Domain level threat detection for industrial asset control system

A technology for controlling systems and assets, applied in general control systems, control/regulation systems, program control, etc., and can solve problems such as insufficient solutions

Active Publication Date: 2017-11-24
GENERAL ELECTRIC CO
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing methods for securing industrial control systems, such as fault and diagnostic techniques, may not be sufficient to address these threats, especially when

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Domain level threat detection for industrial asset control system
  • Domain level threat detection for industrial asset control system
  • Domain level threat detection for industrial asset control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments. However, one of ordinary skill in the art would understand that the embodiments may be practiced without the use of these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as not to obscure the described embodiments.

[0043] Industrial control systems that operate physical systems are constantly connected to the Internet. As a result, these control systems have become increasingly vulnerable, and in some cases, multiple attacks can occur simultaneously. Existing methods of securing industrial control systems, such as fault and diagnostic techniques, may not be sufficient to address these threats, especially when multiple attacks occur simultaneously. Thus, there is a need to protect industrial asset control systems from cyber threats in an autom...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A normal space data source 110 stores, for each of a plurality of threat nodes 130, a series of normal values that represent normal operation of an industrial asset control system, and a threatened space data source 120 stores a series of threatened values. A model creation computer 140 may generate sets of normal and threatened feature vectors. The computer 140 may also calculate and output at least one decision boundary for a threat detection model 155 based on the normal and threatened feature vectors. The plurality of threat nodes 130 may then generate a series of current values from threat nodes that represent a current operation of the asset control system. A threat detection computer 150 may receive the series of current values from threat nodes 130, generate a set of current feature vectors, execute the threat detection model 155, and transmit a threat alert signal based on the current feature vectors and at the least one decision boundary.

Description

technical field [0001] The present invention generally relates to industrial asset control systems, and more particularly to systems and methods for protecting industrial asset control systems, and corresponding domain level threat detection. Background technique [0002] Industrial control systems that operate physical systems (eg, associated with power turbines, jet engines, locomotives, autonomous vehicles, etc.) are increasingly connected to the Internet. Accordingly, these control systems are increasingly vulnerable to threats such as cyber-attacks (eg, associated with computer viruses, malware, etc.), which may disrupt power generation and distribution, damage engines, cause vehicle breakdowns, and the like. Current approaches mainly consider information technology ("IT" (Information Technology), such as computers that store, retrieve, transmit, and manipulate data) and operational technology ("OT" (Operation Technology), such as direct monitoring devices and communica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G05B19/042G06N20/00
CPCG05B19/0428G06N20/00G06F21/55H04L63/1441G06F21/552G06F21/554H04L63/1425H04L63/1408G06F21/50
Inventor L.K.梅斯萨J.C.撒切尔D.F.霍尔斯豪尔J.V.约翰
Owner GENERAL ELECTRIC CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products