Visible to the public Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning

TitleAutomated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Publication TypeConference Paper
Year of Publication2020
AuthorsBhattacharya, A., Ramachandran, T., Banik, S., Dowling, C. P., Bopardikar, S. D.
Conference Name2020 IEEE International Conference on Intelligence and Security Informatics (ISI)
Date PublishedNov. 2020
PublisherIEEE
ISBN Number978-1-7281-8800-3
KeywordsAdversary Emulation, Adversary Models, Cyber-physical security, Cyber-physical systems, emulation, Human Behavior, hybrid attack graph, Metrics, Numerical models, pubcrawl, reinforcement learning, resilience, Resiliency, Scalability, security, Uncertainty
Abstract

Adversary emulation is an offensive exercise that provides a comprehensive assessment of a system's resilience against cyber attacks. However, adversary emulation is typically a manual process, making it costly and hard to deploy in cyber-physical systems (CPS) with complex dynamics, vulnerabilities, and operational uncertainties. In this paper, we develop an automated, domain-aware approach to adversary emulation for CPS. We formulate a Markov Decision Process (MDP) model to determine an optimal attack sequence over a hybrid attack graph with cyber (discrete) and physical (continuous) components and related physical dynamics. We apply model-based and model-free reinforcement learning (RL) methods to solve the discrete-continuous MDP in a tractable fashion. As a baseline, we also develop a greedy attack algorithm and compare it with the RL procedures. We summarize our findings through a numerical study on sensor deception attacks in buildings to compare the performance and solution quality of the proposed algorithms.

URLhttps://ieeexplore.ieee.org/document/9280521
DOI10.1109/ISI49825.2020.9280521
Citation Keybhattacharya_automated_2020