DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Learning method and system for separating independent and dependent attacks

Abstract

Streams of monitoring node signal values over time, representing a current operation of the industrial asset, are used to generate current monitoring node feature vectors. Each feature vector is compared with a corresponding decision boundary separating normal from abnormal states. When a first monitoring node passes a corresponding decision boundary, an attack is detected and classified as an independent attack. When a second monitoring node passes a decision boundary, an attack is detected and a first decision is generated based on a first set of inputs indicating if the attack is independent/dependent. From the beginning of the attack on the second monitoring node until a final time, the first decision is updated as new signal values are received for the second monitoring node. When the final time is reached, a second decision is generated based on a second set of inputs indicating if the attack is independent/dependent.

Inventors:
; ;
Issue Date:
Research Org.:
General Electric Co., Schenectady, NY (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1735308
Patent Number(s):
10785237
Application Number:
15/977,558
Assignee:
General Electric Company (Schenectady, NY)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06N - COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
OE0000833
Resource Type:
Patent
Resource Relation:
Patent File Date: 05/11/2018
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Mestha, Lalit Keshav, Abbaszadeh, Masoud, and Giani, Annartia. Learning method and system for separating independent and dependent attacks. United States: N. p., 2020. Web.
Mestha, Lalit Keshav, Abbaszadeh, Masoud, & Giani, Annartia. Learning method and system for separating independent and dependent attacks. United States.
Mestha, Lalit Keshav, Abbaszadeh, Masoud, and Giani, Annartia. Tue . "Learning method and system for separating independent and dependent attacks". United States. https://www.osti.gov/servlets/purl/1735308.
@article{osti_1735308,
title = {Learning method and system for separating independent and dependent attacks},
author = {Mestha, Lalit Keshav and Abbaszadeh, Masoud and Giani, Annartia},
abstractNote = {Streams of monitoring node signal values over time, representing a current operation of the industrial asset, are used to generate current monitoring node feature vectors. Each feature vector is compared with a corresponding decision boundary separating normal from abnormal states. When a first monitoring node passes a corresponding decision boundary, an attack is detected and classified as an independent attack. When a second monitoring node passes a decision boundary, an attack is detected and a first decision is generated based on a first set of inputs indicating if the attack is independent/dependent. From the beginning of the attack on the second monitoring node until a final time, the first decision is updated as new signal values are received for the second monitoring node. When the final time is reached, a second decision is generated based on a second set of inputs indicating if the attack is independent/dependent.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Sep 22 00:00:00 EDT 2020},
month = {Tue Sep 22 00:00:00 EDT 2020}
}

Works referenced in this record:

Adaptive control architectures for mitigating sensor attacks in cyber-physical systems
journal, May 2016


Efficient Localization of Transmitters Within Complex Electromagnetic Environments
patent-application, May 2016


Ineffective network equipment identification
patent-application, May 2017


Industrial Control System Smart Hardware Monitoring
patent-application, December 2015


Cyber security
patent-application, August 2017


Threat detection for a fleet of industrial assets
patent, November 2019


Method for Mitigation of Cyber Attacks on Industrial Control Systems
patent-application, February 2017


Automated attack localization and detection
patent, September 2019


System and methods for adaptive model generation for detecting intrusion in computer systems
patent-application, February 2017


Autonomous sensor system with intrinsic asymmetric encryption
patent-application, March 2017


Cyber signal isolator
patent, February 2019


Pattern Detection in Sensor Networks
patent-application, June 2016


Multi-Layer Aggregation for Object Detection
patent-application, February 2016


System and Method for Providing Monitoring of Industrial Equipment
patent-application, August 2014


Edge-based machine learning for encoding legitimate scanning
patent-application, September 2017


System and Method for Logging Security Events for an Industrial Control System
patent-application, October 2013


Cluster-based decision boundaries for threat detection in industrial asset control system
patent-application, July 2018


Apparatus and method for detecting an abnormality sign in a control system
patent-application, October 2014


Probabilistic Model For Cyber Risk Forecasting
patent-application, December 2015


System and Method for Maintaining the Health of a Control System
patent-application, February 2016


Automated Attack Localization and Detection
patent-application, June 2018


Classifying Data with Deep Learning Neural Records Incrementally Refined Through Expert Input
patent-application, September 2015


Parsimonious continuous-space phrase representations for natural language processing
patent-application, October 2016


Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
patent-application, August 2017


Method for Quantitative Resilience Estimation of Industrial Control Systems
patent-application, May 2013


Threat Detection and Localizatino for Monitoring Nodes of an Industrial Asset Control System
patent-application, December 2017


System and Method for Detecting a Cyber-Attack at SCADA/ICS Managed Plants
patent-application, September 2018


System and method for improved production surveillance using visual pattern recognition in oil and gas upstream
patent-application, November 2016


Method and system for profiling network flows at a measurement point within a computer network
patent-application, March 2002


Multi-mode boundary selection for threat detection in industrial asset control system
patent, August 2019


Systems and methods for providing off-line decision support for correlation analysis
patent-application, April 2003


Dynamic normalization of monitoring node data for threat detection in industrial asset control system
patent-application, May 2018


Method and System for Unified Information Representation and Applications Thereof
patent-application, September 2012


Feature and boundary tuning for threat detection in industrial asset control system
patent, February 2019


Anomaly Detection for Context-Dependent Data
patent-application, November 2016


Distributed Estimation and Detection of Anomalies in Control Systems
patent-application, April 2018


Connection based denial of service detection
patent, May 2012


Systems and methods for secure operation of an industrial controller
patent, March 2015


Systems and methods for cyber-attack detection at sample speed
patent-application, June 2018


Multi-mode boundary selection for threat detection in industrial asset control system
patent-application, June 2018


Systems and methods for cyber-attack detection at sample speed
patent, March 2020


Sequential data examination method
patent-application, March 2006