AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI is helping Darktrace fight the good fight against the bad guys in the cyber world, but AI cyber security does it by understanding networks; it doesn’t need to look for a viruses signature, then again, cyber criminals are adopting AI too, or so according to Darktrace’s Max Heinemeyer.

There is a shortage of talent, and personalisation in the new mantra. Everyone who works in tech knows this. But it is not just a problem for legitimate business, it is a problem for cyber criminals too, how do they address the staff shortage?

You may not have too much sympathy for them, but they can relax, take it easy, for they have a friend in AI for cyber. And that makes them formidable indeed.

“Cyber-crime is a perfect market,” says Max Heinemeyer, Director of Threat Hunting at Darktrace.  He explained: “Whatever works, if phishing works, they go for it. If ransomware works, they go for it. If crypto currency works, they go for it. Whatever makes the big bucks, they go for it.”

It also turns out that thanks to AI, cyber-crime is really good at personalising; so if you are a CEO, then ransomware might work quite well for the cybercriminal, stealing data from your machine might be lucrative too, but putting a bitcoin mining tool on your machine is a wasted opportunity. 

But if there is a server used only occasionally for development work, and then it just sits around collecting dust, processing very little, then installing a bitcoin miner, might be a very good enterprise for the cybercriminal. And AI can help the recruiting-challenged cybercriminal achieve this.

Max should know, he used to be an ethical hacker, a penetration tester, and an also ex-member of the Chaos Computer Club he knows a thing or two about what cyber criminals are up to and, he, along with his team of 30 odd people scattered around the world, hunt down cyber threats. But how can they do it? 

The cyber world is vast, you can count the numbers of experts in Max’s team without having to draw breath. The answer: AI, or AI for cyber. That’s what Darktrace is good at.

The company was founded five years ago, that may seem recent to any reader who left school before the iPhone was launched, but in the world of AI, that is positively ancient history. Max has been with the company for three years, making him a veteran. 

When he joined he was employee number 120, now there are almost a thousand employees. And the company, which recently completed its latest funding round, this time rustling up $50 million, has a valuation of $1.6 billion. It’s technology has been deployed in over 7,000 networks, R&D is headquarter in HQ Cambridge but the company has offices in over 33 countries, with a dual HQ in the UK and in San Francisco.

The company was founded by three very different types: ex spooks, boffins and the money. Max put it this way: “Ex intelligence people, from GCHQ, and MI5 and other agencies trying to focus on cybercrime, catching hackers, concluded that they needed to change the legacy approach to cyber security. 

“So instead of looking for signatures and rules, which clearly does not scale, while at the same time there was a huge skill gap, they looked for another way. The spooks realised they needed to change something, so they approached Cambridge Mathematicians, working in AI and Machine Learning, and asked ‘can we work together?’ Investors then completed the three-way convergence, so that the company could have the sales force and marketing it needed.”

“You can never anticipate tomorrow,” says Max Heinemeyer “so you need an army of people keeping up to date with signature and rules.”

So how does it work?

“We use what we call the enterprise immune system; a very simple analogy which underlines how Darktrace works, relates to understanding cells, instead of looking for what bad looks like, it understands networks, it understands the information age. Drax, the company behind the massive power station was one if its first customers. And working in that way, Darktrace earned its spurs. And it works by spotting a deviation, as soon as a deviation occurs and attacks, entering a network, it can spot the deviation in behaviour.

So, for example, it may know that a certain individual logs in between 7am and 9am every morning, and goes to Facebook and Instagram, and uses HTPS encryption. Darktrace understand all of this; but if a lot of data is then sent by this individual to an usual website, or it starts making connections to weird servers in in say Germany, US, China, Russia or Japan, Darktrace will highlight that.

Diversity may be part of Darktrace’s success. Its founder, Poppy Gustafsson and CEO Nicole Eagan, are both female. In Max’s team, the split is 40% women 60% men.

Puppet masters for the internet

“It’s not the kid working in their parent’s basement anymore, if we think about the most sophisticated human attacks, they try to blend as stealthily as possible. These subtle-nation driven attacks are sophisticated, the people behind them know what they are doing. They are like puppet masters for the internet.”

Max says that they “live off the land”, they don’t operate from a server in say Russia, but from the cloud. They stay very low and move around very stealthily.

And from this, he makes a prediction. The AI driven tools cannot make judgement calls as they are automated. We believe that AI driven malware will start understanding context.

“The most the advanced attackers, sit there, they listen, they see what you are doing, they understand ‘oh, this person doesn’t talk to finance very often so I will move around to say Amy’s computer. And Malware can learn to do the same. Narrow AI, like Darktrace understands context, what is normal for a given device, or a normal network or normal environment.”

“If you put yourself in the shoes of a malicious nation stage, then their work is very human capital intensive, you need a lot of very skilled hackers, somebody who can use the tools, to understand Windows, Linux, to move around and attack stealthily. 

“But what if the human attackers, can use a piece of malware to understand by itself, say, that a specific target watches a bit of Netflix on a Friday, so they may create a website similar to Netflix, so by understanding what is normal, hackers can scale much more effectively, and hack into say hundreds of organisations.

“So AI can solve the skill shortage of cyber criminals and personalise its activity.”

So if the more sophisticated cyber criminals are moving to AI, that leaves companies trying to resist, with little alternative, but to adopt AI-cyber too.

Information Age:

You Might Also Read:

Darktrace Describe The Alarming Future AI Attack Scenario

« Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis
Journalists Aim To Detect Deepfakes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

IABG

IABG

Activities include consulting services in the development of software systems in the area of secure information and data communication.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.