AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI is helping Darktrace fight the good fight against the bad guys in the cyber world, but AI cyber security does it by understanding networks; it doesn’t need to look for a viruses signature, then again, cyber criminals are adopting AI too, or so according to Darktrace’s Max Heinemeyer.

There is a shortage of talent, and personalisation in the new mantra. Everyone who works in tech knows this. But it is not just a problem for legitimate business, it is a problem for cyber criminals too, how do they address the staff shortage?

You may not have too much sympathy for them, but they can relax, take it easy, for they have a friend in AI for cyber. And that makes them formidable indeed.

“Cyber-crime is a perfect market,” says Max Heinemeyer, Director of Threat Hunting at Darktrace.  He explained: “Whatever works, if phishing works, they go for it. If ransomware works, they go for it. If crypto currency works, they go for it. Whatever makes the big bucks, they go for it.”

It also turns out that thanks to AI, cyber-crime is really good at personalising; so if you are a CEO, then ransomware might work quite well for the cybercriminal, stealing data from your machine might be lucrative too, but putting a bitcoin mining tool on your machine is a wasted opportunity. 

But if there is a server used only occasionally for development work, and then it just sits around collecting dust, processing very little, then installing a bitcoin miner, might be a very good enterprise for the cybercriminal. And AI can help the recruiting-challenged cybercriminal achieve this.

Max should know, he used to be an ethical hacker, a penetration tester, and an also ex-member of the Chaos Computer Club he knows a thing or two about what cyber criminals are up to and, he, along with his team of 30 odd people scattered around the world, hunt down cyber threats. But how can they do it? 

The cyber world is vast, you can count the numbers of experts in Max’s team without having to draw breath. The answer: AI, or AI for cyber. That’s what Darktrace is good at.

The company was founded five years ago, that may seem recent to any reader who left school before the iPhone was launched, but in the world of AI, that is positively ancient history. Max has been with the company for three years, making him a veteran. 

When he joined he was employee number 120, now there are almost a thousand employees. And the company, which recently completed its latest funding round, this time rustling up $50 million, has a valuation of $1.6 billion. It’s technology has been deployed in over 7,000 networks, R&D is headquarter in HQ Cambridge but the company has offices in over 33 countries, with a dual HQ in the UK and in San Francisco.

The company was founded by three very different types: ex spooks, boffins and the money. Max put it this way: “Ex intelligence people, from GCHQ, and MI5 and other agencies trying to focus on cybercrime, catching hackers, concluded that they needed to change the legacy approach to cyber security. 

“So instead of looking for signatures and rules, which clearly does not scale, while at the same time there was a huge skill gap, they looked for another way. The spooks realised they needed to change something, so they approached Cambridge Mathematicians, working in AI and Machine Learning, and asked ‘can we work together?’ Investors then completed the three-way convergence, so that the company could have the sales force and marketing it needed.”

“You can never anticipate tomorrow,” says Max Heinemeyer “so you need an army of people keeping up to date with signature and rules.”

So how does it work?

“We use what we call the enterprise immune system; a very simple analogy which underlines how Darktrace works, relates to understanding cells, instead of looking for what bad looks like, it understands networks, it understands the information age. Drax, the company behind the massive power station was one if its first customers. And working in that way, Darktrace earned its spurs. And it works by spotting a deviation, as soon as a deviation occurs and attacks, entering a network, it can spot the deviation in behaviour.

So, for example, it may know that a certain individual logs in between 7am and 9am every morning, and goes to Facebook and Instagram, and uses HTPS encryption. Darktrace understand all of this; but if a lot of data is then sent by this individual to an usual website, or it starts making connections to weird servers in in say Germany, US, China, Russia or Japan, Darktrace will highlight that.

Diversity may be part of Darktrace’s success. Its founder, Poppy Gustafsson and CEO Nicole Eagan, are both female. In Max’s team, the split is 40% women 60% men.

Puppet masters for the internet

“It’s not the kid working in their parent’s basement anymore, if we think about the most sophisticated human attacks, they try to blend as stealthily as possible. These subtle-nation driven attacks are sophisticated, the people behind them know what they are doing. They are like puppet masters for the internet.”

Max says that they “live off the land”, they don’t operate from a server in say Russia, but from the cloud. They stay very low and move around very stealthily.

And from this, he makes a prediction. The AI driven tools cannot make judgement calls as they are automated. We believe that AI driven malware will start understanding context.

“The most the advanced attackers, sit there, they listen, they see what you are doing, they understand ‘oh, this person doesn’t talk to finance very often so I will move around to say Amy’s computer. And Malware can learn to do the same. Narrow AI, like Darktrace understands context, what is normal for a given device, or a normal network or normal environment.”

“If you put yourself in the shoes of a malicious nation stage, then their work is very human capital intensive, you need a lot of very skilled hackers, somebody who can use the tools, to understand Windows, Linux, to move around and attack stealthily. 

“But what if the human attackers, can use a piece of malware to understand by itself, say, that a specific target watches a bit of Netflix on a Friday, so they may create a website similar to Netflix, so by understanding what is normal, hackers can scale much more effectively, and hack into say hundreds of organisations.

“So AI can solve the skill shortage of cyber criminals and personalise its activity.”

So if the more sophisticated cyber criminals are moving to AI, that leaves companies trying to resist, with little alternative, but to adopt AI-cyber too.

Information Age:

You Might Also Read:

Darktrace Describe The Alarming Future AI Attack Scenario

« Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis
Journalists Aim To Detect Deepfakes »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Iceberg

Iceberg

Since 2016, Iceberg has redefined how businesses approach hiring in the Cybersecurity and eDiscovery space.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

BugRaptors

BugRaptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

CoGuard

CoGuard

CoGuard is a patented solution that uses AI driven automation to provide fast, cost effective white-box penetration testing, infrastructure audits and infrastructure design services.

Datacom

Datacom

Datacom design, build and run IT systems and processes across operations, cybersecurity, cloud, digital platforms, payroll and enterprise applications.