Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles
Abstract
In some embodiments, an Unmanned Aerial Vehicle (“UAV”) system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.
- Inventors:
- Issue Date:
- Research Org.:
- GE Global Research, Niskayuna, New York (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1805552
- Patent Number(s):
- 10931687
- Application Number:
- 15/899,903
- Assignee:
- General Electric Company (Schenectady, NY)
- DOE Contract Number:
- OE0000833
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 02/20/2018
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Mestha, Lalit Keshav, Anubi, Olugbenga, and John, Justin Varkey. Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles. United States: N. p., 2021.
Web.
Mestha, Lalit Keshav, Anubi, Olugbenga, & John, Justin Varkey. Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles. United States.
Mestha, Lalit Keshav, Anubi, Olugbenga, and John, Justin Varkey. Tue .
"Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles". United States. https://www.osti.gov/servlets/purl/1805552.
@article{osti_1805552,
title = {Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles},
author = {Mestha, Lalit Keshav and Anubi, Olugbenga and John, Justin Varkey},
abstractNote = {In some embodiments, an Unmanned Aerial Vehicle (“UAV”) system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2021},
month = {2}
}