INDUSTRIAL DATA VERIFICATION USING SECURE, DISTRIBUTED LEDGER

    公开(公告)号:US20190288847A1

    公开(公告)日:2019-09-19

    申请号:US15923279

    申请日:2018-03-16

    Abstract: A verification platform may include a data connection to receive a stream of industrial asset data, including a subset of the industrial asset data, from industrial asset sensors. The verification platform may store the subset of industrial asset data into a data store, the subset of industrial asset data being marked as invalid, and record a hash value associated with a compressed representation of the subset of industrial asset data combined with metadata in a secure, distributed ledger (e.g., associated with blockchain technology). The verification platform may then receive a transaction identifier from the secure, distributed ledger and mark the subset of industrial asset data in the data store as being valid after using the transaction identifier to verify that the recorded hash value matches a hash value of an independently created version of the compressed representation of the subset of industrial asset data combined with metadata.

    LEARNING METHOD AND SYSTEM FOR SEPARATING INDEPENDENT AND DEPENDENT ATTACKS

    公开(公告)号:US20190230099A1

    公开(公告)日:2019-07-25

    申请号:US15977558

    申请日:2018-05-11

    Abstract: Streams of monitoring node signal values over time, representing a current operation of the industrial asset, are used to generate current monitoring node feature vectors. Each feature vector is compared with a corresponding decision boundary separating normal from abnormal states. When a first monitoring node passes a corresponding decision boundary, an attack is detected and classified as an independent attack. When a second monitoring node passes a decision boundary, an attack is detected and a first decision is generated based on a first set of inputs indicating if the attack is independent/dependent. From the beginning of the attack on the second monitoring node until a final time, the first decision is updated as new signal values are received for the second monitoring node. When the final time is reached, a second decision is generated based on a second set of inputs indicating if the attack is independent/dependent.

    RELIABLE CYBER-THREAT DETECTION IN RAPIDLY CHANGING ENVIRONMENTS

    公开(公告)号:US20190222596A1

    公开(公告)日:2019-07-18

    申请号:US15964644

    申请日:2018-04-27

    CPC classification number: H04L63/1425 G06F21/55

    Abstract: In some embodiments, a plurality of monitoring nodes each generate a series of current monitoring node values over time that represent a current operation of the industrial asset. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors including a current feature for capturing transients (e.g., local transients and/or global transients). The attack detection computer platform may also access an attack detection model having at least one decision boundary that was created using at least one of a set of normal feature vectors and/or a set of attacked feature vectors. The attack detection model may then be executed such that an attack alert signal is transmitted by the attack detection computer platform, when appropriate, based on the set of current feature vectors (including the current feature to capture transients) and the at least one decision boundary.

    REAL-TIME ADAPTATION OF SYSTEM HIGH FIDELITY MODEL IN FEATURE SPACE

    公开(公告)号:US20180157771A1

    公开(公告)日:2018-06-07

    申请号:US15491243

    申请日:2017-04-19

    CPC classification number: G06F17/5009 G06F17/5086 G06F2217/16

    Abstract: An augmented system model may include a system high fidelity model that generates a first output. The augmented system model may further include a data driven model to receive data associated with the first output and to generate a second output, and a feature space version of the second output may be output from the augmented system model. Monitoring nodes may each generate a series of current monitoring node values over time representing current operation of an industrial asset. A model adaptation element may receive the current monitoring node values, calculate a feature space version of current operation, and compare the feature space version of the second output of the augmented system model with the feature space version of current operation. Parameters of the data driven model may then be adapted based on a result of the comparison.

    VALIDATION OF CONTROL COMMAND IN SUBSTANTIALLY REAL TIME FOR INDUSTRIAL ASSET CONTROL SYSTEM THREAT DETECTION

    公开(公告)号:US20190212710A1

    公开(公告)日:2019-07-11

    申请号:US16354926

    申请日:2019-03-15

    CPC classification number: G05B13/04 G05B17/02

    Abstract: According to some embodiments, a validation platform computer may interpret at least one received data packet to identify a control command for a controller of an industrial asset control system. The at least data packet being might be received, for example, from a network associated with a current operation of the industrial asset control system. The control command may then be introduced into an industrial asset simulation executing in parallel with the industrial asset control system. A simulated result of the control command from the industrial asset simulation may be validated, and, upon validation of the simulated result, it may be arranged for the control command to be provided to the controller of the industrial asset control system. Additionally, in some embodiments failed validation of a simulated result will prompt a threat-alert signal as well as prevent the command (e.g., data packet) from continuing to the controller.

    THREAT DETECTION FOR A FLEET OF INDUSTRIAL ASSETS

    公开(公告)号:US20180316701A1

    公开(公告)日:2018-11-01

    申请号:US15497974

    申请日:2017-04-26

    CPC classification number: H04L63/1425 H04L63/1416 H04L63/1433

    Abstract: A system to protect a fleet of industrial assets may include a communication port to exchange information with a plurality of remote industrial assets. An industrial fleet protection system may receive information from the plurality of remote industrial assets or a cloud-based security platform and calculate, based on information received from multiple industrial assets, a current fleet-wide operation feature vector. The industrial fleet protection system may then compare the current fleet-wide operation feature vector with a fleet-wide decision boundary (e.g., separating normal from abnormal operation of the industrial fleet). The system may then automatically transmit a response (e.g., a cyber-attack threat alert or an adjustment to a decision boundary of an industrial asset) when a result of the comparison indicates abnormal operation of the industrial fleet.

    SYSTEMS AND METHODS FOR CYBER-ATTACK DETECTION AT SAMPLE SPEED

    公开(公告)号:US20180159879A1

    公开(公告)日:2018-06-07

    申请号:US15484282

    申请日:2017-04-11

    Abstract: A threat detection model creation computer receives normal monitoring node values and abnormal monitoring node values. At least some received monitoring node values may be processed with a deep learning model to determine parameters of the deep learning model (e.g., a weight matrix and affine terms). The parameters of the deep learning model and received monitoring node values may then be used to compute feature vectors. The feature vectors may be spatial along a plurality of monitoring nodes. At least one decision boundary for a threat detection model may be automatically calculated based on the computed feature vectors, and the system may output the decision boundary separating a normal state from an abnormal state for that monitoring node. The decision boundary may also be obtained by combining feature vectors from multiple nodes. The decision boundary may then be used to detect normal and abnormal operation of an industrial asset.

Patent Agency Ranking