Artificial Brains to Protect Against Cyberattacks

In cybersecurity, the big challenge is to be able to protect against the millions of new malware variants that are launched daily.

Although nearly all of the zero-day threats are based on extremely small mutations of known malware (by some estimates, the vast majority of new malware are mutated by less than 2% in comparison with known malware), many security solutions are incapable of detecting them because they rely on manually-tuned heuristics for creating handcrafted signatures. This process is time-consuming and reactive, leaving organizations vulnerable until the new signature is released.

Newer solutions such as those based on analysis of the behavioral characteristics of the malware at runtime, or sandboxing solutions that execute the malware in a virtual (sandbox) environment to determine whether it is malicious or not, like legacy solutions present critical limitations in their ability to provide real-time detection. As a result, their detection often comes too late, once the malware has already caused damage.

Cybersecurity solutions that apply machine learning artificial intelligence utilize manually selected features, which are then fed into classical machine learning modules to classify the file as malicious or benign. But despite improvements in the rate and pace of detection, they are still lacking.

Deep learning is the next step in artificial intelligence. It is also known as neural networks because it is “inspired” by the brain’s ability to learn to identify objects. Similar to the way our brain is fed with raw data from our sensory inputs and learns the high-level features on its own, in deep learning, raw data is fed through the deep neural network, which then learns on its own to identify the object on which it is trained.

Recent advancements in deep learning have become possible as a result of major algorithmic improvements, and their implementation on graphical processing units (GPUs), which provide tremendously improved computational capabilities. The advancement in deep learning has enabled technologies that leverage deep learning to exhibit amazing results across applications, such as object, facial, and speech recognition.

When applied to cybersecurity, it takes milliseconds to feed a raw data file and pass it through the deep neural network to obtain detection with the highest accuracy rate. This predictive capability of being able to detect a never- before seen malware variant enables not only extremely accurate detection, but also leads the way to real-time prevention because at the very second a malicious file is detected, it is already blocked.

Therefore, while traditional machine learning yields better results than signatures and manual heuristics, deep learning has shown groundbreaking results in detecting first-seen malware, even compared with classical machine learning. This observation is consistent with improvements achieved by deep learning in other fields, such as computer vision, speech recognition, text understanding, etc.

Furthermore, with deep learning, as opposed to classic machine learning, instead of conducting manual feature engineering, datasets of many millions of malicious and legitimate files are fed into the infrastructure, without any human intervention of feature selection. This enables the technology to learn on its own what are the useful high-level, non-linear features necessary for accurate classification.

Information-Management

« Improved Security For The Internet-of-Things
In The UK Cybercrime Has Overtaken Traditional Crime »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.