MONITORING COMMUNICATIONS FLOW IN AN INDUSTRIAL SYSTEM TO DETECT AND MITIGATE HAZARDOUS CONDITIONS
First Claim
1. A computer-implemented method comprising:
- monitoring, by a computing device, communication flows within an industrial processing system;
identifying, by the computing device, a hazardous command based on the monitoring the communication flows, wherein the identifying the hazardous command includes running a simulation with the communication flows as an input to the simulation;
generating, by the computing device, a set of one or more mitigating commands based on the identifying the hazardous command; and
outputting, by the computing device, the set of one or more mitigating commands to components within the industrial processing system, wherein the outputting the set of the one or more mitigating commands reduces a level of hazard caused by the hazardous command.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes: monitoring, by a computing device, communication flows within an industrial processing system; identifying, by the computing device, a hazardous command based on monitoring the communication flows, wherein identifying the hazardous command includes running a simulation with the communication flows as an input to the simulation; generating, by the computing device, a set of one or more mitigating commands based on identifying the hazardous command; and outputting, by the computing device, the set of one or more mitigating commands to components within the industrial processing system, wherein outputting the set of the one or more mitigating commands reduces a level of hazard caused by the hazardous command.
87 Citations
24 Claims
-
1. A computer-implemented method comprising:
-
monitoring, by a computing device, communication flows within an industrial processing system; identifying, by the computing device, a hazardous command based on the monitoring the communication flows, wherein the identifying the hazardous command includes running a simulation with the communication flows as an input to the simulation; generating, by the computing device, a set of one or more mitigating commands based on the identifying the hazardous command; and outputting, by the computing device, the set of one or more mitigating commands to components within the industrial processing system, wherein the outputting the set of the one or more mitigating commands reduces a level of hazard caused by the hazardous command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a computing device to cause the computing device to:
-
observe commands within an industrial processing system; determine a hazard level for a set of one or more of the observed commands using a simulation model that predicts the effects of the set of one or more observed commands; validate the set of one or more observed commands when the hazard level is less than a particular threshold; determine that the one or more observed commands is a hazardous set of commands when the hazard level is equal to or greater than the threshold; generate a set of one or more mitigating commands based on determining that the one or more observed commands is a hazardous set of commands; and output the set of one or more mitigating commands to components within the industrial processing system, wherein outputting the set of the one or more mitigating commands reduces a level of hazard caused by the set of hazardous commands. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system comprising:
-
a CPU, a computer readable memory and a computer readable storage medium associated with a computing device; program instructions to observe commands within an industrial processing system; program instructions to determine a hazard level for a set of one or more of the observed commands using a simulation model that predicts the effects of the set of one or more observed commands; program instructions to determine that the one or more observed commands is a hazardous set of commands when the hazard level is equal to or greater than the particular threshold; program instructions to generate a set of one or more mitigating commands based on determining that the one or more observed commands is a hazardous set of commands; program instructions to predict the effects of the set of one or more mitigating commands using the simulation model; program instructions to modify the set of one or more mitigating commands based on the predicted effects; and program instructions to output the modified set of one or more mitigating commands to components within the industrial processing system, wherein outputting the modified set of the one or more mitigating commands reduces a level of hazard caused by the set of hazardous commands, wherein the program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory. - View Dependent Claims (20)
-
-
21. A computer-implemented method comprising:
-
monitoring, by a computing device, communication flows within an industrial processing system; identifying, by the computing device, a hazardous command based on the monitoring the communication flows; generating, by the computing device, a set of one or more mitigating commands based on the identifying the hazardous command; and outputting, by the computing device, the set of one or more mitigating commands to components within the industrial processing system, wherein the outputting the set of the one or more mitigating commands reduces a level of hazard caused by the hazardous command. - View Dependent Claims (22, 23, 24)
-
Specification