Deep Learning & Cybersecurity

The cyber-electronic-scape is a changing environment as current network security measures like signature-based detection techniques, firewalls and sandboxing are failing to keep up.  
 
With corporate networks becoming a prime target for threat actors, software vendors are beginning to use deep learning and other types of AI in cybersecurity. 
 
Much of the progress we’ve seen in artificial intelligence in the past five years is due to deep learning. 
 
Advances in software algorithm models, processing power and dramatically lower costs have put deep learning within reach of more companies, opening the door for broader innovation in products and services, and also supporting the execution of complex business processes.
 
The startup company, Blue Hexagon, has developed a deep-learning-powered network security platform, which was able to detect an Emotet infection as soon as it hit one of Heffernan Insurance Brokers’ servers. Deep learning and neural network technology are some of the most advanced techniques that can be used to help defend an enterprise from threats. Although deep learning was having a significant impact on image and speech recognition, these techniques were not being used in computer security.
 
The company’s deep learning platform focuses on threats that pass through the network. It looks at a packet as they flow through the network and applies deep learning. 
 
The Blue Hexagon deep learning models inspect the complete network flow, payloads, headers, malicious URLs and C2 communications, and are able to deliver threat inference in less than a second, according to the company. Threat prevention can then be enabled on firewalls, endpoint devices and network proxies. However, Gartner analyst Augusto Barros told techtarget.com that “many machine learning implementations, including those using deep learning, can find threats, such as new malware, for example, that has common characteristics with what we already know as malware”. 
 
“They can be very effective in identifying parameters that can be used to identify malware, but first we need to feed them with what we know as malware and also with what we know as not malware so they can learn. New threat types … won’t be magically identified by machine learning.”
 
Nevertheless, there are several advantages of Deep Learning versus the more traditional Machine Learning:
 
  • Deep learning algorithms thrive on big data. The generalisation error bound shrinks as the training data set size increases. This means that while deep learning continues to excel in performance and efficacy, traditional machine learning systems will plateau at some point no matter how much more data you train it with. 
  •  Deep learning models can represent complex non-linear separating functions. Certain tasks require the ability to learn complex concepts, deep learning is the ideal technique to solve this. No feature engineering is required and therefore minimises the likelihood of introducing human bias to the model.  
  • Deep learning can harness parallel computational power to learn better models, with the fast advances of GPUs, deep learning models can be trained and optimised in a more efficient manner than before.
Some other services that have shifted from traditional machine learning to deep learning include face detection, speech recognition and language translation.
 
Blue Hexagon:         I-HLS:
 
You Might Also Read:
 
Artificial Intelligence Or Deep Learning? What's The Difference?:
 
« N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime
Huawei To Be Given 5G Contracts In The UK »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.