• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • AR Wireless BT Game Gun Safe for $39

    AR Wireless BT Game Gun Safe for $39
  • The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49

    The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49
  • Bluebell Knife for $41

    Bluebell Knife for $41
  • CMPS Folding Knife for $29

    CMPS Folding Knife for $29
  • Linkcard Professional Plan: Lifetime Subscription for $49

    Linkcard Professional Plan: Lifetime Subscription for $49
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How AI will Help Organizations Stay Ahead of Cyberattacks

Apr 21, 2022 by iHash Leave a Comment

It’s seemingly a weekly occurrence that a business suffers a major cyberattack and makes headlines. Companies are more challenged than ever to keep their business secure. As a result, 71% anticipate their cybersecurity budgets to increase in the next three years, despite investments in other IT segments decreasing. 

Using AI in cybersecurity tooling is not new. We are still in the early stages of seeing the benefit that AI can bring to the levels of protection offered. In the future, AI will be instrumental in keeping businesses protected from known and evolving cybersecurity attacks. 

Businesses face two challenges that AI is better suited to handling than traditional approaches: 

  1. Detecting emerging attack types, including zero-day attacks. 
  2. Adding intelligent filtering to very large datasets before they are handed over for human analysis. 

Securing the business using predictive tools

By design, AI is good at learning what “normal” behavior looks like, detecting anomalies and spotting new types of activities. In a security setting when something unusual happens, that event can be reported as a potential attack. This generally works fine when the type of attack is expected – in other words, a known approach used by cybercriminals. Businesses learn more about attacks after they happen, including the type of attack and how it occurred. As a result, they fortify their systems to prevent it from happening again. This is where traditional security tooling is useful as it looks at a prescribed set of rules for what is and isn’t allowed. 

But what happens if something falls outside those parameters? This is AI’s sweet spot.

Let’s say, for example, people are only allowed to enter the house through the front door. Anyone who enters in the expected way – walk up to the door, put a key in the lock, and open the door – is legitimate. An attacker, however, will likely undertake a different series of actions. These actions could include approaching the door and getting a key out the same as other lawful entrants. However, if that attacker also looks through the window to see if anyone is home or first tries the door to see if it’s unlocked, this combination of behavior – even though each behavior is legitimate – could signify an attack. This pattern of actions might not seem suspicious to a passerby but is recognized by AI as unusual behavior.

Businesses that can respond to new threats as they occur improve efficiency and lower risk. AI tools have the capacity to step in and increase detection rates, especially when combined with traditional measures. In other words, AI allows you to broaden what is a potential risk and stay ahead of the cybercriminals. 

Companies can also use AI as part of the threat hunting process. They can process high volumes of endpoint data to develop a profile of each application within an organization. Using behavioral analysis and other machine learning techniques, threats can be identified faster when they breach a system. 

Amongst the security threats that companies must contend with today are bots. Automated bots make up a large amount of internet traffic and can be used for attacks such as stealing data, taking over accounts using stolen credentials, creating fake accounts and committing other types of fraud.

Businesses can’t fight these automated threats solely with human responses. The quantity is too vast and the behavior too sophisticated. The only effective strategy is to fight fire with fire, which is where AI can help. By looking at behavioral patterns, a company can differentiate between good bots (such as search engine scrapers), bad bots and real humans. This also allows them to develop a comprehensive understanding of their website traffic, so they stay one step ahead of the bad bot threat.

For example, a global gaming and betting site had a problem with bots continually scraping its site for odds. Arbitrage bettors used this information to place bets on every outcome of specific events to guarantee a profit. Not only does this cheat the system but the bots then represent a large portion of the site’s overall traffic, adding to infrastructure costs. Consistently identifying the scraping behavior in real-time involved a huge amount of unstructured data that was hard to classify across websites and threat levels. A team of data scientists determined that only by looking at a request-by-request level of website interactions did the intent of an individual’s behavior become apparent. Machines alone struggled to identify behaviors like scraping at scale and in real-time but combined with the right human interaction and analysis they were able to combat the situation. 

Processing and analyzing large amounts of data and integrating human processes

Humans are good at detecting when items are similar but not identical. So is AI. AI has an advantage, though. It can apply human-like analytical decision-making to large amounts of data and then rule out alerts that it has learned as no/low risk, or group similar warnings to identify an underlying issue. 

