Artificial Intelligence Monitors Critical Infrastructure

Minimising threats to energy and utilities plants is essential to ensure the smooth running of the critical infrastructure that powers our lives. Traditional detection techniques are inefficient when dealing with huge amounts of data because their analysis processes are complex and time-consuming.

Critical infrastructure, including electricity, oil, gas, and water supply systems, as well as transportation hubs, are under constant threat of cyber attack by threat actors. Some of these attacks are motivated by nations states to diminish opponents for strategic reasons. Others are launched for ransom, as in the case of the recent cyber attack on the Colonial Pipeline

Today, technology based on Artificial Intelligence (AI) and computer vision is helping monitor critical infrastructure. 

These tools support the analysis and storage of data in intrusion detection systems, as well as reduce processing and training time and AI and video surveillance is being being increasingly adopted to monitor critical national infrastructure facilities.

FirstEnergy Corp is a US electric utility based in Ohio that has recently  completed a pilot program demonstrating how computer vision can be deployed to analyse thousands of utility pole infrastructure images. The company worked together with Noteworthy AI to instal smart cameras in its utility truck fleet, with software powered by edge AI chips by Nvidia. The platform provides geolocation for each pole in the widespread utility pole network before visually picking out the presence of components like insulators and current transformers. The computer vision software can then gauge whether it is physically damaged.

According to Nvidia, manual maintenance workers inspect a fraction of the 185 million utility poles in the US in a single year. It would take an entire decade for them to inspect all of them. In a pilot test, the AI technology collected more than 5,000 high-resolution images of its poles within 30 days, which expanded its database by more than fivefold. 

Superior image quality is also anticipated to help avoid wasted visits by engineers to locations where the actual line conditions differ from initial expectations.

Since completing the initial test, FirstEnergy focused on streetlights joined the program along with a unit that tracks vegetation growth around the company’s power infrastructure. The smart camera module attaches to the truck with magnets or suction cups and links to a smaller unit inside the truck’s cab that processes the images.

The integration of AI methods into the cyber security domain can increase the accuracy in the detection of true positive instances reducing the load of incidents the security managers receive, allowing them to focus on strategic aspects of cyber security. 

The next steps to be taken to create the new generation cyber security for critical infrastructure include training the AI algorithms right data, testing the algorithms for bias, and ensuring the robustness of the system.

Calipsa:       IoT World Today:      ResearchGate:      I-HLS:      GlobeNewswire:      SPEAR Project

You Might Also Read: 

Cyber Security Standards For Critical Infrastructure:

 

« NSO Spyware Used To Hack Political Leaders In Poland
The Cyber Security Risks Of Outsourcing »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

Innotec Security

Innotec Security

Innotec Security is a Spanish company specializing in cybersecurity-as-a-service, cyber resilience and cyber risk management.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Pipeline Security

Pipeline Security

Pipeline is a leader in cybersecurity, offering comprehensive services to protect organizations from evolving threats.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.

ZeroThreat

ZeroThreat

ZeroThreat, a vulnerability scanning and automated pentesting tool, accelerates vulnerability detection 5x faster with unprecedented accuracy and efficiency in real-time.