arXiv Open Access 2026

Baiting AI: Deceptive Adversary Against AI-Protected Industrial Infrastructures

Aryan Pasikhani Prosanta Gope Yang Yang Shagufta Mehnaz Biplab Sikdar
Lihat Sumber

Abstrak

This paper explores a new cyber-attack vector targeting Industrial Control Systems (ICS), particularly focusing on water treatment facilities. Developing a new multi-agent Deep Reinforcement Learning (DRL) approach, adversaries craft stealthy, strategically timed, wear-out attacks designed to subtly degrade product quality and reduce the lifespan of field actuators. This sophisticated method leverages DRL methodology not only to execute precise and detrimental impacts on targeted infrastructure but also to evade detection by contemporary AI-driven defence systems. By developing and implementing tailored policies, the attackers ensure their hostile actions blend seamlessly with normal operational patterns, circumventing integrated security measures. Our research reveals the robustness of this attack strategy, shedding light on the potential for DRL models to be manipulated for adversarial purposes. Our research has been validated through testing and analysis in an industry-level setup. For reproducibility and further study, all related materials, including datasets and documentation, are publicly accessible.

Topik & Kata Kunci

Penulis (5)

A

Aryan Pasikhani

P

Prosanta Gope

Y

Yang Yang

S

Shagufta Mehnaz

B

Biplab Sikdar

Format Sitasi

Pasikhani, A., Gope, P., Yang, Y., Mehnaz, S., Sikdar, B. (2026). Baiting AI: Deceptive Adversary Against AI-Protected Industrial Infrastructures. https://arxiv.org/abs/2601.08481

Akses Cepat

Lihat di Sumber
Informasi Jurnal
Tahun Terbit
2026
Bahasa
en
Sumber Database
arXiv
Akses
Open Access ✓