The Risk Of AI Being Used For Offensive Purposes

Apart from a few leading-edge companies, the deployment of Artificial Intelligence (AI) in business has been slower that it supporters might have hoped for. Whereas governments and their intelligence and security agencies are committed to use AI  to help deal with threats from criminals and hostile states which use AI to strengthen their own attacks, they are evidently not yet on top of AI.

A study, undertaken by Forrester Consulting on behalf of Darktrace, has revealed that around half of executives are worried about the use of AI to attack both their digital and hardware systems.

Today’s cybersecurity threats are incredibly smart and sophisticated. Security experts face a daily battle to identify and assess new risks, identify possible mitigation measures and decide what to do about the residual risk. This next generation of cyber security threats require agile and intelligent programs that can rapidly adapt to new and unforeseen attacks. Indeed, AI is no longer a tool only for the “good guys”; malicious actors now use it as a force multiplier as well.

A Complex Environment

It’s increasingly common for organisations to have a multi-faceted digital infrastructure that contains hybrid, multi-cloud and IoT environments. The growing complexity of their working environment, with an expanded infrastructure leading to a significant growth in security challenges that are only compounded by the speed and sophistication of attacks. 

This provides a multitude of operational benefits, but it also provides an ever growing expanse to protect and secure from attacks. 

In fact, the Forrester report finds that 83% of executives think that their digital infrastructure had expanded in such a way as to make developing a unified security strategy significantly harder. Nowhere is this complexity more evident than in the growth in AI-enabled attacks.

The report highlights how machines are already commonly attacking machines, but that it’s increasingly common for machines to successfully attack humans, and this new approach is something that businesses aren’t ready for. “It’s no surprise that 86% of cyber security decision makers are concerned with threat actors leveraging AI to supercharge attacks and a further 88% believe it’s inevitable for AI-driven attacks to go mainstream.” the report concludes.

A Losing Battle

Many corporate cyber security teams are at risk of fighting yesterday’s battles, where their traditional defenses are reliant upon outdated attack scenarios which are no longer resistant to AI-powered attacks. There are signs that things are changing, however, or at least, that there is a need for change.  There’s a growing appreciation for the need for speed, both in identifying attacks and then responding to them. Despite this, less than 25% of businesses said they could recover from an attack in less than 3 hours.

Organisations need to develop the capability to detect, interpret, and respond to attacks as quickly and nimbly as the attackers are themselves acting.

As the breadth of infrastructure grows, the number of vulnerabilities grows alongside it, and so organisations have to adopt an agile approach to keeping their infrastructure safe. As well as the lightning speed of AI-driven attacks, executives also worried about the nature of attacks, with two thirds expecting offensive AI to conduct attacks that no human could conceive of. 
They expect these attacks to be unpredictable and stealthy, therefore evading more traditional security measures that reference historical attacks. Many expect to utilise AI in a defensive capacity, with a machine learning approach used to upgrade defences far faster than humans could manage. “The real issue with this is that because AI moves faster and better than current legacy defenses, the “evil AI” will win in most instances.”he report says. 

The use of AI to both protect and attack digital systems is an inevitability of the modern age, but the lack of strategic focus on cybersecurity renders many organisations more vulnerable than they need to be. In a digital arms race,

AI tooling and capabilities are no longer nice to haves, but should be fundamental parts of the security toolkit. 

While there is a growing awareness of this requirement, it remains to be seen how many cyber security managers are given the tools and resources they need to maintain the security of their systems.

AI & Machine Learning

AI and machine learning technologies address these challenges and are giving rise to new possibilities for cyber security threat protection.  AI in cyber security plays an important role in threat detection, pattern recognition, and response time reduction. Adopting AI in cyber security offers better solutions when it comes to analysing massive quantities of data, speeding up response times, and increasing efficiency of often under-resourced security teams.

AI is designed and trained to collect, store, analyse and process significant amounts of data from both structured and unstructured sources.

Deploying technologies such as machine learning and deep learning allows the AI to constantly evolve and improve its knowledge about cybersecurity threats and cyber risk. For example, by recognising patterns in our environment and applying complex analytics, AI enables us to automatically flag unusual patterns and enable detection of network problems and cyber-attacks in real-time. 

This visibility supplies deeper insights into the threat landscape which in turn informs the machine learning. This means that AI-based security systems are constantly learning, adapting and improving.

Darktrace:        Cyber News:      ZDNet:      Information Security Buzz

You Might Also Read: 

Artificial Intelligence – A Brief History (£)

« Analysts Detect New Bank Malware
What Is A Cyber Security Audit? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

Naoris

Naoris

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Alias

Alias

Alias (previously known as Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.