AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI is helping Darktrace fight the good fight against the bad guys in the cyber world, but AI cyber security does it by understanding networks; it doesn’t need to look for a viruses signature, then again, cyber criminals are adopting AI too, or so according to Darktrace’s Max Heinemeyer.

There is a shortage of talent, and personalisation in the new mantra. Everyone who works in tech knows this. But it is not just a problem for legitimate business, it is a problem for cyber criminals too, how do they address the staff shortage?

You may not have too much sympathy for them, but they can relax, take it easy, for they have a friend in AI for cyber. And that makes them formidable indeed.

“Cyber-crime is a perfect market,” says Max Heinemeyer, Director of Threat Hunting at Darktrace.  He explained: “Whatever works, if phishing works, they go for it. If ransomware works, they go for it. If crypto currency works, they go for it. Whatever makes the big bucks, they go for it.”

It also turns out that thanks to AI, cyber-crime is really good at personalising; so if you are a CEO, then ransomware might work quite well for the cybercriminal, stealing data from your machine might be lucrative too, but putting a bitcoin mining tool on your machine is a wasted opportunity. 

But if there is a server used only occasionally for development work, and then it just sits around collecting dust, processing very little, then installing a bitcoin miner, might be a very good enterprise for the cybercriminal. And AI can help the recruiting-challenged cybercriminal achieve this.

Max should know, he used to be an ethical hacker, a penetration tester, and an also ex-member of the Chaos Computer Club he knows a thing or two about what cyber criminals are up to and, he, along with his team of 30 odd people scattered around the world, hunt down cyber threats. But how can they do it? 

The cyber world is vast, you can count the numbers of experts in Max’s team without having to draw breath. The answer: AI, or AI for cyber. That’s what Darktrace is good at.

The company was founded five years ago, that may seem recent to any reader who left school before the iPhone was launched, but in the world of AI, that is positively ancient history. Max has been with the company for three years, making him a veteran. 

When he joined he was employee number 120, now there are almost a thousand employees. And the company, which recently completed its latest funding round, this time rustling up $50 million, has a valuation of $1.6 billion. It’s technology has been deployed in over 7,000 networks, R&D is headquarter in HQ Cambridge but the company has offices in over 33 countries, with a dual HQ in the UK and in San Francisco.

The company was founded by three very different types: ex spooks, boffins and the money. Max put it this way: “Ex intelligence people, from GCHQ, and MI5 and other agencies trying to focus on cybercrime, catching hackers, concluded that they needed to change the legacy approach to cyber security. 

“So instead of looking for signatures and rules, which clearly does not scale, while at the same time there was a huge skill gap, they looked for another way. The spooks realised they needed to change something, so they approached Cambridge Mathematicians, working in AI and Machine Learning, and asked ‘can we work together?’ Investors then completed the three-way convergence, so that the company could have the sales force and marketing it needed.”

“You can never anticipate tomorrow,” says Max Heinemeyer “so you need an army of people keeping up to date with signature and rules.”

So how does it work?

“We use what we call the enterprise immune system; a very simple analogy which underlines how Darktrace works, relates to understanding cells, instead of looking for what bad looks like, it understands networks, it understands the information age. Drax, the company behind the massive power station was one if its first customers. And working in that way, Darktrace earned its spurs. And it works by spotting a deviation, as soon as a deviation occurs and attacks, entering a network, it can spot the deviation in behaviour.

So, for example, it may know that a certain individual logs in between 7am and 9am every morning, and goes to Facebook and Instagram, and uses HTPS encryption. Darktrace understand all of this; but if a lot of data is then sent by this individual to an usual website, or it starts making connections to weird servers in in say Germany, US, China, Russia or Japan, Darktrace will highlight that.

Diversity may be part of Darktrace’s success. Its founder, Poppy Gustafsson and CEO Nicole Eagan, are both female. In Max’s team, the split is 40% women 60% men.

Puppet masters for the internet

“It’s not the kid working in their parent’s basement anymore, if we think about the most sophisticated human attacks, they try to blend as stealthily as possible. These subtle-nation driven attacks are sophisticated, the people behind them know what they are doing. They are like puppet masters for the internet.”

Max says that they “live off the land”, they don’t operate from a server in say Russia, but from the cloud. They stay very low and move around very stealthily.

And from this, he makes a prediction. The AI driven tools cannot make judgement calls as they are automated. We believe that AI driven malware will start understanding context.

“The most the advanced attackers, sit there, they listen, they see what you are doing, they understand ‘oh, this person doesn’t talk to finance very often so I will move around to say Amy’s computer. And Malware can learn to do the same. Narrow AI, like Darktrace understands context, what is normal for a given device, or a normal network or normal environment.”

“If you put yourself in the shoes of a malicious nation stage, then their work is very human capital intensive, you need a lot of very skilled hackers, somebody who can use the tools, to understand Windows, Linux, to move around and attack stealthily. 

“But what if the human attackers, can use a piece of malware to understand by itself, say, that a specific target watches a bit of Netflix on a Friday, so they may create a website similar to Netflix, so by understanding what is normal, hackers can scale much more effectively, and hack into say hundreds of organisations.

“So AI can solve the skill shortage of cyber criminals and personalise its activity.”

So if the more sophisticated cyber criminals are moving to AI, that leaves companies trying to resist, with little alternative, but to adopt AI-cyber too.

Information Age:

You Might Also Read:

Darktrace Describe The Alarming Future AI Attack Scenario

« Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis
Journalists Aim To Detect Deepfakes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.