Advanced AI For Cyber Operations

The cyber security landscape is evolving at breakneck speed. With threat levels, the amounts of data being stored and computer power and speeds all significantly increasing. Added to this, the diversity of Internet and network-connected technologies are following an even faster curve. There are some hard truths that many organisations ignore at their own peril.

Most security departments will acknowledge that their resources are already spread too thinly. Now there is an expectation to do much more with even less. Could AI be the answer to extending the value and efficacy of cyber security?

Now the US Defense Advanced Research Projects Agency (DARPA), in conjunction with the Pentagon’s Joint Artificial Intelligence Center (JAIC), are setting their sights on the rapidly expanding intersection of Artificial Intelligence (AI) and cyber security and cyber warfare operations. Development of AI tools and applications for use in the cyber realm is one of several focus areas that DARPA plans to delve further into, as part of the agency’s long-term strategy.

One of the agency’s flagship efforts, the Harnessing Autonomy for Countering Cyber Adversary Systems (HACCS) programme, is making strides in integrating AI-enhanced technologies into cyber operations.

The overall goal of the HACCS programme is the development of “autonomous software agents” capable of countering targeted network attacks by botnet implants, as well as large-scale malware campaigns, according to an agency fact sheet. 
These HACCS software agents “will develop the techniques and algorithms necessary to measure the accuracy of identifying botnet-infected networks, the accuracy of identifying the type of devices residing in a network, and the stability of potential access vectors,” it said.

DARPA is investing more than $2 billion in new and existing programs called the “AI Next” campaign. Key areas of the campaign include automating critical DoD business processes, such as security clearance vetting or accrediting software systems for operational deployment; improving the robustness and reliability of AI systems. 

This means enhancing the security and resiliency of machine learning and AI technologies; reducing power, data, and performance inefficiencies; and pioneering the next generation of AI algorithms and applications, such as “explainability” and common sense reasoning.

 DARPA says AI technologies have demonstrated great value to missions as diverse as space-based imagery analysis, cyberattack warning, supply chain logistics and analysis of microbiologic systems. At the same time, the failure modes of AI technologies are poorly understood. DARPA is working to address this shortfall, with focused R&D, both analytic and empirical. DARPA’s success is essential for the Department to deploy AI technologies, particularly to the tactical edge, where reliable performance is required.

The most powerful AI tool today is machine learning (ML). ML systems can be easily duped by changes to inputs that would never fool a human. 

The data used to train such systems can be corrupted. And, the software itself is vulnerable to cyber-attack. These areas, and more, must be addressed at scale as more AI-enabled systems are operationally deployed.DARPA research aims to enable AI systems to explain their actions, and to acquire and reason with common sense knowledge. The irony of artificial intelligence is how much human brainpower is required to build it. 

DARPA is now creating the next wave of AI technologies that will enable the United States to maintain its technological edge in this critical area.

Recently the University of Texas at Dallas (UT Dallas) researchers received a grant from DARPA to simulate dynamic and unexpected events that can be used to train AI systems, computer systems that emulate human cognition, to adapt to the unpredictable. UT Dallasuse Polycraft World to a modification of the video game Minecraft, was developed by researchers to teach chemistry and engineering. Now the game that allows players to build virtual worlds is serving as the foundation for federal research to develop smarter artificial intelligence (AI) technology. The simulated scenarios could include changing weather or unfamiliar terrain. In response to the COVID-19 pandemic, researchers have added the threat of an infectious disease outbreak.

AI security technologies still require the human component – but the transition is moving security professional activities away from extensive manual checking and configuration into roles of oversight and strategy. The biggest problem in the future is likely to be how to prevent hackers from using variations of the same AI capabilities to perform intrusions and exploits.

DARPA:          Federal News Network:         Janes:         Infosecurity Magazine:     Universtity of Texas:

You Might Also Read:

DARPA To Test Infrastructure Resilience:

 

« Cyber Security Technology Sponsors Formula 1
Cyber Crime Is Growing Very Fast Due To Coronavirus »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

QPoint Technologies

QPoint Technologies

QPoint provides solutions and consulting in areas including software engineering, testing, cybersecurity, ICT, web, mobile, project management, and complex integration processes.

Blue Goat Cyber

Blue Goat Cyber

Blue Goat stands at the forefront of cybersecurity, particularly in medical device security and penetration testing.

CallCabinet

CallCabinet

CallCabinet is the premier cross-platform SaaS provider for end-to-end compliant call recording, AI-driven conversation analytics, call QA, and custom business intelligence reporting.