Systems and methods for securing industrial asset control systems

A control system and asset technology, applied in general control systems, control/regulation systems, program control, etc., can solve problems such as insufficient solutions

Active Publication Date: 2021-06-15
GENERAL ELECTRIC CO
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing methods for securing industrial control systems, such as fault and diagnostic techniques, may not be sufficient to address these threats, especially when multiple attacks occur simultaneously because the multiple error / fault diagnostic techniques are not designed to address Automatic way to detect stealthy attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for securing industrial asset control systems
  • Systems and methods for securing industrial asset control systems
  • Systems and methods for securing industrial asset control systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments. However, one of ordinary skill in the art would understand that the embodiments may be practiced without the use of these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as not to obscure the described embodiments.

[0043] Industrial control systems that operate physical systems are constantly connected to the Internet. As a result, these control systems have become increasingly vulnerable, and in some cases, multiple attacks can occur simultaneously. Existing methods of securing industrial control systems, such as fault and diagnostic techniques, may not be sufficient to address these threats, especially when multiple attacks occur simultaneously. Thus, there is a need to protect industrial asset control systems from cyber threats in an autom...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a system and method for protecting industrial asset control systems. The normal spatial data source stores, for each of the plurality of threat nodes, a series of normal values ​​representative of normal operation of the industrial asset control system, and the threatened spatial data source stores a series of threatened values. The model creation computer can generate a set of normal feature vectors and threatened feature vectors. The computer may also calculate and output at least one decision boundary for a threat detection model based on the normal feature vector and the threatened feature vector. The plurality of threat nodes may then generate a series of current values ​​from the threat node representing current operation of the asset control system. A threat detection computer may receive the series of current values ​​from a threat node, generate a set of current feature vectors, execute the threat detection model, and send a threat alert signal based on the current feature vectors and the at least one decision boundary.

Description

technical field [0001] The present invention generally relates to industrial asset control systems, and more particularly to systems and methods for protecting industrial asset control systems, and corresponding domain level threat detection. Background technique [0002] Industrial control systems that operate physical systems (eg, associated with power turbines, jet engines, locomotives, autonomous vehicles, etc.) are increasingly connected to the Internet. Accordingly, these control systems are increasingly vulnerable to threats such as cyber-attacks (eg, associated with computer viruses, malware, etc.), which may disrupt power generation and distribution, damage engines, cause vehicle breakdowns, and the like. Current approaches mainly consider information technology ("IT" (Information Technology), such as computers that store, retrieve, transmit, and manipulate data) and operational technology ("OT" (Operation Technology), such as direct monitoring devices and communica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G05B19/042G06N20/00
CPCG05B19/0428G06N20/00G06F21/55H04L63/1441G06F21/552G06F21/554H04L63/1425H04L63/1408G06F21/50
Inventor L.K.梅斯萨J.C.撒切尔D.F.霍尔斯豪尔J.V.约翰
Owner GENERAL ELECTRIC CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products