Artificial Intelligence Monitors Critical Infrastructure

Minimising threats to energy and utilities plants is essential to ensure the smooth running of the critical infrastructure that powers our lives. Traditional detection techniques are inefficient when dealing with huge amounts of data because their analysis processes are complex and time-consuming.

Critical infrastructure, including electricity, oil, gas, and water supply systems, as well as transportation hubs, are under constant threat of cyber attack by threat actors. Some of these attacks are motivated by nations states to diminish opponents for strategic reasons. Others are launched for ransom, as in the case of the recent cyber attack on the Colonial Pipeline

Today, technology based on Artificial Intelligence (AI) and computer vision is helping monitor critical infrastructure. 

These tools support the analysis and storage of data in intrusion detection systems, as well as reduce processing and training time and AI and video surveillance is being being increasingly adopted to monitor critical national infrastructure facilities.

FirstEnergy Corp is a US electric utility based in Ohio that has recently  completed a pilot program demonstrating how computer vision can be deployed to analyse thousands of utility pole infrastructure images. The company worked together with Noteworthy AI to instal smart cameras in its utility truck fleet, with software powered by edge AI chips by Nvidia. The platform provides geolocation for each pole in the widespread utility pole network before visually picking out the presence of components like insulators and current transformers. The computer vision software can then gauge whether it is physically damaged.

According to Nvidia, manual maintenance workers inspect a fraction of the 185 million utility poles in the US in a single year. It would take an entire decade for them to inspect all of them. In a pilot test, the AI technology collected more than 5,000 high-resolution images of its poles within 30 days, which expanded its database by more than fivefold. 

Superior image quality is also anticipated to help avoid wasted visits by engineers to locations where the actual line conditions differ from initial expectations.

Since completing the initial test, FirstEnergy focused on streetlights joined the program along with a unit that tracks vegetation growth around the company’s power infrastructure. The smart camera module attaches to the truck with magnets or suction cups and links to a smaller unit inside the truck’s cab that processes the images.

The integration of AI methods into the cyber security domain can increase the accuracy in the detection of true positive instances reducing the load of incidents the security managers receive, allowing them to focus on strategic aspects of cyber security. 

The next steps to be taken to create the new generation cyber security for critical infrastructure include training the AI algorithms right data, testing the algorithms for bias, and ensuring the robustness of the system.

Calipsa:       IoT World Today:      ResearchGate:      I-HLS:      GlobeNewswire:      SPEAR Project

You Might Also Read: 

Cyber Security Standards For Critical Infrastructure:

 

« NSO Spyware Used To Hack Political Leaders In Poland
The Cyber Security Risks Of Outsourcing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

CyberGreen Institute

CyberGreen Institute

The CyberGreen Institute is a global non-profit and collaborative organization conducting activities focused on helping to improve the health of the global Cyber Ecosystem.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.