Cluster-based decision boundaries for threat detection in industrial asset control system

    公开(公告)号:US10805324B2

    公开(公告)日:2020-10-13

    申请号:US15397062

    申请日:2017-01-03

    Abstract: A threat detection model creation computer may receive a series of monitoring node values (representing normal and/or threatened operation of the industrial asset control system) and generate a set of normal feature vectors. The threat detection model creation computer may identify a first cluster and a second cluster in the set of feature vectors. The threat detection model creation computer may then automatically determine a plurality of cluster-based decision boundaries for a threat detection model. A first potential cluster-based decision boundary for the threat detection model may be automatically calculated based on the first cluster in the set of feature vectors. Similarly, the threat detection model creation computer may also automatically calculate a second potential cluster-based decision boundary for the threat detection model based on the second cluster in the set of feature vectors.

    Feature and boundary tuning for threat detection in industrial asset control system

    公开(公告)号:US10204226B2

    公开(公告)日:2019-02-12

    申请号:US15371905

    申请日:2016-12-07

    Abstract: According to some embodiments, a threat detection model creation computer may receive a series of normal monitoring node values (representing normal operation of the industrial asset control system) and generate a set of normal feature vectors. The threat detection model creation computer may also receive a series of threatened monitoring node values (representing a threatened operation of the industrial asset control system) and generate a set of threatened feature vectors. At least one potential decision boundary for a threat detection model may be calculated based on the set of normal feature vectors, the set of threatened feature vectors, and an initial algorithm parameter. A performance of the at least one potential decision boundary may be evaluated based on a performance metric. The initial algorithm parameter may then be tuned based on a result of the evaluation, and the at least one potential decision boundary may be re-calculated.

    Control of power generation system with water level calibration for pressure vessel

    公开(公告)号:US11208920B2

    公开(公告)日:2021-12-28

    申请号:US16433119

    申请日:2019-06-06

    Abstract: Embodiments of the present disclosure include a method for controlling a power generation system, the method including: calculating, during operation of the power generation system, a target water level within a pressure vessel of the power generation system, the pressure vessel receiving a feedwater input and generating a steam output; calculating a flow rate change of the steam output from the pressure vessel; calibrating the target water level within the pressure vessel based on the output from mass flux through the pressure vessel, the mass flux through the pressure vessel being derived from the at least the feedwater input and the steam output; and adjusting an operating parameter of the power generation system based on the calibrated target water level within the pressure vessel.

    Multi-mode boundary selection for threat detection in industrial asset control system

    公开(公告)号:US10397257B2

    公开(公告)日:2019-08-27

    申请号:US15371723

    申请日:2016-12-07

    Abstract: According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons.

    Threat detection and localization for monitoring nodes of an industrial asset control system

    公开(公告)号:US11005863B2

    公开(公告)日:2021-05-11

    申请号:US15179034

    申请日:2016-06-10

    Abstract: In some embodiments, a plurality of real-time monitoring node signal inputs receive streams of monitoring node signal values over time that represent a current operation of the industrial asset control system. A threat detection computer platform, coupled to the plurality of real-time monitoring node signal inputs, may receive the streams of monitoring node signal values and, for each stream of monitoring node signal values, generate a current monitoring node feature vector. The threat detection computer platform may then compare each generated current monitoring node feature vector with a corresponding decision boundary for that monitoring node, the decision boundary separating a normal state from an abnormal state for that monitoring node, and localize an origin of a threat to a particular monitoring node. The threat detection computer platform may then automatically transmit a threat alert signal based on results of said comparisons along with an indication of the particular monitoring node.

    Using virtual sensors to accommodate industrial asset control systems during cyber attacks

    公开(公告)号:US10826922B2

    公开(公告)日:2020-11-03

    申请号:US16679749

    申请日:2019-11-11

    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.

    Dynamic normalization of monitoring node data for threat detection in industrial asset control system

    公开(公告)号:US10678912B2

    公开(公告)日:2020-06-09

    申请号:US15351809

    申请日:2016-11-15

    Abstract: Operation of an industrial asset control system may be simulated or monitored under various operating conditions to generate a set of operating results. Subsets of the operating results may be used to calculate a normalization function for each of a plurality of operating conditions. Streams of monitoring node signal values over time may be received that represent a current operation of the industrial asset control system. A threat detection platform may then dynamically calculate normalized monitoring node signal values based at least in part on a normalization function in an operating mode database. For each stream of normalized monitoring node signal values, a current monitoring node feature vector may be generated and compared with a corresponding decision boundary for that monitoring node, the decision boundary separating normal and abnormal states for that monitoring node. A threat alert signal may then be automatically transmitted based on results of those comparisons.

    Validation of control command in substantially real time for industrial asset control system threat detection

    公开(公告)号:US11036194B2

    公开(公告)日:2021-06-15

    申请号:US16354926

    申请日:2019-03-15

    Abstract: According to some embodiments, a validation platform computer may interpret at least one received data packet to identify a control command for a controller of an industrial asset control system. The at least data packet being might be received, for example, from a network associated with a current operation of the industrial asset control system. The control command may then be introduced into an industrial asset simulation executing in parallel with the industrial asset control system. A simulated result of the control command from the industrial asset simulation may be validated, and, upon validation of the simulated result, it may be arranged for the control command to be provided to the controller of the industrial asset control system. Additionally, in some embodiments failed validation of a simulated result will prompt a threat-alert signal as well as prevent the command (e.g., data packet) from continuing to the controller.

    Multi-mode boundary selection for threat detection in industrial asset control system

    公开(公告)号:US11005873B2

    公开(公告)日:2021-05-11

    申请号:US16511463

    申请日:2019-07-15

    Abstract: According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons.

    Data-driven model construction for industrial asset decision boundary classification

    公开(公告)号:US10671060B2

    公开(公告)日:2020-06-02

    申请号:US15681974

    申请日:2017-08-21

    Abstract: In some embodiments, a system model construction platform may receive, from a system node data store, system node data associated with an industrial asset. The system model construction platform may automatically construct a data-driven, dynamic system model for the industrial asset based on the received system node data. A synthetic attack platform may then inject at least one synthetic attack into the data-driven, dynamic system model to create, for each of a plurality of monitoring nodes, a series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. The synthetic attack platform may store, in a synthetic attack space data source, the series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. This information may then be used, for example, along with normal operational data to construct a threat detection model for the industrial asset.

Patent Agency Ranking