Learning new attack vectors from misuse cases with deep reinforcement learning

Veith, Eric M. S. P. and Wellßow, Arlena and Uslar, Mathias (2023) Learning new attack vectors from misuse cases with deep reinforcement learning. Frontiers in Energy Research, 11. ISSN 2296-598X

[thumbnail of pubmed-zip/versions/2/package-entries/fenrg-11-1138446-r1/fenrg-11-1138446.pdf] Text
pubmed-zip/versions/2/package-entries/fenrg-11-1138446-r1/fenrg-11-1138446.pdf - Published Version

Download (56MB)

Abstract

Modern smart grids already consist of various components that interleave classical Operational Technology (OT) with Information and Communication Technology (ICT), which, in turn, have opened the power grid to advanced approaches using distributed software systems and even Artificial Intelligence (AI) applications. This IT/OT integration increases complexity, however, without argument, this advance is necessary to accommodate the rising numbers of prosumers, Distributed Energy Resources (DERs), to enable new market concepts, and to tackle world-wide CO2 emission goals. But the increasing complexity of the Critical National Infrastructure (CNI) power grid gives way to numerous new attack vectors such that a priori robustness cannot be guaranteed anymore and run-time resilience, especially against the “unknown unknowns”, is the focus of current research. In this article, we present a novel combination of so called misuse-case modelling and an approach based on Deep Reinforcement Learning (DRL) to analyze a power grid for new attack vectors. Our approach enables learning from domain knowledge (offline learning), while expanding on that knowledge through learning agents that eventually uncover new attack vectors.

Item Type: Article
Subjects: Science Global Plos > Energy
Depositing User: Unnamed user with email support@science.globalplos.com
Date Deposited: 25 Apr 2023 09:26
Last Modified: 02 Feb 2024 04:28
URI: http://ebooks.manu2sent.com/id/eprint/664

Actions (login required)

View Item
View Item