New Tools To Detect Cyber Attacks

Digital systems have become critical in all areas of economic activity and Internet connectivity and an uninterrupted flow of information now underpin many businesses and the day-to-day functioning of societies.

Unfortunately, cyber crime has grown at the same rate and is consistent with technology change and development. 

Ransomware and malware, as well as cyber attacks, are a real threat to the systems of governments and local authorities, and the number of warnings regarding various attacks has increased in recent years. “Criminals are increasingly moving online because that is where the money is...  Cybertheft is becoming the fastest-growing crime in the world.” says Professor Kevin Curran of the Institute of Electrical and Electronics Engineers (IEEE) and professor of cybersecurity at Ulster University. 

In Canada, the University of Waterloo have teamed up with Palitronica  and the Federal Government to develop a solution to protect government IT infrastructure.

In an effort to guard against cyber attacks and security leaks, researchers at the University of Waterloo have created new technology that monitors increased energy consumption, which will help protect governments, businesses and other organisations. Artificial intelligence (AI) software enables the technology to collect information with the assistance of hardware, so as to determine whether the use of electricity in the system conforms to known and expected patterns. “If suddenly, for instance, several machines exhibit a similar pattern of high-power usage in specific patterns, we would raise an alert that there might be spreading crypto-ransomware in the network,” said Sebastian Fischmeister, Professor of Computer Science  at the University of Waterloo.

Palitronica are now testing the technology, which is designed to complement, not replace, existing security controls such as network intrusion detection in several Ontario municipalities, with a dozen more interested in participating. 

When exceptional metrics are compiled, the artificial intelligence system sends an alert to the security officer in the organisation, warning that the organisation’s infrastructure could be under attack by hackers or software attempting to steal or lock precious data. In addition, when multiple machines show signs of increased power usage at the same time and in similar patterns, the suspicion increases that there might be crypto-ransomware distributed on the network.

A number of organisations in Ontario are taking part in testing the new technology, which is designed to complement existing control systems, such as network intrusion detection, and, eventually, will provide greater security for power-based systems.

In the last six years, the technology was developed in projects backed by several government agencies, including the Department of National Defence (DND), and industry partners in defence and critical infrastructure. “The ability, speed and accuracy of human triage activities of this unique Canadian technology show great promise to efficiently increase the safety and security of our Canadian Armed Forces,” said Eric Fournier, Director General Defence & Security at the DND.

University of Waterloo:     UTICA  University:     RAND:     I-HLS:     Economist:     Telegraph:  

You Might Also Read:

Process Sensor Cyber Security Is A Vital Issue:
 

« Twitter Joins Ukraine’s War Effort
AI Is The Future Of Defensive Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.