New Tools To Detect Cyber Attacks

Digital systems have become critical in all areas of economic activity and Internet connectivity and an uninterrupted flow of information now underpin many businesses and the day-to-day functioning of societies.

Unfortunately, cyber crime has grown at the same rate and is consistent with technology change and development. 

Ransomware and malware, as well as cyber attacks, are a real threat to the systems of governments and local authorities, and the number of warnings regarding various attacks has increased in recent years. “Criminals are increasingly moving online because that is where the money is...  Cybertheft is becoming the fastest-growing crime in the world.” says Professor Kevin Curran of the Institute of Electrical and Electronics Engineers (IEEE) and professor of cybersecurity at Ulster University. 

In Canada, the University of Waterloo have teamed up with Palitronica  and the Federal Government to develop a solution to protect government IT infrastructure.

In an effort to guard against cyber attacks and security leaks, researchers at the University of Waterloo have created new technology that monitors increased energy consumption, which will help protect governments, businesses and other organisations. Artificial intelligence (AI) software enables the technology to collect information with the assistance of hardware, so as to determine whether the use of electricity in the system conforms to known and expected patterns. “If suddenly, for instance, several machines exhibit a similar pattern of high-power usage in specific patterns, we would raise an alert that there might be spreading crypto-ransomware in the network,” said Sebastian Fischmeister, Professor of Computer Science  at the University of Waterloo.

Palitronica are now testing the technology, which is designed to complement, not replace, existing security controls such as network intrusion detection in several Ontario municipalities, with a dozen more interested in participating. 

When exceptional metrics are compiled, the artificial intelligence system sends an alert to the security officer in the organisation, warning that the organisation’s infrastructure could be under attack by hackers or software attempting to steal or lock precious data. In addition, when multiple machines show signs of increased power usage at the same time and in similar patterns, the suspicion increases that there might be crypto-ransomware distributed on the network.

A number of organisations in Ontario are taking part in testing the new technology, which is designed to complement existing control systems, such as network intrusion detection, and, eventually, will provide greater security for power-based systems.

In the last six years, the technology was developed in projects backed by several government agencies, including the Department of National Defence (DND), and industry partners in defence and critical infrastructure. “The ability, speed and accuracy of human triage activities of this unique Canadian technology show great promise to efficiently increase the safety and security of our Canadian Armed Forces,” said Eric Fournier, Director General Defence & Security at the DND.

University of Waterloo:     UTICA  University:     RAND:     I-HLS:     Economist:     Telegraph:  

You Might Also Read:

Process Sensor Cyber Security Is A Vital Issue:
 

« Twitter Joins Ukraine’s War Effort
AI Is The Future Of Defensive Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

National Cyber Security Centre (NCSC) - Switzerland

National Cyber Security Centre (NCSC) - Switzerland

The National Cyber Security Centre is Swizerland's competence centre for cybersecurity and the first contact point for businesses, public administrations, and the public for cyber issues.

Devel

Devel

Devel is a LATAM cybersecurity company specialized in providing red, blue and purple team services for the financial sector.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).