Patents by Inventor Masoud ABBASZADEH

Masoud ABBASZADEH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190056722
    Abstract: In some embodiments, a system model construction platform may receive, from a system node data store, system node data associated with an industrial asset. The system model construction platform may automatically construct a data-driven, dynamic system model for the industrial asset based on the received system node data. A synthetic attack platform may then inject at least one synthetic attack into the data-driven, dynamic system model to create, for each of a plurality of monitoring nodes, a series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. The synthetic attack platform may store, in a synthetic attack space data source, the series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. This information may then be used, for example, along with normal operational data to construct a threat detection model for the industrial asset.
    Type: Application
    Filed: August 21, 2017
    Publication date: February 21, 2019
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA, Cody Joe BUSHEY
  • Publication number: 20190058715
    Abstract: According to some embodiments, a plurality of monitoring nodes may each generate a series of current monitoring node values over time that represent a current operation of the industrial asset. A node classifier computer, coupled to the plurality of monitoring nodes, may receive the series of current monitoring node values and generate a set of current feature vectors. The node classifier computer may also access at least one multi-class classifier model having at least one decision boundary. The at least one multi-class classifier model may be executed and the system may transmit a classification result based on the set of current feature vectors and the at least one decision boundary. The classification result may indicate, for example, whether a monitoring node status is normal, attacked, or faulty.
    Type: Application
    Filed: August 21, 2017
    Publication date: February 21, 2019
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA, Weizhong YAN
  • Publication number: 20180330083
    Abstract: The example embodiments are directed to a system and method for forecasting anomalies in feature detection. In one example, the method includes storing feature behavior information of at least one monitoring node of an asset, including a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space, receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space, wherein the feature values are located within the normalcy boundary, forecasting that a future feature value corresponding to a future input signal from the at least one monitoring node is going to be positioned outside the normalcy boundary based on the feature values within the normalcy boundary, and outputting information concerning the forecasted future feature value being outside the normalcy boundary for display.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 15, 2018
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA
  • Publication number: 20180316701
    Abstract: A system to protect a fleet of industrial assets may include a communication port to exchange information with a plurality of remote industrial assets. An industrial fleet protection system may receive information from the plurality of remote industrial assets or a cloud-based security platform and calculate, based on information received from multiple industrial assets, a current fleet-wide operation feature vector. The industrial fleet protection system may then compare the current fleet-wide operation feature vector with a fleet-wide decision boundary (e.g., separating normal from abnormal operation of the industrial fleet). The system may then automatically transmit a response (e.g., a cyber-attack threat alert or an adjustment to a decision boundary of an industrial asset) when a result of the comparison indicates abnormal operation of the industrial fleet.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 1, 2018
    Inventors: Daniel Francis HOLZHAUER, Masoud ABBASZADEH, Lalit Keshav MESTHA, Justin Varkey JOHN, Cody BUSHY
  • Publication number: 20180269687
    Abstract: The technology described herein is generally directed towards a distributed optimization technology for the control of aggregation of distributed flexibility resource nodes that operates iteratively until a commanded power profile is produced by aggregated loads. The technology uses a distributed iterative solution in which each node solves a local optimization problem with local constraints and states, while using a global Lagrange multiplier that is based upon information from each other node. The global Lagrange multiplier is determined at an aggregation level using load-specific information that is obtained in a condensed form (e.g., a scalar) from each node at each iteration. The global Lagrange multiplier is broadcasted to the nodes for each new iteration. The technology provides an iterative, distributed solution to the network optimization problem of power tracking of aggregated loads.
    Type: Application
    Filed: March 17, 2017
    Publication date: September 20, 2018
    Inventors: Reza Ghaemi, Masoud Abbaszadeh, Chaitanya Ashok Baone, Naresh Acharya
  • Publication number: 20180260561
    Abstract: According to some embodiments, a plurality of heterogeneous data source nodes may each generate a series of current data source node values over time that represent a current operation of an electric power grid. A real-time threat detection computer, coupled to the plurality of heterogeneous data source nodes, may receive the series of current data source node values and generate a set of current feature vectors. The threat detection computer may then access an abnormal state detection model having at least one decision boundary created offline using at least one of normal and abnormal feature vectors. The abnormal state detection model may be executed, and a threat alert signal may be transmitted if appropriate based on the set of current feature vectors and the at least one decision boundary.
