Large-scale, time-sensitive secure distributed control systems and methods
First Claim
Patent Images
1. A method comprising:
- determining, by a processor, a consensus computation weight at a plurality of modules in a computer network;
detecting, by the processor, an anomaly at a module among the plurality of modules in the computer network;
decreasing, by the processor, the consensus computation weight of the module associated with the detected anomaly to reduce a malicious effect to a second module among the plurality of modules with the computer network;
adjusting, by the processor, a reputation level of the module associated with the decreased consensus computation weight of the module associated with the detected anomaly in parallel with the plurality of modules in the computer network;
determining, by the processor, that the computer network would remain connected upon isolating the module associated with the detected anomaly;
isolating, by the processor, the module associated with the detected anomaly in the computer network based on the adjusted reputation level of the module associated with the detected anomaly; and
controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level.
2 Assignments
0 Petitions
Accused Products
Abstract
Large-scale, time-sensitive secure distributed control systems and methods are disclosed. According to an aspect, a method includes detecting an anomaly at a module among a plurality of modules in a network. The method also includes adjusting a reputation level of the module associated with the detected anomaly. Further, the method includes controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level.
10 Citations
20 Claims
-
1. A method comprising:
-
determining, by a processor, a consensus computation weight at a plurality of modules in a computer network; detecting, by the processor, an anomaly at a module among the plurality of modules in the computer network; decreasing, by the processor, the consensus computation weight of the module associated with the detected anomaly to reduce a malicious effect to a second module among the plurality of modules with the computer network; adjusting, by the processor, a reputation level of the module associated with the decreased consensus computation weight of the module associated with the detected anomaly in parallel with the plurality of modules in the computer network; determining, by the processor, that the computer network would remain connected upon isolating the module associated with the detected anomaly; isolating, by the processor, the module associated with the detected anomaly in the computer network based on the adjusted reputation level of the module associated with the detected anomaly; and controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
at least a processor and memory configured to; determine a consensus computation weight at a plurality of modules in a computer network; detect an anomaly at a module among the plurality of modules in the computer network; decrease the consensus computation weight of the module associated with the detected anomaly to reduce a malicious effect to a second module among the plurality of modules within the computer network; adjust a reputation level of the module associated with the decreased consensus computation weight of the module associated with the detected anomaly in parallel with the plurality of modules in the computer network; determine that the computer network would remain connected upon isolating the module associated with the detected anomaly; isolate the module associated with the detected anomaly in the computer network based on the adjusted reputation level of the module associated with the detected anomaly; and control interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions readable by a computing device to cause the computing device to:
-
determine, by the computing device, a consensus computation weight at a plurality of modules in a computer network; detect, by the computing device, an anomaly at a module among the plurality of modules in the computer network; decrease, by the computing device, the consensus computation weight of the module associated with the detected anomaly to a malicious effect to a second module among the plurality of modules with the computer network; adjust, by the computing device, a reputation level of the module associated with the decreased consensus computation weight of the module associated with the detected anomaly in parallel with the plurality of modules in the computer network; determine, by the computing device, that the computer network would remain connected upon isolating the module associated with the detected anomaly; isolate, by the computing device, the module associated with the detected anomaly in the computer network based on the adjusted reputation level of the module associated with the detected anomaly; and control, by the computing device, interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification