23(15):6778. doi: 10.3390/s23156778.
2
Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree-Based Classification for Detection of DDoS Pandemic Attacks in SDN-Based SCADA Systems.基于卷积神经网络和决策树分类的多阶段学习框架,用于检测基于软件定义网络的监控与数据采集系统中的分布式拒绝服务大规模攻击。
Sensors (Basel). 2024 Feb 5;24(3):1040. doi: 10.3390/s24031040.
3
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).捍卫防御者:基于对抗学习的防御策略,用于网络物理系统 (CPS) 中的基于学习的安全方法。
Sensors (Basel). 2023 Jun 9;23(12):5459. doi: 10.3390/s23125459.
4
SCADA securing system using deep learning to prevent cyber infiltration.使用深度学习防止网络渗透的 SCADA 安全系统。
Neural Netw. 2023 Aug;165:321-332. doi: 10.1016/j.neunet.2023.05.047. Epub 2023 Jun 2.
5
Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.考虑合理性演化的针对网络攻击的保护资源分配优化的多阶段攻防图博弈分析
Risk Anal. 2022 May;42(5):1086-1105. doi: 10.1111/risa.13837. Epub 2021 Oct 11.
6
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities.考虑网络攻击漏洞的配电网信息物理系统安全风险评估方法
Entropy (Basel). 2022 Dec 27;25(1):47. doi: 10.3390/e25010047.
7
Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.迈向基于物联网的智能电网中的应用网络安全解决方案:入侵检测系统方法。
Sensors (Basel). 2019 Nov 14;19(22):4952. doi: 10.3390/s19224952.
8
Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.基于深度神经网络的物联网架构开发,以应对自动化引导车辆的网络攻击。
Sensors (Basel). 2021 Dec 18;21(24):8467. doi: 10.3390/s21248467.
9
Artificial intelligence for cybersecurity monitoring of cyber-physical power electronic converters: a DC/DC power converter case study.用于网络物理电力电子转换器网络安全监测的人工智能:DC/DC电源转换器案例研究。
Sci Rep. 2024 Sep 27;14(1):22072. doi: 10.1038/s41598-024-72286-2.
10
Cyber security risk assessment for SCADA and DCS networks.针对SCADA和DCS网络的网络安全风险评估
ISA Trans. 2007 Oct;46(4):583-94. doi: 10.1016/j.isatra.2007.04.003. Epub 2007 Jul 10.

引用本文的文献

1
Enhancing resilience of distributed DC microgrids against cyber attacks using a transformer-based Kalman filter estimator.使用基于变压器的卡尔曼滤波器估计器增强分布式直流微电网抵御网络攻击的弹性。
Sci Rep. 2025 Feb 25;15(1):6815. doi: 10.1038/s41598-025-90959-4.
2
Efficient Cyberattack Detection Methods in Industrial Control Systems.工业控制系统中的高效网络攻击检测方法
Sensors (Basel). 2024 Jun 14;24(12):3860. doi: 10.3390/s24123860.

本文引用的文献

1
Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.基于深度自动编码器算法的自动驾驶车辆网络的网络攻击检测。
Sensors (Basel). 2023 Apr 18;23(8):4086. doi: 10.3390/s23084086.
2
Detection of Management-Frames-Based Denial-of-Service Attack in Wireless LAN Network Using Artificial Neural Network.基于人工神经网络的无线局域网管理帧拒绝服务攻击检测。
Sensors (Basel). 2023 Feb 28;23(5):2663. doi: 10.3390/s23052663.
3
Correlation-Based Anomaly Detection in Industrial Control Systems.基于相关的工业控制系统异常检测。
Sensors (Basel). 2023 Feb 1;23(3):1561. doi: 10.3390/s23031561.
4
Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks.在没有标记攻击记录的情况下检测和定位供水管网中的网络物理攻击。
Sensors (Basel). 2022 Aug 12;22(16):6035. doi: 10.3390/s22166035.
5
Detecting Cyberattacks on Electrical Storage Systems through Neural Network Based Anomaly Detection Algorithm.通过基于神经网络的异常检测算法检测电气储能系统中的网络攻击。
Sensors (Basel). 2022 May 23;22(10):3933. doi: 10.3390/s22103933.
6
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture.网络安全威胁与数字农业的旁路攻击
Sensors (Basel). 2022 May 5;22(9):3520. doi: 10.3390/s22093520.
7
Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks.增强受对抗攻击的LoRaWAN网关的网络安全性。
Sensors (Basel). 2022 May 4;22(9):3498. doi: 10.3390/s22093498.
8
RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure.RAFI:用于基于物联网的射频识别基础设施的稳健认证框架。
Sensors (Basel). 2022 Apr 19;22(9):3110. doi: 10.3390/s22093110.
9
Computationally Efficient Nonlinear Model Predictive Control Using the L Cost-Function.基于 L 成本函数的计算高效非线性模型预测控制。
Sensors (Basel). 2021 Aug 30;21(17):5835. doi: 10.3390/s21175835.
10
LSTM and GRU Neural Networks as Models of Dynamical Processes Used in Predictive Control: A Comparison of Models Developed for Two Chemical Reactors.长短期记忆神经网络和门控循环单元神经网络作为预测控制中动态过程的模型:为两个化学反应器开发的模型的比较。
Sensors (Basel). 2021 Aug 20;21(16):5625. doi: 10.3390/s21165625.