CONTROL SYSTEM CYBER SECURITY
First Claim
Patent Images
1. A method, comprising;
- receiving a plurality of measurements from each of a number of sensing and actuating devices of a control system;
determining a suspected portion of the received measurements;
monitoring the suspected portion of the received measurements over a particular time period; and
determining whether the suspected portion of the received measurements is associated with a cyber attack.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, methods, and systems for control system cybersecurity are described herein. One method includes receiving a plurality of measurements from each of a number of sensing and actuating devices of a control system, determining a suspected portion of the received measurements, monitoring the suspected portion of the received measurements over a particular time period, and determining whether the suspected portion of the received measurements is associated with a cyber attack.
77 Citations
20 Claims
-
1. A method, comprising;
-
receiving a plurality of measurements from each of a number of sensing and actuating devices of a control system; determining a suspected portion of the received measurements; monitoring the suspected portion of the received measurements over a particular time period; and determining whether the suspected portion of the received measurements is associated with a cyber attack. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium having instructions stored thereon executable by a processor to:
-
receive a set of data associated with a particular portion of an operation of a physical system; determine an expected set of data associated with the particular portion of the operation of the physical system using the received set of data; and provide a notification responsive to a difference between the expected set of data and the received set of data exceeding a particular threshold. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A control system, comprising:
-
a plurality of sensing devices, each configured to; gather a respective first plurality of measurements from a physical system over a first time period; and gather a respective second plurality of measurements from the physical system over a second time period; and a computing device, configured to; receive the respective first plurality of measurements from each of the sensing devices; determine a respective predicted second plurality of measurements for each of the sensing devices based on the respective first plurality of measurements; receive the second plurality of measurements; compare the respective predicted second plurality of measurements with the received second plurality of measurements; and take an action associated with a determined cyber attack responsive to a difference between the respective predicted second plurality of measurements and the received second plurality of measurements exceeding a particular threshold. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification