×

Industrial asset cyber-attack detection algorithm verification using secure, distributed ledger

  • US 11,627,151 B2
  • Filed: 10/31/2018
  • Issued: 04/11/2023
  • Est. Priority Date: 10/31/2018
  • Status: Active Grant
First Claim
Patent Images

1. A system to facilitate industrial asset cyber-attack detection algorithm verification, comprising:

  • a verification platform, including;

    a data connection to receive a stream of industrial asset cyber-attack detection algorithm data, the industrial asset cyber-attacked detection algorithm data comprising at least time-series sensor data from one or more monitoring nodes of an industrial asset and including a subset of the industrial asset cyber-attack detection algorithm data, andat least one verification platform computer processor coupled to the data connection and adapted to;

    mark the subset of industrial asset cyber-attack detection algorithm data as invalid,store the subset of industrial asset cyber-attack detection algorithm data and the corresponding marking as being invalid into a data store,record a hash value associated with a compressed representation of the subset of industrial asset cyber-attack detection algorithm data combined with metadata in a secure, distributed ledger,receive a transaction identifier from the secure, distributed ledger,independently create a version of the compressed representation of the subset of the industrial asset cyber-attack detection algorithm data combined with the metadata based on raw trie data received from a verification client, the raw trie data comprising a time series stream of sensor data output,mark the subset of industrial asset cyber-attack detection algorithm data in the data store as being valid after using the transaction identifier to verify that the recorded hash value matches a hash value of the independently created version of the compressed representation of the subset of the industrial asset cyber-attack detection algorithm data combined with the metadata;

    receive decision boundary information from an abnormal detection model, the decision boundary information representing a boundary between normal operating values and abnormal operating values, the abnormal operating values occurring during a cyber-attack, the abnormal detection algorithm receiving a stream of industrial data generated by a monitoring node;

    compare data points of the stream of industrial data to the decision boundary information; and

    generate at least one of a global alert signal or a local alert signal based on the result of the comparison.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×