The interplay of perimeter protection and artificial intelligence
9/25/2024 Industry news Perimeter Protection

The interplay of perimeter protection and artificial intelligence

Artificial intelligence optimizes perimeter protection by efficiently detecting threats. However, criminals are increasingly using AI to circumvent surveillance systems and carry out targeted attacks. An effective defence requires the combination of AI and human expertise.

Deep fake technologies disguise the face Deep fake manipulations pose a risk to perimeter protection

When AI becomes a danger: Attack scenarios on surveillance systems

 

In recent years, artificial intelligence (AI) has become one of the most important tools in the field of security technology. Especially in perimeter protection, where the aim is to monitor access points and prevent unauthorized intrusion, AI offers enormous advantages. It is able to efficiently analyse large amounts of data, identify threats in real time and minimize false alarms. This not only contributes to increased security, but also to the optimization of resources and costs.

 

AI-supported attacks: New threat scenarios

 

As promising as AI is, it also harbors new dangers – especially if criminals use the technology to their advantage. Security experts are therefore increasingly warning of new attack scenarios in which AI is misused to circumvent surveillance systems. Europol, for example, reports a growing use of deepfake technology and automated monitoring tools that help criminals discover security gaps or manipulate alarm systems.

One of the greatest dangers is the development of AI models that deliberately deceive surveillance cameras or other sensors. Attackers could use “adversarial examples” – specially developed objects or images that are deliberately misinterpreted by the AI. As a result, the AI could fail to recognize intruders or classify harmless objects as a threat. Such deception poses a significant threat to the integrity of security systems based on AI algorithms. Benjamin Körner, Architect & Engineering Manager at security company Axis Communications, also confirms: “By attacking an access control system, an attacker could use AI to gain unauthorized access to restricted areas. Another conceivable scenario would be the bypassing of security systems if AI is used to deceive or manipulate cameras or sensors so that attackers can penetrate the perimeter undetected.”

Would you like to delve deeper into the topic? At Perimeter Protection 2025 from 
January 14 to 16, 2025, you will have the opportunity to exchange ideas with industry experts.

AI as a tool for analysing information

 

In addition to deceiving surveillance systems, criminals also use AI to analyse vast amounts of information. This includes stolen or leaked data, which enables attackers to detect security vulnerabilities or identify valuable targets. This precise data analysis increases the likelihood of successful attacks and can lead to significant financial losses.

AI could also be used to carry out targeted phishing or spear phishing campaigns. The AI models develop customized messages that are specifically tailored to their victims and aim to trick security employees into disclosing sensitive information. Attackers could also use AI to analyse large amounts of surveillance data and identify recurring patterns – such as vulnerabilities in the security staff's watch cycles.

As Wilfried Joswig, Managing Director of the German Association for Security Technology, adds, the effectiveness of AI depends heavily on the accuracy and relevance of the data provided: “If I provide the AI with incorrect or irrelevant data, the AI's decision will only be wrong.” This weakness can be exploited by attackers, for example by manipulating the weather data to change the response behaviour of the sensors. This could make it possible to overcome the perimeter protection without being detected. Joswig cites GPS data from sensors as another example: “If these are changed, the security personnel may receive an alarm, but at a completely wrong location.”

 

Strategies for defending against AI-based attacks

 

In view of these threats, the question arises as to how companies and organizations can defend themselves against AI-based attacks. Benjamin Körner sees the solution in a holistic approach: “One option is to use AI systems themselves to detect and ward off attacks – AI enables the timely detection of an attack and thus the equally timely initiation of countermeasures.” According to Körner, continuous training of employees with awareness of AI-based threats is also necessary so that they can recognize suspicious activities and act accordingly. A consistent cyber defence strategy – including, for example, regular firmware updates to close known security gaps – comprises a combination of different activities to make the overall system as secure as possible.

Wilfried Joswig emphasizes that, in principle, no new strategies or technologies are required to defend against attacks from AI, but that the already known measures from IT security, physical security and organizational measures must be implemented together. Systematic hardening of security systems, as is already common practice in IT security, should therefore also be applied in the area of perimeter protection. “Unfortunately, this holistic approach is not pursued in many cases, as the project participants only focus on their expertise and the performance features of their products. However, the overall solution must always be considered and not just individual security aspects or measures,” says Joswig.

 

Combination of AI and human intelligence

 

Ultimately, the following also applies to AI-based attacks: the more complex the attack vectors, the more comprehensive the defence mechanisms need to be. Each additional element increases the complexity of a security measure and therefore places greater demands on technology, configuration and organization.

Defence against AI-based attacks therefore requires a combination of artificial and natural intelligence. Even if AI is capable of efficiently detecting and defending against threats, the experience and knowledge of security experts is irreplaceable. It remains a race between “good and evil” in which AI is just another tool – but the real challenge is to keep an eye on all aspects of security and develop a comprehensive defence strategy.

Author

Alexander Stark

Alexander Stark

Freelance journalist