Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process

Integrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the vulnerability of neural networks to adversarial attacks. This study explores the thr...

Full description

Saved in:
Bibliographic Details
Main Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Open Journal of the Industrial Electronics Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10531068/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841526335366758400
author Vitaliy Pozdnyakov
Aleksandr Kovalenko
Ilya Makarov
Mikhail Drobyshevskiy
Kirill Lukyanov
author_facet Vitaliy Pozdnyakov
Aleksandr Kovalenko
Ilya Makarov
Mikhail Drobyshevskiy
Kirill Lukyanov
author_sort Vitaliy Pozdnyakov
collection DOAJ
description Integrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the vulnerability of neural networks to adversarial attacks. This study explores the threats in deploying deep learning models for Fault Detection and Diagnosis (FDD) in ACS using the Tennessee Eastman Process dataset. By evaluating three neural networks with different architectures, we subject them to six types of adversarial attacks and explore five different defense methods. Our results highlight the strong vulnerability of models to adversarial samples and the varying effectiveness of defense strategies. We also propose a new defense strategy based on combining adversarial training and data quantization. This research contributes several insights into securing machine learning within ACS, ensuring robust FDD in industrial processes.
format Article
id doaj-art-330a130fa2e9493184d8aaa83e184505
institution Kabale University
issn 2644-1284
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Industrial Electronics Society
spelling doaj-art-330a130fa2e9493184d8aaa83e1845052025-01-17T00:00:51ZengIEEEIEEE Open Journal of the Industrial Electronics Society2644-12842024-01-01542844010.1109/OJIES.2024.340139610531068Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman ProcessVitaliy Pozdnyakov0https://orcid.org/0000-0003-4369-4068Aleksandr Kovalenko1https://orcid.org/0000-0003-3562-0472Ilya Makarov2https://orcid.org/0000-0002-3308-8825Mikhail Drobyshevskiy3https://orcid.org/0000-0002-1639-9154Kirill Lukyanov4https://orcid.org/0009-0009-5235-2175AIRI, Moscow, RussiaAIRI, Moscow, RussiaAIRI, Moscow, RussiaISP RAS Research Center for Trusted Artificial Intelligence, Moscow, RussiaISP RAS Research Center for Trusted Artificial Intelligence, Moscow, RussiaIntegrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the vulnerability of neural networks to adversarial attacks. This study explores the threats in deploying deep learning models for Fault Detection and Diagnosis (FDD) in ACS using the Tennessee Eastman Process dataset. By evaluating three neural networks with different architectures, we subject them to six types of adversarial attacks and explore five different defense methods. Our results highlight the strong vulnerability of models to adversarial samples and the varying effectiveness of defense strategies. We also propose a new defense strategy based on combining adversarial training and data quantization. This research contributes several insights into securing machine learning within ACS, ensuring robust FDD in industrial processes.https://ieeexplore.ieee.org/document/10531068/Adversarial attacksautomated control systems (ACS)defense methodsfault detection and diagnosis (FDD)Tennessee Eastman Process
spellingShingle Vitaliy Pozdnyakov
Aleksandr Kovalenko
Ilya Makarov
Mikhail Drobyshevskiy
Kirill Lukyanov
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
IEEE Open Journal of the Industrial Electronics Society
Adversarial attacks
automated control systems (ACS)
defense methods
fault detection and diagnosis (FDD)
Tennessee Eastman Process
title Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
title_full Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
title_fullStr Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
title_full_unstemmed Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
title_short Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
title_sort adversarial attacks and defenses in fault detection and diagnosis a comprehensive benchmark on the tennessee eastman process
topic Adversarial attacks
automated control systems (ACS)
defense methods
fault detection and diagnosis (FDD)
Tennessee Eastman Process
url https://ieeexplore.ieee.org/document/10531068/
work_keys_str_mv AT vitaliypozdnyakov adversarialattacksanddefensesinfaultdetectionanddiagnosisacomprehensivebenchmarkonthetennesseeeastmanprocess
AT aleksandrkovalenko adversarialattacksanddefensesinfaultdetectionanddiagnosisacomprehensivebenchmarkonthetennesseeeastmanprocess
AT ilyamakarov adversarialattacksanddefensesinfaultdetectionanddiagnosisacomprehensivebenchmarkonthetennesseeeastmanprocess
AT mikhaildrobyshevskiy adversarialattacksanddefensesinfaultdetectionanddiagnosisacomprehensivebenchmarkonthetennesseeeastmanprocess
AT kirilllukyanov adversarialattacksanddefensesinfaultdetectionanddiagnosisacomprehensivebenchmarkonthetennesseeeastmanprocess