2018: The Year Machine Intelligence Arrived in CybersecurityDecember 28 2018
Machine intelligence has become a technology player in fields from medical research to financial services. This year it began to make its presence felt in cybersecurity. The initial inroads have been tightly targeted, but some experts say more substantial uses are almost inevitable.
“Intelligence” is a word heavily freighted with meaning in cybersecurity technology because it covers a wide variety of techniques and products. Expert systems, machine learning, deep learning, and artificial intelligence are all represented in the whole, with each being used and promoted by different vendors and service organizations.
Antivirus protection is one of the tasks to which companies are applying intelligence. “Intelligent AV is all about catching more malware, and it really starts with the history of malware detection,” says Corey Nachreider, CTO of WatchGuard Technologies. He describes a series of techniques that look not at code patterns or signatures but at behavioral markers for code that is run in a protected environment. “They can change the way the binary could look, but they can’t change what they have to do on your computer to do their bad thing,” he says.
In looking for behavioral characteristics and matching them with code and other patterns, machine intelligence can discover patterns involving many more factors than a human could reasonably consider. And in doing so, it also finds related vulnerabilities faster. “What machine learning has really given us is the ability to predict patterns before they actually happen,” Nachreider says.
Intelligence is not only being applied to antivirus products, but it is also finding its way into security services, as well. “The best use of AI is to give security admins the ability to deconflict tasks – to know which, out of scores of possibilities, are critical and will have the greatest impact,” says Ann Johnson, corporate vice president in the Microsoft Cybersecurity Solutions Group. She points out the critical requirement for this that comes from the sheer volume of security incidents. “Microsoft sees 6.5 trillion security signals a day. AI helps rationalize them down to a quantity that humans can deal with,” she says.
As for the effectiveness of intelligence in dealing with these threats, Johnson points to the emergence of the Smoke Loader credential stealer. “It was blocked on Azure within milliseconds because the AI saw and recognized the pattern,” she says.
That effectiveness in recognizing and acting on patterns will be used in more products and services in the future, many experts say. “Machines are really good at looking at vast amounts of data and making sense of it all in a statistical way, and humans are not,” says Clarence Chio, CTO and co-founder of Unit21, and author of “Machine Learning Security.”
He points out that the vast majority of intelligence being used in security is “machine learning” rather than “artificial intelligence.” That’s because a defining characteristic of artificial intelligence is that it can produce an output developers never considered, rather than always creating a conclusion within a known range of responses.
“I think the real challenge in industry is not really the maturity in developing such systems, but to really hone the expectations of people using such things,” Chio says.
That expectation will evolve and develop in the coming year, according to many experts. “What it’s good at right now is kind of removing all the noise and the grunt work that security analysts or professionals have to deal with,” Nachreider says. “[Still], we’re a long away from totally automating out the need for some type of security professional that occasionally has to make a decision.”
- A Shift from Cybersecurity to Cyber Resilience: 6 Steps
- 8 Security Buzzwords That Are Too Good to Be True
- How to Successfully Hit Reset on your (Underperforming) SIEM
- How the Power of Quantum Can Be Used Against Us
Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio