Logo Header Menu

Use cases for AI and ML in cyber security

We explore how artificial intelligence (AI) and machine learning (ML) can be incorporated into cyber security Use cases for AI and ML in cyber security image

As cyber attacks get more diverse in nature and targets, it’s essential that cyber security staff have the right visibility to determine how to solve vulnerabilities accordingly, and AI can help to come up with problems that its human colleagues can’t alone.

“Cyber security resembles a game of chess,” said Greg Day, chief security officer EMEA at Palo Alto Networks. “The adversary looks to outmanoeuvre the victim, the victim aims to stop and block the adversary’s attack. Data is the king and the ultimate prize.

“In 1996, an AI chess system, Deep Blue, won its first game against world champion, Garry Kasparov. It’s become clear that AI can both programmatically think broader, faster and further outside the norms, and that’s true of many of its applications in cyber security now too.”

With this in mind, we explore particular use cases for AI in cyber security that are in place today.

Working alongside staff

Day went on to expand on how AI can work alongside cyber security staff in order to keep the organisation secure.

“We all know there aren’t enough cyber security staff in the market, so AI can help to fill the gap,” he said. “Machine learning, a form of AI, can read the input from SoC analysts and transpose it into a database, which becomes ever expanding.

How combining AI and humans can help to tackle cyber fraud

Charlie Roberts, head of business development, UK, Ireland & EU at IDnow, discusses how combining AI and humans can help to tackle cyber fraud. Read here

“The next time the SoC analyst enters similar symptoms they are presented with previous similar cases along with the solutions, based on both statistical analysis and the use of neural nets – reducing the human effort.

“If there’s no previous case, the AI can analyse the characteristics of the incident and suggest which SoC engineers would be the strongest team to solve the problem based on past experiences.

“All of this is effectively a bot, an automated process that combines human knowledge with digital learning to give a more effective hybrid solution.”

Battling bots

Mark Greenwood, head of data science at Netacea, delved into the benefits of bots within cyber security, keeping in mind that companies must distinguish good from bad.

“Today, bots make up the majority of all internet traffic,” explained Greenwood. “And most of them are dangerous. From account takeovers using stolen credentials to fake account creation and fraud, they pose a real cyber security threat.

“But businesses can’t fight automated threats with human responses alone. They must employ AI and machine learning if they’re serious about tackling the ‘bot problem’. Why? Because to truly differentiate between good bots (such as search engine scrapers), bad bots and humans, businesses must use AI and machine learning to build a comprehensive understanding of their website traffic.

“It’s necessary to ingest and analyse a vast amount of data and AI makes that possible, while taking a machine learning approach allows cyber security teams to adapt their technology to a constantly shifting landscape.

“By looking at behavioural patterns, businesses will get answers to the questions ‘what does an average user journey look like’ and ‘what does a risky unusual journey look like’. From here, we can unpick the intent of their website traffic, getting and staying ahead of the bad bots.”

Endpoint protection

When considering certain aspects of cyber security that can benefit from the technology, Tim Brown, vice-president of security architecture at SolarWinds says that AI can play a role in protecting endpoints. This is becoming ever the more important as the amount of remote devices used for work rises.

“By following best practice advice and staying current with patches and other updates, an organisation can be reactive and protect against threats,” said Brown. “But AI may give IT and security professionals an advantage against cyber criminals.

Should CEOs take responsibility for cyber-physical security incidents?

Gartner predicts that 75% of CEOs will be personally liable for cyber-physical security incidents by 2024, as the financial impact of breaches grows. Read here

“Antivirus (AV) versus AI-driven endpoint protection is one such example; AV solutions often work based on signatures, and it’s necessary to keep up with signature definitions to stay protected against the latest threats. This can be a problem if virus definitions fall behind, either because of a failure to update or a lack of knowledge from the AV vendor. If a new, previously unseen ransomware strain is used to attack a business, signature protection won’t be able to catch it.

“AI-driven endpoint protection takes a different tack, by establishing a baseline of behaviour for the endpoint through a repeated training process. If something out of the ordinary occurs, AI can flag it and take action — whether that’s sending a notification to a technician or even reverting to a safe state after a ransomware attack. This provides proactive protection against threats, rather than waiting for signature updates.

“The AI model has proven itself to be more effective than traditional AV. For many of the small/midsize companies an MSP serves, the cost of AI-driven endpoint protection is typically for a small number of devices and therefore should be of less concern. The other thing to consider is how much cleaning up costs after infection — if AI-driven solutions help to avoid potential infection, it can pay for itself by avoiding clean-up costs and in turn, creating higher customer satisfaction.”

Machine learning versus SMS scams

With more employees working from home, and possibly using their personal devices to complete tasks and collaborate with colleagues more often, it’s important to be wary of scams that are afoot within text messages.

