New Tools To Detect Cyber Attacks

Digital systems have become critical in all areas of economic activity and Internet connectivity and an uninterrupted flow of information now underpin many businesses and the day-to-day functioning of societies.

Unfortunately, cyber crime has grown at the same rate and is consistent with technology change and development. 

Ransomware and malware, as well as cyber attacks, are a real threat to the systems of governments and local authorities, and the number of warnings regarding various attacks has increased in recent years. “Criminals are increasingly moving online because that is where the money is...  Cybertheft is becoming the fastest-growing crime in the world.” says Professor Kevin Curran of the Institute of Electrical and Electronics Engineers (IEEE) and professor of cybersecurity at Ulster University. 

In Canada, the University of Waterloo have teamed up with Palitronica  and the Federal Government to develop a solution to protect government IT infrastructure.

In an effort to guard against cyber attacks and security leaks, researchers at the University of Waterloo have created new technology that monitors increased energy consumption, which will help protect governments, businesses and other organisations. Artificial intelligence (AI) software enables the technology to collect information with the assistance of hardware, so as to determine whether the use of electricity in the system conforms to known and expected patterns. “If suddenly, for instance, several machines exhibit a similar pattern of high-power usage in specific patterns, we would raise an alert that there might be spreading crypto-ransomware in the network,” said Sebastian Fischmeister, Professor of Computer Science  at the University of Waterloo.

Palitronica are now testing the technology, which is designed to complement, not replace, existing security controls such as network intrusion detection in several Ontario municipalities, with a dozen more interested in participating. 

When exceptional metrics are compiled, the artificial intelligence system sends an alert to the security officer in the organisation, warning that the organisation’s infrastructure could be under attack by hackers or software attempting to steal or lock precious data. In addition, when multiple machines show signs of increased power usage at the same time and in similar patterns, the suspicion increases that there might be crypto-ransomware distributed on the network.

A number of organisations in Ontario are taking part in testing the new technology, which is designed to complement existing control systems, such as network intrusion detection, and, eventually, will provide greater security for power-based systems.

In the last six years, the technology was developed in projects backed by several government agencies, including the Department of National Defence (DND), and industry partners in defence and critical infrastructure. “The ability, speed and accuracy of human triage activities of this unique Canadian technology show great promise to efficiently increase the safety and security of our Canadian Armed Forces,” said Eric Fournier, Director General Defence & Security at the DND.

University of Waterloo:     UTICA  University:     RAND:     I-HLS:     Economist:     Telegraph:  

You Might Also Read:

Process Sensor Cyber Security Is A Vital Issue:
 

« Twitter Joins Ukraine’s War Effort
AI Is The Future Of Defensive Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Thoma Bravo

Thoma Bravo

Thoma Bravo is a leading private equity firm with a 40+ year history and a focus on investing in software and technology companies.

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.