DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Using virtual sensors to accommodate industrial asset control systems during cyber attacks

Abstract

In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.

Inventors:
; ; ;
Issue Date:
Research Org.:
General Electric Co., Schenectady, NY (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1771594
Patent Number(s):
10826922
Application Number:
16/679,749
Assignee:
General Electric Company (Schenectady, NY)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
OE0000833
Resource Type:
Patent
Resource Relation:
Patent File Date: 11/11/2019
Country of Publication:
United States
Language:
English

Citation Formats

Mestha, Lalit Keshav, Achanta, Hema Kumari, John, Justin Varkey, and Bushey, Cody Joe. Using virtual sensors to accommodate industrial asset control systems during cyber attacks. United States: N. p., 2020. Web.
Mestha, Lalit Keshav, Achanta, Hema Kumari, John, Justin Varkey, & Bushey, Cody Joe. Using virtual sensors to accommodate industrial asset control systems during cyber attacks. United States.
Mestha, Lalit Keshav, Achanta, Hema Kumari, John, Justin Varkey, and Bushey, Cody Joe. Tue . "Using virtual sensors to accommodate industrial asset control systems during cyber attacks". United States. https://www.osti.gov/servlets/purl/1771594.
@article{osti_1771594,
title = {Using virtual sensors to accommodate industrial asset control systems during cyber attacks},
author = {Mestha, Lalit Keshav and Achanta, Hema Kumari and John, Justin Varkey and Bushey, Cody Joe},
abstractNote = {In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2020},
month = {11}
}

Works referenced in this record:

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
journal, June 2014


Limitations of state estimation based cyber attack detection schemes in industrial control systems
conference, April 2016


Moving average PLS soft sensor for online product quality estimation in an industrial batch polymerization process
journal, March 2009


Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System
conference, June 2018

  • Agrawal, Anand; Ahmed, Chuadhry Mujeeb; Chang, Ee-Chien
  • ASIA CCS '18: ACM Asia Conference on Computer and Communications Security, Proceedings of the 2018 on Asia Conference on Computer and Communications Security
  • https://doi.org/10.1145/3196494.3201587

Cyber-Physical-Security Framework for Building Energy Management System
conference, April 2016


A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration
journal, January 2018