New Tools To Detect Cyber Attacks

Digital systems have become critical in all areas of economic activity and Internet connectivity and an uninterrupted flow of information now underpin many businesses and the day-to-day functioning of societies.

Unfortunately, cyber crime has grown at the same rate and is consistent with technology change and development. 

Ransomware and malware, as well as cyber attacks, are a real threat to the systems of governments and local authorities, and the number of warnings regarding various attacks has increased in recent years. “Criminals are increasingly moving online because that is where the money is...  Cybertheft is becoming the fastest-growing crime in the world.” says Professor Kevin Curran of the Institute of Electrical and Electronics Engineers (IEEE) and professor of cybersecurity at Ulster University. 

In Canada, the University of Waterloo have teamed up with Palitronica  and the Federal Government to develop a solution to protect government IT infrastructure.

In an effort to guard against cyber attacks and security leaks, researchers at the University of Waterloo have created new technology that monitors increased energy consumption, which will help protect governments, businesses and other organisations. Artificial intelligence (AI) software enables the technology to collect information with the assistance of hardware, so as to determine whether the use of electricity in the system conforms to known and expected patterns. “If suddenly, for instance, several machines exhibit a similar pattern of high-power usage in specific patterns, we would raise an alert that there might be spreading crypto-ransomware in the network,” said Sebastian Fischmeister, Professor of Computer Science  at the University of Waterloo.

Palitronica are now testing the technology, which is designed to complement, not replace, existing security controls such as network intrusion detection in several Ontario municipalities, with a dozen more interested in participating. 

When exceptional metrics are compiled, the artificial intelligence system sends an alert to the security officer in the organisation, warning that the organisation’s infrastructure could be under attack by hackers or software attempting to steal or lock precious data. In addition, when multiple machines show signs of increased power usage at the same time and in similar patterns, the suspicion increases that there might be crypto-ransomware distributed on the network.

A number of organisations in Ontario are taking part in testing the new technology, which is designed to complement existing control systems, such as network intrusion detection, and, eventually, will provide greater security for power-based systems.

In the last six years, the technology was developed in projects backed by several government agencies, including the Department of National Defence (DND), and industry partners in defence and critical infrastructure. “The ability, speed and accuracy of human triage activities of this unique Canadian technology show great promise to efficiently increase the safety and security of our Canadian Armed Forces,” said Eric Fournier, Director General Defence & Security at the DND.

University of Waterloo:     UTICA  University:     RAND:     I-HLS:     Economist:     Telegraph:  

You Might Also Read:

Process Sensor Cyber Security Is A Vital Issue:
 

« Twitter Joins Ukraine’s War Effort
AI Is The Future Of Defensive Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Allianz

Allianz

Allianz Cyber Protect is a comprehensive cyber insurance provided internationally and tailored to your company´s risk profile.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

TUV Rheinland OpenSky

TUV Rheinland OpenSky

TUV Rheinland OpenSky offers one of the most advanced and integrated portfolio of security solutions and services for connected devices, platforms and IoT.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.