New Tools To Detect Cyber Attacks

Digital systems have become critical in all areas of economic activity and Internet connectivity and an uninterrupted flow of information now underpin many businesses and the day-to-day functioning of societies.

Unfortunately, cyber crime has grown at the same rate and is consistent with technology change and development. 

Ransomware and malware, as well as cyber attacks, are a real threat to the systems of governments and local authorities, and the number of warnings regarding various attacks has increased in recent years. “Criminals are increasingly moving online because that is where the money is...  Cybertheft is becoming the fastest-growing crime in the world.” says Professor Kevin Curran of the Institute of Electrical and Electronics Engineers (IEEE) and professor of cybersecurity at Ulster University. 

In Canada, the University of Waterloo have teamed up with Palitronica  and the Federal Government to develop a solution to protect government IT infrastructure.

In an effort to guard against cyber attacks and security leaks, researchers at the University of Waterloo have created new technology that monitors increased energy consumption, which will help protect governments, businesses and other organisations. Artificial intelligence (AI) software enables the technology to collect information with the assistance of hardware, so as to determine whether the use of electricity in the system conforms to known and expected patterns. “If suddenly, for instance, several machines exhibit a similar pattern of high-power usage in specific patterns, we would raise an alert that there might be spreading crypto-ransomware in the network,” said Sebastian Fischmeister, Professor of Computer Science  at the University of Waterloo.

Palitronica are now testing the technology, which is designed to complement, not replace, existing security controls such as network intrusion detection in several Ontario municipalities, with a dozen more interested in participating. 

When exceptional metrics are compiled, the artificial intelligence system sends an alert to the security officer in the organisation, warning that the organisation’s infrastructure could be under attack by hackers or software attempting to steal or lock precious data. In addition, when multiple machines show signs of increased power usage at the same time and in similar patterns, the suspicion increases that there might be crypto-ransomware distributed on the network.

A number of organisations in Ontario are taking part in testing the new technology, which is designed to complement existing control systems, such as network intrusion detection, and, eventually, will provide greater security for power-based systems.

In the last six years, the technology was developed in projects backed by several government agencies, including the Department of National Defence (DND), and industry partners in defence and critical infrastructure. “The ability, speed and accuracy of human triage activities of this unique Canadian technology show great promise to efficiently increase the safety and security of our Canadian Armed Forces,” said Eric Fournier, Director General Defence & Security at the DND.

University of Waterloo:     UTICA  University:     RAND:     I-HLS:     Economist:     Telegraph:  

You Might Also Read:

Process Sensor Cyber Security Is A Vital Issue:
 

« Twitter Joins Ukraine’s War Effort
AI Is The Future Of Defensive Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.