Advanced AI For Cyber Operations

The cyber security landscape is evolving at breakneck speed. With threat levels, the amounts of data being stored and computer power and speeds all significantly increasing. Added to this, the diversity of Internet and network-connected technologies are following an even faster curve. There are some hard truths that many organisations ignore at their own peril.

Most security departments will acknowledge that their resources are already spread too thinly. Now there is an expectation to do much more with even less. Could AI be the answer to extending the value and efficacy of cyber security?

Now the US Defense Advanced Research Projects Agency (DARPA), in conjunction with the Pentagon’s Joint Artificial Intelligence Center (JAIC), are setting their sights on the rapidly expanding intersection of Artificial Intelligence (AI) and cyber security and cyber warfare operations. Development of AI tools and applications for use in the cyber realm is one of several focus areas that DARPA plans to delve further into, as part of the agency’s long-term strategy.

One of the agency’s flagship efforts, the Harnessing Autonomy for Countering Cyber Adversary Systems (HACCS) programme, is making strides in integrating AI-enhanced technologies into cyber operations.

The overall goal of the HACCS programme is the development of “autonomous software agents” capable of countering targeted network attacks by botnet implants, as well as large-scale malware campaigns, according to an agency fact sheet. 
These HACCS software agents “will develop the techniques and algorithms necessary to measure the accuracy of identifying botnet-infected networks, the accuracy of identifying the type of devices residing in a network, and the stability of potential access vectors,” it said.

DARPA is investing more than $2 billion in new and existing programs called the “AI Next” campaign. Key areas of the campaign include automating critical DoD business processes, such as security clearance vetting or accrediting software systems for operational deployment; improving the robustness and reliability of AI systems. 

This means enhancing the security and resiliency of machine learning and AI technologies; reducing power, data, and performance inefficiencies; and pioneering the next generation of AI algorithms and applications, such as “explainability” and common sense reasoning.

 DARPA says AI technologies have demonstrated great value to missions as diverse as space-based imagery analysis, cyberattack warning, supply chain logistics and analysis of microbiologic systems. At the same time, the failure modes of AI technologies are poorly understood. DARPA is working to address this shortfall, with focused R&D, both analytic and empirical. DARPA’s success is essential for the Department to deploy AI technologies, particularly to the tactical edge, where reliable performance is required.

The most powerful AI tool today is machine learning (ML). ML systems can be easily duped by changes to inputs that would never fool a human. 

The data used to train such systems can be corrupted. And, the software itself is vulnerable to cyber-attack. These areas, and more, must be addressed at scale as more AI-enabled systems are operationally deployed.DARPA research aims to enable AI systems to explain their actions, and to acquire and reason with common sense knowledge. The irony of artificial intelligence is how much human brainpower is required to build it. 

DARPA is now creating the next wave of AI technologies that will enable the United States to maintain its technological edge in this critical area.

Recently the University of Texas at Dallas (UT Dallas) researchers received a grant from DARPA to simulate dynamic and unexpected events that can be used to train AI systems, computer systems that emulate human cognition, to adapt to the unpredictable. UT Dallasuse Polycraft World to a modification of the video game Minecraft, was developed by researchers to teach chemistry and engineering. Now the game that allows players to build virtual worlds is serving as the foundation for federal research to develop smarter artificial intelligence (AI) technology. The simulated scenarios could include changing weather or unfamiliar terrain. In response to the COVID-19 pandemic, researchers have added the threat of an infectious disease outbreak.

AI security technologies still require the human component – but the transition is moving security professional activities away from extensive manual checking and configuration into roles of oversight and strategy. The biggest problem in the future is likely to be how to prevent hackers from using variations of the same AI capabilities to perform intrusions and exploits.

DARPA:          Federal News Network:         Janes:         Infosecurity Magazine:     Universtity of Texas:

You Might Also Read:

DARPA To Test Infrastructure Resilience:

 

« Cyber Security Technology Sponsors Formula 1
Cyber Crime Is Growing Very Fast Due To Coronavirus »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.