Virtual sensor supervised learning for cyber-attack neutralization
Abstract
An industrial asset may have monitoring nodes that generate current monitoring node values. A dynamic, resilient estimator may split a temporal monitoring node space into normal and one or more abnormal subspaces associated with different kinds of attack vectors. According to some embodiments, a neutralization model is constructed and trained for each attack vector using supervised learning and the associated abnormal subspace. In other embodiments, a single model is created using out-of-range values for abnormal monitoring nodes. Responsive to an indication of a particular abnormal monitoring node or nodes, the system may automatically invoke the appropriate neutralization model to determine estimated values of the particular abnormal monitoring node or nodes (e.g., by selecting the correct model or using out-of-range values). The series of current monitoring node values from the abnormal monitoring node or nodes may then be replaced with the estimated values.
- Inventors:
- Issue Date:
- Research Org.:
- General Electric Co., Schenectady, NY (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 2222146
- Patent Number(s):
- 11729190
- Application Number:
- 16/666,807
- Assignee:
- General Electric Company (Schenectady, NY)
- DOE Contract Number:
- OE0000833
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 10/29/2019
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Roychowdhury, Subhrajit, Abbaszadeh, Masoud, and Dokucu, Mustafa Tekin. Virtual sensor supervised learning for cyber-attack neutralization. United States: N. p., 2023.
Web.
Roychowdhury, Subhrajit, Abbaszadeh, Masoud, & Dokucu, Mustafa Tekin. Virtual sensor supervised learning for cyber-attack neutralization. United States.
Roychowdhury, Subhrajit, Abbaszadeh, Masoud, and Dokucu, Mustafa Tekin. Tue .
"Virtual sensor supervised learning for cyber-attack neutralization". United States. https://www.osti.gov/servlets/purl/2222146.
@article{osti_2222146,
title = {Virtual sensor supervised learning for cyber-attack neutralization},
author = {Roychowdhury, Subhrajit and Abbaszadeh, Masoud and Dokucu, Mustafa Tekin},
abstractNote = {An industrial asset may have monitoring nodes that generate current monitoring node values. A dynamic, resilient estimator may split a temporal monitoring node space into normal and one or more abnormal subspaces associated with different kinds of attack vectors. According to some embodiments, a neutralization model is constructed and trained for each attack vector using supervised learning and the associated abnormal subspace. In other embodiments, a single model is created using out-of-range values for abnormal monitoring nodes. Responsive to an indication of a particular abnormal monitoring node or nodes, the system may automatically invoke the appropriate neutralization model to determine estimated values of the particular abnormal monitoring node or nodes (e.g., by selecting the correct model or using out-of-range values). The series of current monitoring node values from the abnormal monitoring node or nodes may then be replaced with the estimated values.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2023},
month = {8}
}
Works referenced in this record:
Autonomous Reconfigurable Virtual Sensing System for Cyber-Attack Neutralization
patent-application, July 2019
- Abbaszadeh, Masoud; Mestha, Lalit Keshav
- US Patent Application 15/977,595; 2019/0230106 Al
Using virtual sensors to accommodate industrial asset control systems during cyber attacks
patent-application, February 2019
- Mestha, Lalit Keshav; Achanta, Hema Kumari; John, Justin Varkey
- US Patent Application 15/683250; 20190068618
Multi-Modal, Multi-Disciplinary Feature Discovery to Detect Cyber Threats in Electric Power Grid
patent-application, September 2018
- Yan, Weizhong; Abbaszadeh, Masoud; Mestha, Lalit Keshav
- US Patent Application 15/454219; 20180262525
Cluster-based decision boundaries for threat detection in industrial asset control system
patent-application, July 2018
- Abbaszadeh, Masoud; Bushey, Cody Joe; Mestha, Lalit Keshav
- US Patent Application 15/397062; 20180191758
Cyberattack-Resilient Control System Design
patent-application, July 2019
- Wei, Dong; Wang, Lingyun; de Agular, Leandro Pfleger
- US Patent Application 16/331,159; 2019/0220374 Al
Security network devices by forecasting future security incidents for a network based on past security incidents
patent, January 2020
- Han, Yufei; Shen, Yun; Yumer, Leylya
- US Patent Document 10,547,623
Unauthorized Communication Detection Apparatus and Recording Medium
patent-application, August 2020
- Hawana, Hiroki; Naka, Kenji; Taniguchi, Tsuyoshi
- US Patent Application 16/565574; 20200275278
Cyber-Attack Detection and Neutralization
patent-application, September 2018
- Mestha, Lalit Keshav; Anubi, Olugbenga; Abbaszadeh, Masoud
- US Patent Application 15/454,144; 2018/0255091 Al
A new Method Against Attacks on Networked Industrial Control Systems
conference, August 2017
- Truong, Nguyen Dao; Tu, Le My
- FAIR - NGHIÊN CỨU CƠ BẢN VÀ ỨNG DỤNG CÔNG NGHỆ THÔNG TIN - 2016
Automated Attack Localization and Detection
patent-application, June 2018
- Abbaszadeh, Masoud; Mestha, Lalit Keshav; Bushey, Cody
- US Patent Application 15/478425; 20180157831
Multi-mode boundary selection for threat detection in industrial asset control system
patent-application, June 2018
- Holzhauer, Daniel Francis; Bushey, Cody Joe; Mestha, Lalit Keshav
- US Patent Application 15/371723; 20180159877
Multi-Class Decision System for Categorizing Industrial Asset Attack and Fault Types
patent-application, February 2019
- Abbaszadeh, Masoud; Mestha, Lalit Keshav; Yan, Weizhong
- US Patent Application 15/691,827; 2019/0058715 Al
Profiling cyber threats detected in a target environment and automatically generating one or more rule bases for an expert system usable to profile cyber threats detected in a target environment
patent, October 2017
- Laidlaw, Stuart; Harold, St. John; Hillick, Mark
- US Patent Document 9,807,109
Vulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid
journal, April 2012
- Deng, Yi; Shukla, Sandeep
- Journal of Cyber Security and Mobility