Artificial Intelligence Monitors Critical Infrastructure

Minimising threats to energy and utilities plants is essential to ensure the smooth running of the critical infrastructure that powers our lives. Traditional detection techniques are inefficient when dealing with huge amounts of data because their analysis processes are complex and time-consuming.

Critical infrastructure, including electricity, oil, gas, and water supply systems, as well as transportation hubs, are under constant threat of cyber attack by threat actors. Some of these attacks are motivated by nations states to diminish opponents for strategic reasons. Others are launched for ransom, as in the case of the recent cyber attack on the Colonial Pipeline

Today, technology based on Artificial Intelligence (AI) and computer vision is helping monitor critical infrastructure. 

These tools support the analysis and storage of data in intrusion detection systems, as well as reduce processing and training time and AI and video surveillance is being being increasingly adopted to monitor critical national infrastructure facilities.

FirstEnergy Corp is a US electric utility based in Ohio that has recently  completed a pilot program demonstrating how computer vision can be deployed to analyse thousands of utility pole infrastructure images. The company worked together with Noteworthy AI to instal smart cameras in its utility truck fleet, with software powered by edge AI chips by Nvidia. The platform provides geolocation for each pole in the widespread utility pole network before visually picking out the presence of components like insulators and current transformers. The computer vision software can then gauge whether it is physically damaged.

According to Nvidia, manual maintenance workers inspect a fraction of the 185 million utility poles in the US in a single year. It would take an entire decade for them to inspect all of them. In a pilot test, the AI technology collected more than 5,000 high-resolution images of its poles within 30 days, which expanded its database by more than fivefold. 

Superior image quality is also anticipated to help avoid wasted visits by engineers to locations where the actual line conditions differ from initial expectations.

Since completing the initial test, FirstEnergy focused on streetlights joined the program along with a unit that tracks vegetation growth around the company’s power infrastructure. The smart camera module attaches to the truck with magnets or suction cups and links to a smaller unit inside the truck’s cab that processes the images.

The integration of AI methods into the cyber security domain can increase the accuracy in the detection of true positive instances reducing the load of incidents the security managers receive, allowing them to focus on strategic aspects of cyber security. 

The next steps to be taken to create the new generation cyber security for critical infrastructure include training the AI algorithms right data, testing the algorithms for bias, and ensuring the robustness of the system.

Calipsa:       IoT World Today:      ResearchGate:      I-HLS:      GlobeNewswire:      SPEAR Project

You Might Also Read: 

Cyber Security Standards For Critical Infrastructure:

 

« NSO Spyware Used To Hack Political Leaders In Poland
The Cyber Security Risks Of Outsourcing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.