Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles

In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: MESTHA, Lalit Keshav, JOHN, Justin Varkey, ANUBI, Olugbenga
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator MESTHA, Lalit Keshav
JOHN, Justin Varkey
ANUBI, Olugbenga
description In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_AU2018409844A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AU2018409844A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_AU2018409844A13</originalsourceid><addsrcrecordid>eNqNirEKwjAURbM4iPoPD1wttJqhjqUofoCdyzO5xWB8KUkq6Nc7KM5Oh3M4c9W1zwtiwTmzuZFFhskuyIZ8MOzdiz_GYkkw5fhrNIRIk9xZBJYY0bGnB67OeKSlmg3sE1ZfLtT6eDi3pwJj6JFGNhDkvum2ZVXrcl9r3VS7_6434jM6YA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><source>esp@cenet</source><creator>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ANUBI, Olugbenga</creator><creatorcontrib>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ANUBI, Olugbenga</creatorcontrib><description>In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.</description><language>eng</language><subject>AEROPLANES ; AIRCRAFT ; AVIATION ; CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COSMONAUTICS ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; HELICOPTERS ; PERFORMING OPERATIONS ; PHYSICS ; SIGNALLING ; TRAFFIC CONTROL SYSTEMS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; TRANSPORTING</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200723&amp;DB=EPODOC&amp;CC=AU&amp;NR=2018409844A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200723&amp;DB=EPODOC&amp;CC=AU&amp;NR=2018409844A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ANUBI, Olugbenga</creatorcontrib><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><description>In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.</description><subject>AEROPLANES</subject><subject>AIRCRAFT</subject><subject>AVIATION</subject><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COSMONAUTICS</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>HELICOPTERS</subject><subject>PERFORMING OPERATIONS</subject><subject>PHYSICS</subject><subject>SIGNALLING</subject><subject>TRAFFIC CONTROL SYSTEMS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>TRANSPORTING</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNirEKwjAURbM4iPoPD1wttJqhjqUofoCdyzO5xWB8KUkq6Nc7KM5Oh3M4c9W1zwtiwTmzuZFFhskuyIZ8MOzdiz_GYkkw5fhrNIRIk9xZBJYY0bGnB67OeKSlmg3sE1ZfLtT6eDi3pwJj6JFGNhDkvum2ZVXrcl9r3VS7_6434jM6YA</recordid><startdate>20200723</startdate><enddate>20200723</enddate><creator>MESTHA, Lalit Keshav</creator><creator>JOHN, Justin Varkey</creator><creator>ANUBI, Olugbenga</creator><scope>EVB</scope></search><sort><creationdate>20200723</creationdate><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><author>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ANUBI, Olugbenga</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_AU2018409844A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>AEROPLANES</topic><topic>AIRCRAFT</topic><topic>AVIATION</topic><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COSMONAUTICS</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>HELICOPTERS</topic><topic>PERFORMING OPERATIONS</topic><topic>PHYSICS</topic><topic>SIGNALLING</topic><topic>TRAFFIC CONTROL SYSTEMS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>TRANSPORTING</topic><toplevel>online_resources</toplevel><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ANUBI, Olugbenga</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>MESTHA, Lalit Keshav</au><au>JOHN, Justin Varkey</au><au>ANUBI, Olugbenga</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles</title><date>2020-07-23</date><risdate>2020</risdate><abstract>In some embodiments, an Unmanned Aerial Vehicle ("UAV") system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_AU2018409844A1
source esp@cenet
subjects AEROPLANES
AIRCRAFT
AVIATION
CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COSMONAUTICS
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
HELICOPTERS
PERFORMING OPERATIONS
PHYSICS
SIGNALLING
TRAFFIC CONTROL SYSTEMS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
TRANSPORTING
title Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A47%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=MESTHA,%20Lalit%20Keshav&rft.date=2020-07-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EAU2018409844A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true