“With malicious actors recently diversifying their attack vectors, using Covid-19 as bait in SMS phishing scams, organisations are under a lot of pressure to bolster their defences,” said Brian Foster, senior vice-president of product management at MobileIron.

“To protect devices and data from these advanced attacks, the use of machine learning in mobile threat defence (MTD) and other forms of managed threat detection continues to evolve as a highly effective security approach.

“Machine learning models can be trained to instantly identify and protect against potentially harmful activity, including unknown and zero-day threats that other solutions can’t detect in time. Just as important, when machine learning-based MTD is deployed through a unified endpoint management (UEM) platform, it can augment the foundational security provided by UEM to support a layered enterprise mobile security strategy.

How to ensure edge device security

With cyber attacks rising while employees have been working from home, we look at how edge device security can be ensured. Read here

“Machine learning is a powerful, yet unobtrusive, technology that continually monitors application and user behaviour over time so it can identify the difference between normal and abnormal behaviour. Targeted attacks usually produce a very subtle change in the device and most of them are invisible to a human analyst. Sometimes detection is only possible by correlating thousands of device parameters through machine learning.”

Hurdles to overcome

These use cases and more demonstrate the viability of AI and cyber security staff effectively uniting. However, Mike MacIntyre, vice-president of product at Panaseer, believes that the space still has hurdles to overcome in order for this to really come to fruition.

“AI certainly has a lot of promise but as an industry we must be clear that its currently not a silver bullet that will alleviate all cyber security challenges and address the skills shortage,” said MacIntyre. “This is because AI is currently just a term applied to a small subset of machine learning techniques. Much of the hype surrounding AI comes from how enterprise security products have adopted the term and the misconception (willful or otherwise) about what constitutes AI.

Blockchain and cyber security: seeing past the hype

Terry Greer-King, vice-president EMEA at SonicWall, discusses looking past the hype when it comes to blockchain and cyber security. Read here

“The algorithms embedded in many modern security products could, at best, be called narrow, or weak, AI; they perform highly specialised tasks in a single, narrow field and have been trained on large volumes of data, specific to a single domain. This is a far cry from general, or strong, AI, which is a system that can perform any generalised task and answer questions across multiple domains. Who knows how far away such a system is (there is much debate ranging from the next decade to never), but no CISO should be factoring such a tool in to their three-to-five year strategy.

“Another key hurdle that is hindering the effectiveness of AI is the problem of data integrity. There is no point deploying an AI product if you can’t get access to the relevant data feeds or aren’t willing to install something on your network. The future for security is data-driven, but we are a long way from AI products following through on the promises of their marketing hype.”

Sign up for Information Age Newsletters

Latest news

divider
AI & Machine Learning
What advances in HPC and AI mean for business, and what they do not

What advances in HPC and AI mean for business, and what they do not

21 September 2020 / Back in 2009, surrounded by academics and at one of the most prestigious universities in [...]

divider
People Moves
Thomas International appoints Sabby Gill as CEO

Thomas International appoints Sabby Gill as CEO

21 September 2020 / New Thomas International CEO Gill will look to lead the capitalisation of opportunities to help [...]

divider
AI & Machine Learning
Why we need XAI, not just responsible AI

Why we need XAI, not just responsible AI

18 September 2020 / AI is increasingly impacting on our daily lives, from speeding up the search for a [...]

divider
Buyers Guides
What are investors looking for in the next Fintech?

What are investors looking for in the next Fintech?

18 September 2020 / Are investors getting pickier when it comes to Fintech? It’s hard to say for sure, [...]

divider
People Moves
OneSpan appoints former Oracle executive Ajay Keni as CTO

OneSpan appoints former Oracle executive Ajay Keni as CTO

18 September 2020 / Through hiring Keni as CTO, cyber security company OneSpan will look to continue its innovation [...]

divider
Business & Strategy
Sopra Steria commits to net zero emissions by 2028

Sopra Steria commits to net zero emissions by 2028

18 September 2020 / The 2028 sustainability target set by Sopra Steria is 22 years earlier than those set [...]

divider
CIO and CTO
CTO challenges around the return to the workplace

CTO challenges around the return to the workplace

17 September 2020 / While financial services employees have been heading back to their ‘desks’, firms are figuring out [...]

divider
AI & Machine Learning
Machines inventing patents: Are we entering a diminishing innovation era?

Machines inventing patents: Are we entering a diminishing innovation era?

17 September 2020 / Today, we are on the verge of massive technological advancements in artificial intelligence (AI) and [...]

divider
Transformation in Action
NTT Transformation in Action virtual event round-up

NTT Transformation in Action virtual event round-up

17 September 2020 / Transformation in Action brought together cloud data experts from NTT Ltd. and partner organisations for [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest