DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles

Abstract

In some embodiments, an Unmanned Aerial Vehicle (“UAV”) system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.

Inventors:
; ;
Issue Date:
Research Org.:
GE Global Research, Niskayuna, New York (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1805552
Patent Number(s):
10931687
Application Number:
15/899,903
Assignee:
General Electric Company (Schenectady, NY)
DOE Contract Number:  
OE0000833
Resource Type:
Patent
Resource Relation:
Patent File Date: 02/20/2018
Country of Publication:
United States
Language:
English

Citation Formats

Mestha, Lalit Keshav, Anubi, Olugbenga, and John, Justin Varkey. Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles. United States: N. p., 2021. Web.
Mestha, Lalit Keshav, Anubi, Olugbenga, & John, Justin Varkey. Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles. United States.
Mestha, Lalit Keshav, Anubi, Olugbenga, and John, Justin Varkey. Tue . "Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles". United States. https://www.osti.gov/servlets/purl/1805552.
@article{osti_1805552,
title = {Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles},
author = {Mestha, Lalit Keshav and Anubi, Olugbenga and John, Justin Varkey},
abstractNote = {In some embodiments, an Unmanned Aerial Vehicle (“UAV”) system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2021},
month = {2}
}