Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Title | Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Bhattacharya, A., Ramachandran, T., Banik, S., Dowling, C. P., Bopardikar, S. D. |
Conference Name | 2020 IEEE International Conference on Intelligence and Security Informatics (ISI) |
Date Published | Nov. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-8800-3 |
Keywords | Adversary Emulation, Adversary Models, Cyber-physical security, Cyber-physical systems, emulation, Human Behavior, hybrid attack graph, Metrics, Numerical models, pubcrawl, reinforcement learning, resilience, Resiliency, Scalability, security, Uncertainty |
Abstract | Adversary emulation is an offensive exercise that provides a comprehensive assessment of a system's resilience against cyber attacks. However, adversary emulation is typically a manual process, making it costly and hard to deploy in cyber-physical systems (CPS) with complex dynamics, vulnerabilities, and operational uncertainties. In this paper, we develop an automated, domain-aware approach to adversary emulation for CPS. We formulate a Markov Decision Process (MDP) model to determine an optimal attack sequence over a hybrid attack graph with cyber (discrete) and physical (continuous) components and related physical dynamics. We apply model-based and model-free reinforcement learning (RL) methods to solve the discrete-continuous MDP in a tractable fashion. As a baseline, we also develop a greedy attack algorithm and compare it with the RL procedures. We summarize our findings through a numerical study on sensor deception attacks in buildings to compare the performance and solution quality of the proposed algorithms. |
URL | https://ieeexplore.ieee.org/document/9280521 |
DOI | 10.1109/ISI49825.2020.9280521 |
Citation Key | bhattacharya_automated_2020 |