AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI is helping Darktrace fight the good fight against the bad guys in the cyber world, but AI cyber security does it by understanding networks; it doesn’t need to look for a viruses signature, then again, cyber criminals are adopting AI too, or so according to Darktrace’s Max Heinemeyer.

There is a shortage of talent, and personalisation in the new mantra. Everyone who works in tech knows this. But it is not just a problem for legitimate business, it is a problem for cyber criminals too, how do they address the staff shortage?

You may not have too much sympathy for them, but they can relax, take it easy, for they have a friend in AI for cyber. And that makes them formidable indeed.

“Cyber-crime is a perfect market,” says Max Heinemeyer, Director of Threat Hunting at Darktrace.  He explained: “Whatever works, if phishing works, they go for it. If ransomware works, they go for it. If crypto currency works, they go for it. Whatever makes the big bucks, they go for it.”

It also turns out that thanks to AI, cyber-crime is really good at personalising; so if you are a CEO, then ransomware might work quite well for the cybercriminal, stealing data from your machine might be lucrative too, but putting a bitcoin mining tool on your machine is a wasted opportunity. 

But if there is a server used only occasionally for development work, and then it just sits around collecting dust, processing very little, then installing a bitcoin miner, might be a very good enterprise for the cybercriminal. And AI can help the recruiting-challenged cybercriminal achieve this.

Max should know, he used to be an ethical hacker, a penetration tester, and an also ex-member of the Chaos Computer Club he knows a thing or two about what cyber criminals are up to and, he, along with his team of 30 odd people scattered around the world, hunt down cyber threats. But how can they do it? 

The cyber world is vast, you can count the numbers of experts in Max’s team without having to draw breath. The answer: AI, or AI for cyber. That’s what Darktrace is good at.

The company was founded five years ago, that may seem recent to any reader who left school before the iPhone was launched, but in the world of AI, that is positively ancient history. Max has been with the company for three years, making him a veteran. 

When he joined he was employee number 120, now there are almost a thousand employees. And the company, which recently completed its latest funding round, this time rustling up $50 million, has a valuation of $1.6 billion. It’s technology has been deployed in over 7,000 networks, R&D is headquarter in HQ Cambridge but the company has offices in over 33 countries, with a dual HQ in the UK and in San Francisco.

The company was founded by three very different types: ex spooks, boffins and the money. Max put it this way: “Ex intelligence people, from GCHQ, and MI5 and other agencies trying to focus on cybercrime, catching hackers, concluded that they needed to change the legacy approach to cyber security. 

“So instead of looking for signatures and rules, which clearly does not scale, while at the same time there was a huge skill gap, they looked for another way. The spooks realised they needed to change something, so they approached Cambridge Mathematicians, working in AI and Machine Learning, and asked ‘can we work together?’ Investors then completed the three-way convergence, so that the company could have the sales force and marketing it needed.”

“You can never anticipate tomorrow,” says Max Heinemeyer “so you need an army of people keeping up to date with signature and rules.”

So how does it work?

“We use what we call the enterprise immune system; a very simple analogy which underlines how Darktrace works, relates to understanding cells, instead of looking for what bad looks like, it understands networks, it understands the information age. Drax, the company behind the massive power station was one if its first customers. And working in that way, Darktrace earned its spurs. And it works by spotting a deviation, as soon as a deviation occurs and attacks, entering a network, it can spot the deviation in behaviour.

So, for example, it may know that a certain individual logs in between 7am and 9am every morning, and goes to Facebook and Instagram, and uses HTPS encryption. Darktrace understand all of this; but if a lot of data is then sent by this individual to an usual website, or it starts making connections to weird servers in in say Germany, US, China, Russia or Japan, Darktrace will highlight that.

Diversity may be part of Darktrace’s success. Its founder, Poppy Gustafsson and CEO Nicole Eagan, are both female. In Max’s team, the split is 40% women 60% men.

Puppet masters for the internet

“It’s not the kid working in their parent’s basement anymore, if we think about the most sophisticated human attacks, they try to blend as stealthily as possible. These subtle-nation driven attacks are sophisticated, the people behind them know what they are doing. They are like puppet masters for the internet.”

Max says that they “live off the land”, they don’t operate from a server in say Russia, but from the cloud. They stay very low and move around very stealthily.

And from this, he makes a prediction. The AI driven tools cannot make judgement calls as they are automated. We believe that AI driven malware will start understanding context.

“The most the advanced attackers, sit there, they listen, they see what you are doing, they understand ‘oh, this person doesn’t talk to finance very often so I will move around to say Amy’s computer. And Malware can learn to do the same. Narrow AI, like Darktrace understands context, what is normal for a given device, or a normal network or normal environment.”

“If you put yourself in the shoes of a malicious nation stage, then their work is very human capital intensive, you need a lot of very skilled hackers, somebody who can use the tools, to understand Windows, Linux, to move around and attack stealthily. 

“But what if the human attackers, can use a piece of malware to understand by itself, say, that a specific target watches a bit of Netflix on a Friday, so they may create a website similar to Netflix, so by understanding what is normal, hackers can scale much more effectively, and hack into say hundreds of organisations.

“So AI can solve the skill shortage of cyber criminals and personalise its activity.”

So if the more sophisticated cyber criminals are moving to AI, that leaves companies trying to resist, with little alternative, but to adopt AI-cyber too.

Information Age:

You Might Also Read:

Darktrace Describe The Alarming Future AI Attack Scenario

« Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis
Journalists Aim To Detect Deepfakes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Options Technology

Options Technology

Options is a global leader in financial technology, specialising in Capital Markets technology and enterprise-grade solutions.