USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS
In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node i...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | MESTHA, Lalit Keshav JOHN, Justin Varkey ACHANTA, Hema Kumari BUSHEY, Cody Joe |
description | In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019068618A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019068618A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019068618A13</originalsourceid><addsrcrecordid>eNqNzLEKwjAQgOEsDqK-w4Gz0CiUOp5J1KDNQe4i1KUUiZNoob4_VvABnP7l45-qa2IfDnDxURKegV1gigxCgMZQXZNFceCDTSzRjwKZnYChIJFG37C4msGm-N2YZucioAiaE8_V5N49hrz4daaWeyfmuMr9q81D393yM7_bxOtCb4uyKnWFevOf-gByGjNi</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><source>esp@cenet</source><creator>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ACHANTA, Hema Kumari ; BUSHEY, Cody Joe</creator><creatorcontrib>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ACHANTA, Hema Kumari ; BUSHEY, Cody Joe</creatorcontrib><description>In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190228&DB=EPODOC&CC=US&NR=2019068618A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190228&DB=EPODOC&CC=US&NR=2019068618A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ACHANTA, Hema Kumari</creatorcontrib><creatorcontrib>BUSHEY, Cody Joe</creatorcontrib><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><description>In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNzLEKwjAQgOEsDqK-w4Gz0CiUOp5J1KDNQe4i1KUUiZNoob4_VvABnP7l45-qa2IfDnDxURKegV1gigxCgMZQXZNFceCDTSzRjwKZnYChIJFG37C4msGm-N2YZucioAiaE8_V5N49hrz4daaWeyfmuMr9q81D393yM7_bxOtCb4uyKnWFevOf-gByGjNi</recordid><startdate>20190228</startdate><enddate>20190228</enddate><creator>MESTHA, Lalit Keshav</creator><creator>JOHN, Justin Varkey</creator><creator>ACHANTA, Hema Kumari</creator><creator>BUSHEY, Cody Joe</creator><scope>EVB</scope></search><sort><creationdate>20190228</creationdate><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><author>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ACHANTA, Hema Kumari ; BUSHEY, Cody Joe</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019068618A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ACHANTA, Hema Kumari</creatorcontrib><creatorcontrib>BUSHEY, Cody Joe</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>MESTHA, Lalit Keshav</au><au>JOHN, Justin Varkey</au><au>ACHANTA, Hema Kumari</au><au>BUSHEY, Cody Joe</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><date>2019-02-28</date><risdate>2019</risdate><abstract>In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2019068618A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY HANDLING RECORD CARRIERS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T01%3A46%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=MESTHA,%20Lalit%20Keshav&rft.date=2019-02-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019068618A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |