April 1, 2026

Power Defense: energy-based cybersecurity

Power Defense

Energy-based cybersecurity

Ciberseguridad basada en patrones energéticos

No agents · No excuses

I’ve been obsessed with an idea for months that initially sounded far-fetched: what if the energy patterns of IT infrastructure could reveal a cyberattack before any log, any SIEM, or any agent?

Yesterday I posted on LinkedIn asking people to call me crazy. But today I’m explaining it in detail.

It all started with an intuition

At ZeroNet, we monitor IT infrastructure. We collect energy, performance, and behavioral data from hundreds of devices in real time. One day, while analyzing a client’s data, I noticed something odd: an energy pattern that didn’t match what should have been happening on that network at that hour.

It wasn’t a massive power spike, it was something subtler: a change in the shape of the curve, a different frequency, a behavior that didn’t fit the device’s usual profile.

What if this isn’t a glitch? What if it’s a signal?

Energy as a silent witness

Every device on a network — servers, switches, APs, firewalls — has a predictable energy pattern. It follows usage cycles: more activity during business hours, less at night, spikes at specific moments.

But when something anomalous happens, the pattern breaks.

An unauthorized crypto-mining process alters the CPU profile and with it the entire energy behavior of the device. A data exfiltration attack generates unusual traffic reflected in network interfaces. A port scan or lateral movement wakes up components that should be at rest.

⚡ An attacker can delete logs, encrypt traffic, disable agents. But they cannot hide the energy pattern of what they’re doing. Physics can’t be hacked.

Why traditional approaches leave blind spots

Current cybersecurity relies heavily on three pillars:

  • 🛡️ Endpoint agents (EDR/XDR): require installation on every device, ongoing maintenance, and don’t cover IoT, OT, or pure network infrastructure.
  • 📡 Traffic analysis (NDR): requires TAPs, port mirrors, complex configurations, and can be bypassed with encryption.
  • 📋 SIEM/Logs: depend on devices generating logs correctly, proper configuration, and someone reviewing them.

All these solutions are valuable, but they all require intrusion, complexity, and cost, and they still leave gaps.

Power Defense doesn’t come to replace any of them, but to cover what they can’t see.

How Power Defense works

ZeroNet’s advantage is that we’re already there. We already monitor the infrastructure, already collect energy and performance data through manufacturer APIs (Cisco Meraki, HPE Aruba, Fortinet…), without agents or additional hardware.

What we’ve added is an intelligence layer on top of that data:

  • 📊 1. Baseline: We establish normal energy behavior for each device, not just how much, but how: curves, frequencies, correlations.
  • 🔍 2. Detection: We identify when the pattern deviates from expected: anomalies in shape, metric correlations, and timing.
  • 🔔 3. Correlation: We cross-reference anomalies with other indicators to generate actionable alerts, not noise.

What types of threats we detect

🔴 Unauthorized crypto-mining

An employee installs a miner on a development server. The CPU goes from 15% to 95% sustained. The device’s energy pattern changes completely. Power Defense detects it in minutes, not weeks later when the electricity bill arrives.

🟠 Lateral movement

An attacker compromises a workstation and starts scanning the network. Each connection attempt generates activity. Power Defense sees a station that “wakes up” outside hours with a pattern that doesn’t match any legitimate use.

🟡 Data exfiltration

Massive data transmission from a server generates a detectable change in network interface patterns. If it happens at 2:00 AM on a Sunday, Power Defense raises the alert before the SIEM has logs to process.

⚪ Compromised ioT/OT devices

A sensor or IoT device starts behaving anomalously. It has no agent installed, doesn’t generate useful logs. But its energy pattern has changed. Power Defense sees it.

Power Defense vs. traditional solutions

Power DefenseTraditional solutions
Agent installation❌ Not needed✅ Required per endpoint
IoT/OT coverage✅ Full⚠️ Partial or none
Encryption evasion✅ Impossible (energy can’t be encrypted)⚠️ Vulnerable
Deployment cost✅ Included in ZeroNet⚠️ High (licenses + hardware)
Blind spot detection✅ Additional layer⚠️ Depends on stack

From “call me crazy” to “this works”

When I first brought up this idea with the team, there was skepticism. Fair enough. It sounds odd to say you can detect a cyberattack by looking at energy patterns.

But the data proved us right. And yesterday, in a meeting with a client, seeing their face when they understood the concept, and even more when they saw it already working, confirmed we’re on the right path.

Power Defense isn’t the future, it’s already here, and it’s just the beginning.


Want to learn more?

Reach out at zeronetit.com

← Back to blog