/tep-attack-simulator

ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"

Primary LanguageCBSD 3-Clause "New" or "Revised" LicenseBSD-3-Clause

TEP Attack Simulator

This repository contains files to run a manipulated version of the Tennesee Eastman Process (TEP) -- an ICS simulator.
This simulator is heavily based on two prior iterations, which may serve as useful references:

This simulator contains modifications to the original MATLAB implementation, which allows the user to inject manipulations into the TE process, and observe/record their impacts.

The outputs of this simulator are used in the paper: "Attributions for ML-based ICS anomaly detection: From theory to practice", to appear at the 31st Network and Distributed System Security Symposium (NDSS 2024).

Bibtex

DOI

@inproceedings{icsanomaly:ndss2024,
  title = {Attributions for {ML}-based {ICS} Anomaly Detection: {From} Theory to Practice},
  author = {Clement Fung and Eric Zeng and Lujo Bauer},
  booktitle = {Proceedings of the 31st Network and Distributed System Security Symposium},
  publisher = {Internet Society},
  year = 2024,
}  

Dependencies

Like the original TEP implementation, our simulator is built in MATLAB Simulink.
For our experiments, we use MATLAB R2021a.

Step-by-step demo instructions

A full set of instructions, with screenshots, can be found in the demo instructions.
The final outcomes of the demo are shown below.

Benign simulation result Attack simulation result (manipulating D Feed sensor)
image image

Access to the complete dataset

As described in our paper, we use the simulator to execute each attack condition (location, magnitude, pattern) in the TE process.
The full set of 286 manipulations can be found here: https://doi.org/10.1184/R1/23805552.