-
公开(公告)号:US11144683B2
公开(公告)日:2021-10-12
申请号:US15491243
申请日:2017-04-19
Applicant: General Electric Company
Inventor: Lalit Keshav Mestha , Masoud Abbaszadeh , Cody Bushey
IPC: G06F30/20 , G06F30/17 , G06F111/10
Abstract: An augmented system model may include a system high fidelity model that generates a first output. The augmented system model may further include a data driven model to receive data associated with the first output and to generate a second output, and a feature space version of the second output may be output from the augmented system model. Monitoring nodes may each generate a series of current monitoring node values over time representing current operation of an industrial asset. A model adaptation element may receive the current monitoring node values, calculate a feature space version of current operation, and compare the feature space version of the second output of the augmented system model with the feature space version of current operation. Parameters of the data driven model may then be adapted based on a result of the comparison.
-
公开(公告)号:US10417415B2
公开(公告)日:2019-09-17
申请号:US15478425
申请日:2017-04-04
Applicant: General Electric Company
Inventor: Masoud Abbaszadeh , Lalit Keshav Mestha , Cody Bushey , Daniel Francis Holzhauer
Abstract: According to some embodiments, a threat detection computer platform may receive a plurality of real-time monitoring node signal values over time that represent a current operation of the industrial asset. For each stream of monitoring node signal values, the platform may generate a current monitoring node feature vector. The feature vector may also be estimated using a dynamic model output with that monitoring node signal values. The platform may then compare the feature vector with a corresponding decision boundary for that monitoring node, the decision boundary separating a normal state from an abnormal state for that monitoring node. The platform may detect that a particular monitoring node has passed the corresponding decision boundary and classify that particular monitoring node as being under attack. The platform may then automatically determine if the attack on that particular monitoring node is an independent attack or a dependent attack.
-