Making Cyber Attack Detection Easier With Artificial Intelligence

Organisations in all sectors are seriously concerned about cyber security threats. In 2021, businesses experienced 50% increase in weekly cyber attacks compared to 2020. Experts and researchers must constantly create new cybersecurity tools, techniques and practices. 

Ransomware and malware, often created by cyber attacks and they are a serious threat to the IT systems of governments, organisations and local authorities and these threats and attacks have recently significantly increased. 

Artificial intelligence (AI) is playing an increasingly important role in cyber security, enabling organisations to leverage the latest AI-based tools to better detect threats and protect their systems and data resources. 

AI software enables the technology to collect information with the assistance of hardware, to determine whether the use of electricity in the system conforms to known and expected patterns. Thanks to recent advances in both AI and Machine Learning this new approach focuses on monitoring and predicting malware behaviours.

This is vastly different than how most cyber security measures operate now.

  • Now, the Canadian University of Waterloo has developed a solution to enhance government IT infrastructure. The researchers at the University of Waterloo have created a technology that monitors increased energy consumption, which will help protect governments, businesses and other organisations. 
  • Also, scientists at Cardiff University in Wales have developed a new cyber security method capable of automatically detecting and stopping cyber attacks on laptops, computers, and smart devices in under a second.

When exceptional metrics are compiled, the artificial intelligence system sends an alert to the security officer in the organisation, warning that the organisation’s infrastructure could be under attack by hackers or software attempting to steal or lock precious data.

In addition, when multiple machines show signs of increased power usage at the same time and in similar patterns, the suspicion increases that there might be ransomware planted in the network. 

Currently undergoing extensive testing in Ontario, the Waterloo technology is designed to complement existing control systems like network intrusion detection and will provide greater security for power-based systems. 

CNBC:    I-HLS:     Computer Society / IEE:    Cyber Degrees:    StudyFinds

You Might Also Read:

AI Is The Future Of Defensive Cyber Security:

 

« Legacy Technology is Undermining How Business Responds To Ransomware
Network Security Recommendations Tailored To Your Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

National Cybersecurity Preparedness Consortium (NCPC)

National Cybersecurity Preparedness Consortium (NCPC)

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.