USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS

In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: MESTHA, Lalit Keshav, JOHN, Justin Varkey, ACHANTA, Hema Kumari, BUSHEY, Cody Joe
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator MESTHA, Lalit Keshav
JOHN, Justin Varkey
ACHANTA, Hema Kumari
BUSHEY, Cody Joe
description In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019068618A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019068618A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019068618A13</originalsourceid><addsrcrecordid>eNqNzLEKwjAQgOEsDqK-w4Gz0CiUOp5J1KDNQe4i1KUUiZNoob4_VvABnP7l45-qa2IfDnDxURKegV1gigxCgMZQXZNFceCDTSzRjwKZnYChIJFG37C4msGm-N2YZucioAiaE8_V5N49hrz4daaWeyfmuMr9q81D393yM7_bxOtCb4uyKnWFevOf-gByGjNi</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><source>esp@cenet</source><creator>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ACHANTA, Hema Kumari ; BUSHEY, Cody Joe</creator><creatorcontrib>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ACHANTA, Hema Kumari ; BUSHEY, Cody Joe</creatorcontrib><description>In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190228&amp;DB=EPODOC&amp;CC=US&amp;NR=2019068618A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190228&amp;DB=EPODOC&amp;CC=US&amp;NR=2019068618A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ACHANTA, Hema Kumari</creatorcontrib><creatorcontrib>BUSHEY, Cody Joe</creatorcontrib><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><description>In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNzLEKwjAQgOEsDqK-w4Gz0CiUOp5J1KDNQe4i1KUUiZNoob4_VvABnP7l45-qa2IfDnDxURKegV1gigxCgMZQXZNFceCDTSzRjwKZnYChIJFG37C4msGm-N2YZucioAiaE8_V5N49hrz4daaWeyfmuMr9q81D393yM7_bxOtCb4uyKnWFevOf-gByGjNi</recordid><startdate>20190228</startdate><enddate>20190228</enddate><creator>MESTHA, Lalit Keshav</creator><creator>JOHN, Justin Varkey</creator><creator>ACHANTA, Hema Kumari</creator><creator>BUSHEY, Cody Joe</creator><scope>EVB</scope></search><sort><creationdate>20190228</creationdate><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><author>MESTHA, Lalit Keshav ; JOHN, Justin Varkey ; ACHANTA, Hema Kumari ; BUSHEY, Cody Joe</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019068618A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>MESTHA, Lalit Keshav</creatorcontrib><creatorcontrib>JOHN, Justin Varkey</creatorcontrib><creatorcontrib>ACHANTA, Hema Kumari</creatorcontrib><creatorcontrib>BUSHEY, Cody Joe</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>MESTHA, Lalit Keshav</au><au>JOHN, Justin Varkey</au><au>ACHANTA, Hema Kumari</au><au>BUSHEY, Cody Joe</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS</title><date>2019-02-28</date><risdate>2019</risdate><abstract>In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2019068618A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
HANDLING RECORD CARRIERS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T01%3A46%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=MESTHA,%20Lalit%20Keshav&rft.date=2019-02-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019068618A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true