DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Using virtual sensors to accommodate industrial asset control systems during cyber attacks

Abstract

In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.

Inventors:
; ; ;
Issue Date:
Research Org.:
General Electric Co., Schenectady, NY (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1600400
Patent Number(s):
10505955
Application Number:
15/683,250
Assignee:
General Electric Company (Schenectady, NY)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
OE0000833
Resource Type:
Patent
Resource Relation:
Patent File Date: 08/22/2017
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING; 20 FOSSIL-FUELED POWER PLANTS

Citation Formats

Mestha, Lalit Keshav, Achanta, Hema Kumari, John, Justin Varkey, and Bushey, Cody Joe. Using virtual sensors to accommodate industrial asset control systems during cyber attacks. United States: N. p., 2019. Web.
Mestha, Lalit Keshav, Achanta, Hema Kumari, John, Justin Varkey, & Bushey, Cody Joe. Using virtual sensors to accommodate industrial asset control systems during cyber attacks. United States.
Mestha, Lalit Keshav, Achanta, Hema Kumari, John, Justin Varkey, and Bushey, Cody Joe. Tue . "Using virtual sensors to accommodate industrial asset control systems during cyber attacks". United States. https://www.osti.gov/servlets/purl/1600400.
@article{osti_1600400,
title = {Using virtual sensors to accommodate industrial asset control systems during cyber attacks},
author = {Mestha, Lalit Keshav and Achanta, Hema Kumari and John, Justin Varkey and Bushey, Cody Joe},
abstractNote = {In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2019},
month = {12}
}

Works referenced in this record:

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
journal, June 2014


Cyber-Physical-Security Framework for Building Energy Management System
conference, April 2016


Limitations of state estimation based cyber attack detection schemes in industrial control systems
conference, April 2016


Production Process Knowledge-based Intrusion Detection for Industrial Control Systems
patent-application, September 2017


A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration
journal, January 2018