Artificial Brains to Protect Against Cyberattacks

In cybersecurity, the big challenge is to be able to protect against the millions of new malware variants that are launched daily.

Although nearly all of the zero-day threats are based on extremely small mutations of known malware (by some estimates, the vast majority of new malware are mutated by less than 2% in comparison with known malware), many security solutions are incapable of detecting them because they rely on manually-tuned heuristics for creating handcrafted signatures. This process is time-consuming and reactive, leaving organizations vulnerable until the new signature is released.

Newer solutions such as those based on analysis of the behavioral characteristics of the malware at runtime, or sandboxing solutions that execute the malware in a virtual (sandbox) environment to determine whether it is malicious or not, like legacy solutions present critical limitations in their ability to provide real-time detection. As a result, their detection often comes too late, once the malware has already caused damage.

Cybersecurity solutions that apply machine learning artificial intelligence utilize manually selected features, which are then fed into classical machine learning modules to classify the file as malicious or benign. But despite improvements in the rate and pace of detection, they are still lacking.

Deep learning is the next step in artificial intelligence. It is also known as neural networks because it is “inspired” by the brain’s ability to learn to identify objects. Similar to the way our brain is fed with raw data from our sensory inputs and learns the high-level features on its own, in deep learning, raw data is fed through the deep neural network, which then learns on its own to identify the object on which it is trained.

Recent advancements in deep learning have become possible as a result of major algorithmic improvements, and their implementation on graphical processing units (GPUs), which provide tremendously improved computational capabilities. The advancement in deep learning has enabled technologies that leverage deep learning to exhibit amazing results across applications, such as object, facial, and speech recognition.

When applied to cybersecurity, it takes milliseconds to feed a raw data file and pass it through the deep neural network to obtain detection with the highest accuracy rate. This predictive capability of being able to detect a never- before seen malware variant enables not only extremely accurate detection, but also leads the way to real-time prevention because at the very second a malicious file is detected, it is already blocked.

Therefore, while traditional machine learning yields better results than signatures and manual heuristics, deep learning has shown groundbreaking results in detecting first-seen malware, even compared with classical machine learning. This observation is consistent with improvements achieved by deep learning in other fields, such as computer vision, speech recognition, text understanding, etc.

Furthermore, with deep learning, as opposed to classic machine learning, instead of conducting manual feature engineering, datasets of many millions of malicious and legitimate files are fed into the infrastructure, without any human intervention of feature selection. This enables the technology to learn on its own what are the useful high-level, non-linear features necessary for accurate classification.

Information-Management

« Improved Security For The Internet-of-Things
In The UK Cybercrime Has Overtaken Traditional Crime »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.

Parried

Parried

Parried is a leading Managed IT Services and Cybersecurity provider, known for blending deep technical knowledge with business strategy.

SITE Intelligence Group

SITE Intelligence Group

For over two decades, SITE Intelligence Group has provided customers with critical actionable intelligence and analysis on terrorist and violent extremist online networks.