Artificial Intelligence Monitors Critical Infrastructure

Minimising threats to energy and utilities plants is essential to ensure the smooth running of the critical infrastructure that powers our lives. Traditional detection techniques are inefficient when dealing with huge amounts of data because their analysis processes are complex and time-consuming.

Critical infrastructure, including electricity, oil, gas, and water supply systems, as well as transportation hubs, are under constant threat of cyber attack by threat actors. Some of these attacks are motivated by nations states to diminish opponents for strategic reasons. Others are launched for ransom, as in the case of the recent cyber attack on the Colonial Pipeline

Today, technology based on Artificial Intelligence (AI) and computer vision is helping monitor critical infrastructure. 

These tools support the analysis and storage of data in intrusion detection systems, as well as reduce processing and training time and AI and video surveillance is being being increasingly adopted to monitor critical national infrastructure facilities.

FirstEnergy Corp is a US electric utility based in Ohio that has recently  completed a pilot program demonstrating how computer vision can be deployed to analyse thousands of utility pole infrastructure images. The company worked together with Noteworthy AI to instal smart cameras in its utility truck fleet, with software powered by edge AI chips by Nvidia. The platform provides geolocation for each pole in the widespread utility pole network before visually picking out the presence of components like insulators and current transformers. The computer vision software can then gauge whether it is physically damaged.

According to Nvidia, manual maintenance workers inspect a fraction of the 185 million utility poles in the US in a single year. It would take an entire decade for them to inspect all of them. In a pilot test, the AI technology collected more than 5,000 high-resolution images of its poles within 30 days, which expanded its database by more than fivefold. 

Superior image quality is also anticipated to help avoid wasted visits by engineers to locations where the actual line conditions differ from initial expectations.

Since completing the initial test, FirstEnergy focused on streetlights joined the program along with a unit that tracks vegetation growth around the company’s power infrastructure. The smart camera module attaches to the truck with magnets or suction cups and links to a smaller unit inside the truck’s cab that processes the images.

The integration of AI methods into the cyber security domain can increase the accuracy in the detection of true positive instances reducing the load of incidents the security managers receive, allowing them to focus on strategic aspects of cyber security. 

The next steps to be taken to create the new generation cyber security for critical infrastructure include training the AI algorithms right data, testing the algorithms for bias, and ensuring the robustness of the system.

Calipsa:       IoT World Today:      ResearchGate:      I-HLS:      GlobeNewswire:      SPEAR Project

You Might Also Read: 

Cyber Security Standards For Critical Infrastructure:

 

« NSO Spyware Used To Hack Political Leaders In Poland
The Cyber Security Risks Of Outsourcing »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.