AI Might Be The Ultimate Answer To Cyber Threats

In a constantly evolving digital threat landscape firewalls and antiviruses are considered tools of antiquity and now companies are looking to more technologically advanced means of protecting crucial data.

One such firm, UK-based Darktrace, uses machine learning capabilities, advanced algorithms that can adapt and learn, and probabilistic mathematics to learn the normal 'pattern of life' for every user and device in a network and detect anomalies. 

Their technology is modeled after how a human immune system identifies and responds to foreign threats, swiftly and without compromising the human body's key functions.

"The philosophy of our entire portfolio, or our approach, is largely based on this DNA: human immune system," Sanjay Aurora, managing director for Asia Pacific at Darktrace, told CNBC. "How have human beings, for millions of years, thrived and survived? (It) is because of our immune system. Almost every day, we're hit by unknown unknowns, which is the way organizations are also hit ... in terms of viruses and malware."

Experts point out the cyber-threat landscape has drastically changed and that criminals are now using more advanced technologies to launch sophisticated attacks. 

Even a few years ago, launching a distributed denial of service attack to take down a website, defacing webpages and stealing credit card details were considered major instances of cyber-attacks. Today, anything from medical records to airline miles, data that can be sold, are considered targets.

Detecting criminals who have breached a network has become harder because they maintain a low profile once they're inside. A recent report from cybersecurity company FireEye showed organisations on average took 99 days in 2016 to realise they had been breached. While that figure improved notably from the average 146 days it took in 2015, experts say attackers can do a lot of damage within that time.

In the past, attacks were extremely noisy, according to Eric Hoh, president for Asia Pacific Japan at FireEye. "Your computer would stop working and you'd know about it. There'd be a message that'll show on your computer and you'll know about (the attack)," he told CNBC.

Today, Aurora said, attackers are spending weeks, months and years looking for crucial information inside a network. More worryingly, he said, cyber-attackers are focused on not only stealing the data but also altering them without detection. If an attacker can alter a single row or column of data in a database once a month, undetected, in the long run the consequences can be severe because companies would find it hard to distinguish between real and fake. 

For example, if electronic medical records are altered without the knowledge of doctors and nurses, it could potentially lead to misdiagnoses that could put patients' lives in danger.

"This is the real scare, to not just a particular industry of a particular size, but to everybody. It is a matter of existence," said Aurora.

That's where Darktrace's artificial intelligence system comes in, with the latest technology offering called Antigena. Once a threat is identified, Antigena automatically responds by taking proportionate actions to neutralise it and buy security teams enough time to catch up. 

In essence, it acts like a digital antibody that can slow down or stop compromised connections or devices within a network without disrupting normal business operations.

"Human beings are still going to be fundamental, but right now, the kind of attacks, you find it very difficult to figure out and they're so quick that if you look at traditional means, by the time human beings get to respond, it's too late," Aurora explained. The technology has been operational for about a year among early adopters and was made available on a large scale earlier this month.

In February, Australian cyber-security company Nuix put out a report where they surveyed about 70 professional hackers and penetration testers at last year's Defcon, the global hacking and security conference, to understand their perspective on cyber-security.

In the report, about 88 percent of the respondents said they could break through cyber-security defenses and into the systems they target within 12 hours, while another 81 percent said they could identify and take valuable data within the same time frame even when the breach may not be detected for nearly 100 days on average.

The respondents said traditional counter-measures such as firewalls and antiviruses very rarely slowed them down, but having endpoint security technologies were more effective in stopping the attacks. About half said they changed their attacking methods with every target, which limited the effectiveness of security defenses based on known files and attacks.

Darktrace's Aurora said organisations need to invest in a new way of thinking about cyber-defense. "If you still do the same, which is put more resources or investment on the border, or put more investment and resources on rules and signatures which are completely not working out, you will be on the back foot," he said.

Investment in machine learning and artificial intelligence is crucial, according to Aurora, because machines can respond more quickly to the way attacks are mutating.

But that's not the only area that companies should look into. FireEye's Hoh said aside from defense capabilities, companies also need to invest in cyber-intelligence.

Intelligence gathering is very common in the physical world, it is used to protect national security interests of countries, thwart terror attacks and bring down illegal networks in areas such as human and drug trafficking.

"In the cyber-world, intelligence has played, up till now, a less prominent role," said Hoh. "I think that companies need to really pay more attention to knowing your attackers and understanding what valuable information you have that people would want."

Cyber-intelligence could help companies take surgical steps to protect crucial information, instead of having to invest in every piece of technology available, he explained.

Experts agree that companies should understand that breaches are inevitable. "You will get breached, but the question is how would you respond to this breach? Detect and respond is key," said Hoh.

Etay Maor, an executive security advisor at IBM Security, pointed out companies also have to train people to become more aware of digital threats and competent in tackling them. "There's a very painful issue of the people that need to be trained as well. It has to be a combination (of technologies and training)," he told CNBC.

Compounding the problem, a shortage of cyber-security professionals is an issue in most countries. Some universities are only just beginning to offer specialised degrees that would equip people with the necessary skills needed to combat advanced threats.

Meanwhile, experts say organisations have to also build a culture where employees are more aware of possible phishing attacks, for example clicking on suspicious links that would allow an attacker to install a piece of malware inside a computer and compromise the entire network. Indeed, the professional hackers surveyed by Nuix said employee education was an extremely important counter-measure.

Ultimately, as IBM's Maor said, it will become a combination of people, processes and technologies to tackle today's complex cybersecurity landscape. "It's a multi-layered approach," he said.

CNBC: 

You Might Also Read: 

Darktrace Cybersecurity Raises New Funding:

Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar:

AI Ushers In A Whole New Era Of Hacking:

Five Things AI Can Do Better Than Humans:
 

 

« Time To Speak The Language Of Risk
Drones, Satellites And Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

Quantum Squint

Quantum Squint

Quantum Squint is a cutting-edge cybersecurity company specializing in the use of advanced regression management techniques to detect, analyze, and prevent vulnerabilities in digital systems.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.