Learning how humans have previously responded can allow AI systems to understand patterns of behavior and make appropriate recommendations on actions to take. The best solution is a combination of human intuition and deductive intelligence augmented by AI, for example, a human doctor supported by AI analysis of patient data is better than either operating alone.

This capability isn’t easy to develop. It requires an understanding of the scope of the problem, the data that can be obtained, and the power of applying AI – a combination of attributes that require a significant investment in time and expertise to produce reliable results. Those results then need to be regularly tested, validated, optimized, and improved. The challenge with validating results, however, is that hackers try and hide their activities, so determining the level of threat with any degree of accuracy requires some assessment, rather than a hard and fast yes or no.

Introducing AI into security is not a silver bullet but it will play an essential role in good cybersecurity practices. It won’t replace existing approaches but will augment them and form the basis of emerging tooling. Doing so will not be easy – taking full advantage of AI will take time and investment to create tools that solve these issues. 

However, over time, there will be steady growth, and the value-add will become increasingly more evident. AI will also not replace human involvement; it will just supplement it and allow people to focus on the areas that add the most value, such as making decisions from the data and learnings that AI provides. 

About the Author

Andy Still is Chief Technology Officer and Co-Founder of Netacea where he leads the technical direction for the company’s products and provides consultancy and thought leadership to clients. He is a pioneer of digital performance for online systems, having authored several books on computing and web performance, application development and non-human web traffic. 

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: @InsideBigData1 – https://twitter.com/InsideBigData1

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • AR Wireless BT Game Gun Safe for $39

    AR Wireless BT Game Gun Safe for $39
  • The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49

    The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49
  • Bluebell Knife for $41

    Bluebell Knife for $41
  • CMPS Folding Knife for $29

    CMPS Folding Knife for $29
  • Linkcard Professional Plan: Lifetime Subscription for $49

    Linkcard Professional Plan: Lifetime Subscription for $49

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Video Highlights: The Rise of DeBERTa for NLP Downstream Tasks

Jul 4, 2022 By iHash

Some Worms Use Their Powers for Good

Jul 4, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

AR Wireless BT Game Gun Safe for $39

Expires June 30, 2122 02:44 PST Buy now and get -114% off PRODUCT SPECS About this item AR technology & incredible gaming experience. AR means Augmented Reality. This is a portable gaming gun designed for cellphones. It combines the real world and the virtual gaming world seamlessly. The AR game gun is returning to a […]

Doron Bargo

Implementing Synthetic Monitoring with Telegraf and Logz.io

In my previous blog post, we explored key questions about Synthetic Monitoring, such as what it is, why it’s important, how it works, and how it compares to Real-User monitoring. Synthetic Monitoring is becoming an increasingly-popular method to continuously monitor the uptime of applications and the critical flows within them so that DevOps, IT, and […]

How to Find the Mythical “Perfect Data Scientist”

There are currently over 400K job openings in the U.S. for data scientists on LinkedIn. And, every single one of these companies wants to hire that magical unicorn of a data scientist that can do it all. What rare skill set should they be looking for? Conor Jensen, RVP of AI Strategy at AI and […]

Phishing QR-code attack on QQ users

Scammers used phishing QR codes to hijack QQ accounts

Folks today are generally mostly aware that clicking links from questionable sources, for example in e-mails, isn’t a good idea. However, when it comes to scanning QR codes, people are often much less vigilant. In fact, QR codes can be even more dangerous: while you can check a link with your own eyes before clicking, […]

Bluebell Knife for $41

Expires July 02, 2122 23:59 PST Buy now and get 40% off KEY FEATURES The Bluebell features a unique drop point blade. A long enough blade for a good reach, this knife is excellent for everything outdoors. This is one of those versatile knives that are very easy to love. Fast opening. Outburst assisted opening […]

TikTok Assures U.S. Lawmakers it’s Working to Safeguard User Data From Chinese Staff

Following heightened worries that U.S. users’ data had been accessed by TikTok engineers in China between September 2021 and January 2022, the company sought to assuage U.S. lawmakers that it’s taking steps to “strengthen data security.” The admission that some China-based employees can access information from U.S. users came in a letter sent to nine […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT