US 11,706,192 B2
Integrated behavior-based infrastructure command validation
Bora A. Akyol, El Dorado Hills, CA (US); Jereme N. Haack, West Richland, WA (US); Thomas E. Carroll, Richland, WA (US); Kyle E. Monson, West Richland, WA (US); Penny L. McKenzie, Kennewick, WA (US); Keith W. Thornhill, Pasco, WA (US); and Michael E. Mylrea, Alexandria, VA (US)
Assigned to Battelle Memorial Institute, Richland, WA (US)
Filed by Battelle Memorial Institute, Richland, WA (US)
Filed on Oct. 16, 2019, as Appl. No. 16/655,071.
Claims priority of provisional application 62/746,917, filed on Oct. 17, 2018.
Prior Publication US 2020/0127973 A1, Apr. 23, 2020
Int. Cl. H04L 9/40 (2022.01); G05B 9/02 (2006.01); G06N 3/08 (2023.01)
CPC H04L 63/0209 (2013.01) [G05B 9/02 (2013.01); G06N 3/08 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, implemented by one or more computing devices comprising at least one hardware processor and one or more tangible memories coupled to the at least one hardware processor, of protecting a set of controlled infrastructure assets in an infrastructure system, the method comprising:
receiving a first command for one of the set of controlled infrastructure assets;
validating the first command, wherein the first command is validated according to a command validation model, the command validation model having been generated based on data representing at least part of the infrastructure system;
responsive to a successful validation, providing the first command to the one of the set of controlled infrastructure assets;
adapting the command validation model to account for change in usage of the set of controlled infrastructure assets over time and for variance of components of the set of controlled infrastructure assets, including updating the command validation model based on results data of the command validation, the results data including the first command and a validity determination for the first command, wherein the updated command validation model is a process for analyzing and determining validity of one or more subsequent commands for the set of controlled infrastructure assets;
receiving a second command, among the one or more subsequent commands, for another one of the set of controlled infrastructure assets; and
responsive to an unsuccessful validation of the second command, rejecting the second command and preventing the second command from being executed by the other one of the set of controlled infrastructure assets, wherein the second command is malformed or the second command is determined to result in incorrect behavior of the other one of the set of controlled infrastructure assets.