Tuesday, April 13, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

How AI and machine learning can help you defend the enterprise from cyberattacks

February 15, 2019
in Internet Security
How AI and machine learning can help you defend the enterprise from cyberattacks
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Security measures have increased significantly in the last several years, and malicious actors have similarly advanced their techniques to keep pace, particularly with advances in attack methods such as fileless malware. Likewise, the security model of ‘serverless’ computing platforms like AWS Lambda are completely different from traditional computers. These itinerant computing concepts are not effectively secured by the traditional model of checking file hashes against known malware samples.

For a robust, modern defense, an adaptive monitoring solution that leverages machine learning to identify anomalous patterns indicative of an attack in its infancy is necessary to defend enterprise systems from cyberattacks.

You might also like

Billions of smartphone owners will soon be authorising payments using facial recognition

PayPal rolls out new fraud management tools for merchants

Ransomware: The internet’s biggest security crisis is getting worse. We need a way out

Much of the groundwork for this has been laid over the last several years, with endpoint detection services analyzing system events. “Network connection opened, registry key modified, process created… You build this catalog of really security relevant behaviors. The challenge becomes to map known malicious behaviors that essentially do the same thing,” said Forrester Senior Analyst for Security and Risk Josh Zelonis, “You have to have two people in the room in order to build this: a data scientist who understands the map and can build these models… [and] an expert in offensive techniques in order to help them build the model and understand the abstraction of what they’re doing, so they can statistically identify when an adversary does something that looks similar.”

Accurately connecting aggregations of system events to anomalous activities is just one step on the security staircase — determining the difference between legitimate changes in workflow and malicious activity is a higher-level-order task for machine learning or artificial intelligence. A variety of approaches for security information and event management (SIEM) that leverage ML/AI are available from a variety of vendors.

Leading vendors for AI/ML-powered solutions

ExtraHop
ExtraHop’s Reveal(x) platform provides network traffic analysts for enterprise networks, providing insight into connections, and identifies potential threats using rule and behavior based analytics paired with logical device groups. The platform also touts “full context and one-click investigation workflows for every detection.”

Vectra Networks
Vectra Cognito is an AI-powered security platform that uses an analysis of known malware payloads and techniques to inform the machine learning models to detect future or unknown threats. It also analyzes user behavior and local networks, or attributes specific to a customer environment, in order to gain a baseline understanding of normal, against which to set parameters that identify anomalous behavior.

CoreLight
Corelight’s 1U rack-mountable network security appliances are intended to produce comprehensive and actionable logs based on a variety of factors. CoreLight’s platform can be used to track DNS queries and responses, as well as potentially problematic environmental factors, such as out-of-date or vulnerable software, abnormal keyboard settings for an environment, self-signed, expired, or soon to expire SSL certificates, as well as detecting what systems in a network have accessed a file found to be malicious.

DataVisor
DataVisor’s offerings are targeted more toward transactional security than network security, with products targeted toward content moderation and filtering, transaction fraud (including promotional abuse and loyalty program fraud), account opening and monitoring, and money laundering detection and prevention.

The company touts their ability to provide detailed information about why patterns are flagged as anomalous, citing a tendency for competing AI/ML models to be treated as ‘black boxes’.

PerimeterX
Like DataVisor, PerimeterX targets detection of automated platform abuse, in essence, bots. The PerimeterX platform can be added to existing websites through the use of JavaScript, and uses “hundreds of indicators from the browser such as features, sensor data, and visual and audio rendering,” which are compared against known profiles to detect when requests are not typical of normal users. Likewise, it also collects user behavior patterns “such as mouse clicks, screen touches, cadence and timing.”

Looking forward (and backward) in enterprise cybersecurity

For all of the advancements that AI/ML promise for improving cybersecurity, it’s not a replacement for the traditional groundwork needed to establish basic security hygiene in a given organization. “In terms of what people need to worry about when they’re deploying is how control systems get used or accessed…that is the gateway to all the other devices. If someone is checking their email on [an industrial control system] then you’re going to have a bad time.” said Zelonis. “There really isn’t a technological solution for in-depth social engineering.”

Moving forward, SIEM is likely to integrate user data, according to Eric Ogren, Senior Analyst for Information Security at 451 Research. “The first step is who’s accessing [a device]? And are they accessing at normal hours with normal protocols? Do they have permissions? Are they authorized? I’m starting to see a lot of the same vendors integrate with identity information, for access control.”

Also See

Adversarial AI: Cybersecurity battles are coming
One of the world’s foremost experts in building AI systems to detect malware explains “offensive AI” and the mathematical models he develops to protect against cyber attacks.  

Top digital transformation tech investment priorities for 2019: Cloud, cybersecurity, and AI
According to the “State of Digital Transformation” research, in 2019, it is clear that digital transformation is maturing into an enterprise-wide movement. Digital transformation is modernizing how companies work and compete and helping them effectively adapt and grow in an evolving digital economy.  

IBM’s AI-cybersecurity platform learns new models from MITRE framework
The machine learning system is being given a crash course in cybercriminal techniques.

Cybersecurity, AI skills to dominate IT staff hires in 2019
While a third of the enterprise is looking to hire more IT staff next year, close to the same figure are looking to switch roles.  

Microsoft wants AI to predict if your Windows PCs will get malware
Microsoft wants new models to predict when Windows machines need extra protection from malware.

7 tips for CXOs to combat cybersecurity risks in 2019 and beyond (TechRepublic)
This year alone saw more than 600 data breaches, yet only 25% of organizations are planning to defend against attacks, according to Deloitte.  

Credit: Source link

Previous Post

Current Generation of Self-Driving Cars AI Needs a Safety Certification Process

Next Post

AI and Healthcare — Horizon BBC – Becoming Human: Artificial Intelligence Magazine

Related Posts

Billions of smartphone owners will soon be authorising payments using facial recognition
Internet Security

Billions of smartphone owners will soon be authorising payments using facial recognition

April 13, 2021
PayPal rolls out new fraud management tools for merchants
Internet Security

PayPal rolls out new fraud management tools for merchants

April 12, 2021
Ransomware: The internet’s biggest security crisis is getting worse. We need a way out
Internet Security

Ransomware: The internet’s biggest security crisis is getting worse. We need a way out

April 12, 2021
Washington State educational organizations targeted in cryptojacking spree
Internet Security

Washington State educational organizations targeted in cryptojacking spree

April 10, 2021
Critical Zoom vulnerability triggers remote code execution without user input
Internet Security

Critical Zoom vulnerability triggers remote code execution without user input

April 10, 2021
Next Post
AI and Healthcare — Horizon BBC – Becoming Human: Artificial Intelligence Magazine

AI and Healthcare — Horizon BBC – Becoming Human: Artificial Intelligence Magazine

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Bitcoin mining in China could threaten climate policies, new study shows
Blockchain

Bitcoin mining in China could threaten climate policies, new study shows

April 13, 2021
Artificial Intelligence Research at Duke
Machine Learning

Artificial Intelligence Research at Duke

April 13, 2021
Learning Not To Fear Machine Learning | by Dimitry Belozersky | Apr, 2021
Neural Networks

Learning Not To Fear Machine Learning | by Dimitry Belozersky | Apr, 2021

April 13, 2021
Billions of smartphone owners will soon be authorising payments using facial recognition
Internet Security

Billions of smartphone owners will soon be authorising payments using facial recognition

April 13, 2021
Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data
Internet Privacy

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data

April 13, 2021
Caruso real estate to accept Bitcoin as rent payment in industry first
Blockchain

Caruso real estate to accept Bitcoin as rent payment in industry first

April 12, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Bitcoin mining in China could threaten climate policies, new study shows April 13, 2021
  • Artificial Intelligence Research at Duke April 13, 2021
  • Learning Not To Fear Machine Learning | by Dimitry Belozersky | Apr, 2021 April 13, 2021
  • Billions of smartphone owners will soon be authorising payments using facial recognition April 13, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates