Artificial Brains to Protect Against Cyberattacks

In cybersecurity, the big challenge is to be able to protect against the millions of new malware variants that are launched daily.

Although nearly all of the zero-day threats are based on extremely small mutations of known malware (by some estimates, the vast majority of new malware are mutated by less than 2% in comparison with known malware), many security solutions are incapable of detecting them because they rely on manually-tuned heuristics for creating handcrafted signatures. This process is time-consuming and reactive, leaving organizations vulnerable until the new signature is released.

Newer solutions such as those based on analysis of the behavioral characteristics of the malware at runtime, or sandboxing solutions that execute the malware in a virtual (sandbox) environment to determine whether it is malicious or not, like legacy solutions present critical limitations in their ability to provide real-time detection. As a result, their detection often comes too late, once the malware has already caused damage.

Cybersecurity solutions that apply machine learning artificial intelligence utilize manually selected features, which are then fed into classical machine learning modules to classify the file as malicious or benign. But despite improvements in the rate and pace of detection, they are still lacking.

Deep learning is the next step in artificial intelligence. It is also known as neural networks because it is “inspired” by the brain’s ability to learn to identify objects. Similar to the way our brain is fed with raw data from our sensory inputs and learns the high-level features on its own, in deep learning, raw data is fed through the deep neural network, which then learns on its own to identify the object on which it is trained.

Recent advancements in deep learning have become possible as a result of major algorithmic improvements, and their implementation on graphical processing units (GPUs), which provide tremendously improved computational capabilities. The advancement in deep learning has enabled technologies that leverage deep learning to exhibit amazing results across applications, such as object, facial, and speech recognition.

When applied to cybersecurity, it takes milliseconds to feed a raw data file and pass it through the deep neural network to obtain detection with the highest accuracy rate. This predictive capability of being able to detect a never- before seen malware variant enables not only extremely accurate detection, but also leads the way to real-time prevention because at the very second a malicious file is detected, it is already blocked.

Therefore, while traditional machine learning yields better results than signatures and manual heuristics, deep learning has shown groundbreaking results in detecting first-seen malware, even compared with classical machine learning. This observation is consistent with improvements achieved by deep learning in other fields, such as computer vision, speech recognition, text understanding, etc.

Furthermore, with deep learning, as opposed to classic machine learning, instead of conducting manual feature engineering, datasets of many millions of malicious and legitimate files are fed into the infrastructure, without any human intervention of feature selection. This enables the technology to learn on its own what are the useful high-level, non-linear features necessary for accurate classification.

Information-Management

« Improved Security For The Internet-of-Things
In The UK Cybercrime Has Overtaken Traditional Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

Cybersprint

Cybersprint

Cybersprint's Digital Risk Protection platform continuously monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take action.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.