Artificial Intelligence Monitors Critical Infrastructure

Minimising threats to energy and utilities plants is essential to ensure the smooth running of the critical infrastructure that powers our lives. Traditional detection techniques are inefficient when dealing with huge amounts of data because their analysis processes are complex and time-consuming.

Critical infrastructure, including electricity, oil, gas, and water supply systems, as well as transportation hubs, are under constant threat of cyber attack by threat actors. Some of these attacks are motivated by nations states to diminish opponents for strategic reasons. Others are launched for ransom, as in the case of the recent cyber attack on the Colonial Pipeline

Today, technology based on Artificial Intelligence (AI) and computer vision is helping monitor critical infrastructure. 

These tools support the analysis and storage of data in intrusion detection systems, as well as reduce processing and training time and AI and video surveillance is being being increasingly adopted to monitor critical national infrastructure facilities.

FirstEnergy Corp is a US electric utility based in Ohio that has recently  completed a pilot program demonstrating how computer vision can be deployed to analyse thousands of utility pole infrastructure images. The company worked together with Noteworthy AI to instal smart cameras in its utility truck fleet, with software powered by edge AI chips by Nvidia. The platform provides geolocation for each pole in the widespread utility pole network before visually picking out the presence of components like insulators and current transformers. The computer vision software can then gauge whether it is physically damaged.

According to Nvidia, manual maintenance workers inspect a fraction of the 185 million utility poles in the US in a single year. It would take an entire decade for them to inspect all of them. In a pilot test, the AI technology collected more than 5,000 high-resolution images of its poles within 30 days, which expanded its database by more than fivefold. 

Superior image quality is also anticipated to help avoid wasted visits by engineers to locations where the actual line conditions differ from initial expectations.

Since completing the initial test, FirstEnergy focused on streetlights joined the program along with a unit that tracks vegetation growth around the company’s power infrastructure. The smart camera module attaches to the truck with magnets or suction cups and links to a smaller unit inside the truck’s cab that processes the images.

The integration of AI methods into the cyber security domain can increase the accuracy in the detection of true positive instances reducing the load of incidents the security managers receive, allowing them to focus on strategic aspects of cyber security. 

The next steps to be taken to create the new generation cyber security for critical infrastructure include training the AI algorithms right data, testing the algorithms for bias, and ensuring the robustness of the system.

Calipsa:       IoT World Today:      ResearchGate:      I-HLS:      GlobeNewswire:      SPEAR Project

You Might Also Read: 

Cyber Security Standards For Critical Infrastructure:

 

« NSO Spyware Used To Hack Political Leaders In Poland
The Cyber Security Risks Of Outsourcing »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

SecuLution

SecuLution

SecuLution is an Antivirus product using Application Whitelisting which offers much more protection than Virus Scanners ever can.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Oxygen Technologies

Oxygen Technologies

Oxygen Technologies is a business systems strategy and integration company offering a variety of solutions to give our clients ways to work smarter not harder.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.