Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles
In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | MESTHA, Lalit Keshav JOHN, Justin Varkey ANUBI, Olugbenga |
description | In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_AU2018409844A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AU2018409844A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_AU2018409844A13</originalsourceid><addsrcrecordid>eNqNirEKwjAURbM4iPoPD1wttJqhjqUofoCdyzO5xWB8KUkq6Nc7KM5Oh3M4c9W1zwtiwTmzuZFFhskuyIZ8MOzdiz_GYkkw5fhrNIRIk9xZBJYY0bGnB67OeKSlmg3sE1ZfLtT6eDi3pwJj6JFGNhDkvum2ZVXrcl9r3VS7_6434jM6YA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><source>esp@cenet</source><creator>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ANUBI, Olugbenga</creator><creatorcontrib>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ANUBI, Olugbenga</creatorcontrib><description>In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.</description><language>eng</language><subject>AEROPLANES ; AIRCRAFT ; AVIATION ; CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COSMONAUTICS ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; HELICOPTERS ; PERFORMING OPERATIONS ; PHYSICS ; SIGNALLING ; TRAFFIC CONTROL SYSTEMS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; TRANSPORTING</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200723&DB=EPODOC&CC=AU&NR=2018409844A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200723&DB=EPODOC&CC=AU&NR=2018409844A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ANUBI, Olugbenga</creatorcontrib><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><description>In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.</description><subject>AEROPLANES</subject><subject>AIRCRAFT</subject><subject>AVIATION</subject><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COSMONAUTICS</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>HELICOPTERS</subject><subject>PERFORMING OPERATIONS</subject><subject>PHYSICS</subject><subject>SIGNALLING</subject><subject>TRAFFIC CONTROL SYSTEMS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>TRANSPORTING</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNirEKwjAURbM4iPoPD1wttJqhjqUofoCdyzO5xWB8KUkq6Nc7KM5Oh3M4c9W1zwtiwTmzuZFFhskuyIZ8MOzdiz_GYkkw5fhrNIRIk9xZBJYY0bGnB67OeKSlmg3sE1ZfLtT6eDi3pwJj6JFGNhDkvum2ZVXrcl9r3VS7_6434jM6YA</recordid><startdate>20200723</startdate><enddate>20200723</enddate><creator>MESTHA, Lalit Keshav</creator><creator>JOHN, Justin Varkey</creator><creator>ANUBI, Olugbenga</creator><scope>EVB</scope></search><sort><creationdate>20200723</creationdate><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><author>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ANUBI, Olugbenga</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_AU2018409844A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>AEROPLANES</topic><topic>AIRCRAFT</topic><topic>AVIATION</topic><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COSMONAUTICS</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>HELICOPTERS</topic><topic>PERFORMING OPERATIONS</topic><topic>PHYSICS</topic><topic>SIGNALLING</topic><topic>TRAFFIC CONTROL SYSTEMS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>TRANSPORTING</topic><toplevel>online_resources</toplevel><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ANUBI, Olugbenga</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>MESTHA, Lalit Keshav</au><au>JOHN, Justin Varkey</au><au>ANUBI, Olugbenga</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><date>2020-07-23</date><risdate>2020</risdate><abstract>In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_AU2018409844A1 |
source | esp@cenet |
subjects | AEROPLANES AIRCRAFT AVIATION CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COSMONAUTICS COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY HELICOPTERS PERFORMING OPERATIONS PHYSICS SIGNALLING TRAFFIC CONTROL SYSTEMS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION TRANSPORTING |
title | Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A47%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=MESTHA,%20Lalit%20Keshav&rft.date=2020-07-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EAU2018409844A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |