AI Is The New Route For Both Cyber Attacks And Their Prevention

Artificial Intelligence (AI) and Machine Learning (ML) are being hailed by experts as a means to fight cyber-attacks, but how useful is the technology and where can it be applied? 

Currently, the technology can flag anomalies for a security analyst to look into, saving time and cutting overall businesses costs. 

Indeed, it’s hoped that in the future, intelligent systems including these technologies will be able to accurately detect and remediate attacks in real-time. But despite its potential, the technology also faces challenges. For example, the ability to save time must be weighed up with the chance of false positives. At the same time, adversaries are starting to use AI to attack businesses and even hide their tracks.

Currently ML is mostly used for anomaly detection, says Etienne Greeff, CTO and co-founder, SecureData. He says the most useful systems are those that solve “specific problems”. 

Determining personally identifiable information (PII) within huge amounts of data is a good use for AI in cyber security, says Joan Pepin, CISO and VP of operations at Auth0. This is especially important in regions such as Europe where the EU update to General Data Protection Regulation (GDPR) is “mandating new levels of data governance”, she says.
Among the benefits, the technology allows firms to come to conclusions swiftly, says Bridget Kenyon, global CISO at Thales eSecurity.: “AI systems can be set to solve difficult problems when humans don’t know the answer, but they know what the answer should look like.” 

Learning from Data Breaches
If deployed correctly, AI can collect intelligence about new threats, attempted attacks and successful breaches, and learn from it all, says Dan Panesar, VP EMEA, Certes Networks. “AI technology has the ability to pick up abnormalities within an organisation’s network and flag them more quickly than a member of the cyber security or IT team could,” he says.

Indeed, current iterations of machine learning have proven to be more effective at finding correlations in large data sets than human analysts, says Sam Curry, chief security officer at Cybereason. “This gives companies an improved ability to block malicious behaviour and reduce the dwell time of active intrusions.”

It is true that AI increases efficiency, but the technology isn’t intended to completely replace human security analysts. “It’s not to say we are replacing people – we are augmenting them,” says Neill Hart, head of productivity and programs at CSI.
However, AI and machine learning also have a dark side: the technology is also being harnessed by criminals. It would be short-sighted to think that the technological advancements offered by AI will provide a complete barrier against the fallout of cyber-attacks, says Helen Davenport, director, Gowling WLG.

“AI techniques may necessitate the use of centralised servers collating large amounts of user data together– making those repositories potentially a ‘one-stop-shop’ for hackers looking to steal multiple sets of information,” she warns.

“Traditionally, if you wanted to break into a business, it was a manual and labour-intensive process,” says Max Heinemeyer, director of threat hunting at Darktrace. “But AI enables the bad guys to perpetrate advanced cyber-attacks, en masse, at the click of a button. We have seen the first stages of this over the last year: advanced malware that adapts its behaviour to remain undetected.”

AI could be configured by hackers to learn firms’ specific defences and tools – and this could give way to larger and more successful data breaches, adds Panesar. “Viruses could be created to host this type of AI, producing more malware that can bypass even advanced security implementations.” 

AI Accuracy
At the same time, there are concerns about the accuracy of AI and machine learning: If the technology gets something wrong, or if people misinterpret a valid security alert, it can actually decrease business efficiency. False positives can be incredibly damaging to a security team, says Simon Whitburn, SVP cyber security services at Nominet. “Hackers, hostile nations, and wannabes are constantly trying to overwhelm cyber defences and false positives can distract security teams from these threats and increase complacency.”

He cites the example of US company Target. “When they were hit with a huge data breach in 2013, exposing 40 million credit and debit card details to hackers as well as the personal information of another 70 million customers, people saw them as the victim. But the truth was more complex.

“After an investigation, it was revealed that they had been alerted to the early signs of a data breach by their security systems – but they determined it did not warrant immediate action and they, in essence, waved the hackers through the door.”
Meanwhile, the data set informing the AI needs to be of optimum quality. Curry warns: “Ultimately, any artificial intelligence and machine learning implementation is only as good as the training data set used. This creates detection and data bias before it is ever deployed onto a live system.”

So it’s clear the technology has multiple uses, but it also needs to be approached with caution. Taking this into account, technology leaders must have a comprehensive plan before the first deployment, says Mark Vargo, CTO CSI. 

“We have seen people buy part solutions because a vendor came in and had a convincing argument about part of the problem. It’s much better to look at the whole process rather than one thing at a time.”
In addition, Greeff advises: “Ask the vendor, what problems does your solution solve? If they can’t answer this by for example, saying, ‘this solution allows you to look for anomalous traffic’, then you need to be quite careful.”

As cyber-attacks grow in scale and sophistication, AI and machine learning might go some way in helping to keep up with cyber criminals. However, Kenyon warns there could eventually be “an arms race”, with one computer protecting the environment and another attacking it.

“It could mean the network is changing rapidly and no one knows what’s going on. You need some kind of human mediation or a predetermined limit that you don’t allow the automated response to transcend.”

Information-Age

You Might Also Read:

What's The Difference Between AI And Machine Learning?:

 

« How Can Boardrooms Effectively Manage Cyber Risk?
British Cyber Security Strategy Is ‘Chaotic’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71) is Singapore's first cybersecurity entrepreneur hub.

HancomWITH

HancomWITH

HancomWITH is a World-Leading Mobile and Digital Forensic Research Group. We provide a one-stop forensic service for law firms, audit, and eDiscovery corporations.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.