Advanced AI For Cyber Operations

The cyber security landscape is evolving at breakneck speed. With threat levels, the amounts of data being stored and computer power and speeds all significantly increasing. Added to this, the diversity of Internet and network-connected technologies are following an even faster curve. There are some hard truths that many organisations ignore at their own peril.

Most security departments will acknowledge that their resources are already spread too thinly. Now there is an expectation to do much more with even less. Could AI be the answer to extending the value and efficacy of cyber security?

Now the US Defense Advanced Research Projects Agency (DARPA), in conjunction with the Pentagon’s Joint Artificial Intelligence Center (JAIC), are setting their sights on the rapidly expanding intersection of Artificial Intelligence (AI) and cyber security and cyber warfare operations. Development of AI tools and applications for use in the cyber realm is one of several focus areas that DARPA plans to delve further into, as part of the agency’s long-term strategy.

One of the agency’s flagship efforts, the Harnessing Autonomy for Countering Cyber Adversary Systems (HACCS) programme, is making strides in integrating AI-enhanced technologies into cyber operations.

The overall goal of the HACCS programme is the development of “autonomous software agents” capable of countering targeted network attacks by botnet implants, as well as large-scale malware campaigns, according to an agency fact sheet. 
These HACCS software agents “will develop the techniques and algorithms necessary to measure the accuracy of identifying botnet-infected networks, the accuracy of identifying the type of devices residing in a network, and the stability of potential access vectors,” it said.

DARPA is investing more than $2 billion in new and existing programs called the “AI Next” campaign. Key areas of the campaign include automating critical DoD business processes, such as security clearance vetting or accrediting software systems for operational deployment; improving the robustness and reliability of AI systems. 

This means enhancing the security and resiliency of machine learning and AI technologies; reducing power, data, and performance inefficiencies; and pioneering the next generation of AI algorithms and applications, such as “explainability” and common sense reasoning.

 DARPA says AI technologies have demonstrated great value to missions as diverse as space-based imagery analysis, cyberattack warning, supply chain logistics and analysis of microbiologic systems. At the same time, the failure modes of AI technologies are poorly understood. DARPA is working to address this shortfall, with focused R&D, both analytic and empirical. DARPA’s success is essential for the Department to deploy AI technologies, particularly to the tactical edge, where reliable performance is required.

The most powerful AI tool today is machine learning (ML). ML systems can be easily duped by changes to inputs that would never fool a human. 

The data used to train such systems can be corrupted. And, the software itself is vulnerable to cyber-attack. These areas, and more, must be addressed at scale as more AI-enabled systems are operationally deployed.DARPA research aims to enable AI systems to explain their actions, and to acquire and reason with common sense knowledge. The irony of artificial intelligence is how much human brainpower is required to build it. 

DARPA is now creating the next wave of AI technologies that will enable the United States to maintain its technological edge in this critical area.

Recently the University of Texas at Dallas (UT Dallas) researchers received a grant from DARPA to simulate dynamic and unexpected events that can be used to train AI systems, computer systems that emulate human cognition, to adapt to the unpredictable. UT Dallasuse Polycraft World to a modification of the video game Minecraft, was developed by researchers to teach chemistry and engineering. Now the game that allows players to build virtual worlds is serving as the foundation for federal research to develop smarter artificial intelligence (AI) technology. The simulated scenarios could include changing weather or unfamiliar terrain. In response to the COVID-19 pandemic, researchers have added the threat of an infectious disease outbreak.

AI security technologies still require the human component – but the transition is moving security professional activities away from extensive manual checking and configuration into roles of oversight and strategy. The biggest problem in the future is likely to be how to prevent hackers from using variations of the same AI capabilities to perform intrusions and exploits.

DARPA:          Federal News Network:         Janes:         Infosecurity Magazine:     Universtity of Texas:

You Might Also Read:

DARPA To Test Infrastructure Resilience:

 

« Cyber Security Technology Sponsors Formula 1
Cyber Crime Is Growing Very Fast Due To Coronavirus »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DigiCert

DigiCert

DigiCert is the only provider of enterprise-grade SSL, IoT and PKI solutions. Our certificates are trusted everywhere, millions of times every day, by companies across the globe.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.