    Type: Application
    Filed: March 8, 2017
    Publication date: September 13, 2018
    Inventors: Lalit Keshav MESTHA, Santosh Sambamoorthy VEDA, Masoud ABBASZADEH, Chaitanya Ashok BAONE, Weizhong YAN, Saikat RAY MAJUMDER, Sumit BOSE, Annartia GIANI, Olugbenga ANUBI
  • Publication number: 20180262525
    Abstract: According to some embodiments, a plurality of heterogeneous data source nodes may each generate a series of data source node values over time associated with operation of an electric power grid control system. An offline abnormal state detection model creation computer may receive the series of data source node values and perform a feature extraction process to generate an initial set of feature vectors. The model creation computer may then perform feature selection with a multi-model, multi-disciplinary framework to generate a selected feature vector subset. According to some embodiments, feature dimensionality reduction may also be performed to generate the selected feature subset. At least one decision boundary may be automatically calculated and output for an abnormal state detection model based on the selected feature vector subset.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 13, 2018
    Inventors: Weizhong YAN, Masoud ABBASZADEH, Lalit Keshav MESTHA
  • Publication number: 20180255091
    Abstract: The example embodiments are directed to a system and method for neutralizing abnormal signals in a cyber-physical system. In one example, the method includes receiving input signals comprising time series data associated with an asset and transforming the input signals into feature values in a feature space, detecting one or more abnormal feature values in the feature space based on a predetermined normalcy boundary associated with the asset, and determining an estimated true value for each abnormal feature value, and performing an inverse transform of each estimated true value to generate neutralized signals comprising time series data and outputting the neutralized signals.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 6, 2018
    Inventors: Lalit Keshav MESTHA, Olugbenga ANUBI, Masoud ABBASZADEH
  • Publication number: 20180191758
    Abstract: According to some embodiments, a threat detection model creation computer may receive a series of monitoring node values (representing normal and/or threatened operation of the industrial asset control system) and generate a set of normal feature vectors. The threat detection model creation computer may identify a first cluster and a second cluster in the set of feature vectors. The threat detection model creation computer may then automatically determine a plurality of cluster-based decision boundaries for a threat detection model. For example, a first potential cluster-based decision boundary for the threat detection model may be automatically calculated based on the first cluster in the set of feature vectors. Similarly, the threat detection model creation computer may also automatically calculate a second potential cluster-based decision boundary for the threat detection model based on the second cluster in the set of feature vectors.
    Type: Application
    Filed: January 3, 2017
    Publication date: July 5, 2018
    Inventors: Masoud ABBASZADEH, Cody Joe BUSHEY, Lalit Keshav MESTHA, Daniel Francis HOLZHAUER
  • Publication number: 20180157831
    Abstract: According to some embodiments, a threat detection computer platform may receive a plurality of real-time monitoring node signal values over time that represent a current operation of the industrial asset. For each stream of monitoring node signal values, the platform may generate a current monitoring node feature vector. The feature vector may also be estimated using a dynamic model output with that monitoring node signal values. The platform may then compare the feature vector with a corresponding decision boundary for that monitoring node, the decision boundary separating a normal state from an abnormal state for that monitoring node. The platform may detect that a particular monitoring node has passed the corresponding decision boundary and classify that particular monitoring node as being under attack. The platform may then automatically determine if the attack on that particular monitoring node is an independent attack or a dependent attack.
    Type: Application
    Filed: April 4, 2017
    Publication date: June 7, 2018
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA, Cody BUSHEY, Daniel Francis HOLZHAUER
  • Publication number: 20180159877
    Abstract: According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Daniel Francis HOLZHAUER, Cody Joe BUSHEY, Lalit Keshav MESTHA, Masoud ABBASZADEH, Justin Varkey JOHN
  • Publication number: 20180157771
    Abstract: An augmented system model may include a system high fidelity model that generates a first output. The augmented system model may further include a data driven model to receive data associated with the first output and to generate a second output, and a feature space version of the second output may be output from the augmented system model. Monitoring nodes may each generate a series of current monitoring node values over time representing current operation of an industrial asset. A model adaptation element may receive the current monitoring node values, calculate a feature space version of current operation, and compare the feature space version of the second output of the augmented system model with the feature space version of current operation. Parameters of the data driven model may then be adapted based on a result of the comparison.
    Type: Application
    Filed: April 19, 2017
    Publication date: June 7, 2018
    Inventors: Lalit Keshav MESTHA, Masoud ABBASZADEH, Cody BUSHEY