Cybersecurity Firms Deploy AI Against Hackers

Cyber security companies are turning to artificial intelligence and machine learning tools to ward off growing number of attacks on networks, says Finland-based internet security firm F-Secure.

As the world is fast moving towards Internet of Things and connected devices, deployment of Artificial Intelligence (AI) has become inevitable for cyber security firms to analyse huge amount of data to save networks from infiltration attempts, says F-Secure's Security Advisor Sean Sullivan. Networks are persistently exposed to threats like malware, phishing, password breaches and denial of service attacks. 

On a daily basis, F-Secure Labs on an average receives sample data of 500,000 files from its customers that include 10,000 malware variants and 60,000 malicious URLs for analysis and protection, Sullivan said.  

For humans, it is a big task to go through such huge amount of data and machine learning tools and AI are lending a helping hand at this stage. Machine learning can be used to train logic designed to detect suspiciousness based on the structure of a file or its behaviour or both, another Security Advisor Andy Patel said.

Sullivan said any abnormal behaviour of a file is flagged by AI which helps in detecting threats at an early stage without much damage being done to the network. 
 
Patel claimed behaviour models enable them to take preemptive steps to save their customers from ransomware attacks like 'Locky'. When asked if machine tools and AI can make people's jobs in cyber security redundant, Patel said it is unlikely as attacks through malwares are designed by humans who think creatively to bypass automated security solutions. 

So, there is need of humans who can think creatively to defend network from such attacks.

AI and machine learning are at an evolving stage and there is a long way to go for widespread adoption of such tools in cyber security as only big players at present can afford building such systems and improving them every day.

NDTV

You Might Also Read:

AI Attacks Are Just Around The Corner:

AI Might Be The Ultimate Answer To Cyber Threats:

A Response Solution to Cyber Attacks:
 

« US States Turning To Insurance
Staff Training Is Important But Does Not Reduce Cyber Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Six Degrees

Six Degrees

Six Degrees is a leading secure, integrated cloud services provider. We protect UK organisations and help them thrive in the cloud by giving them secure platforms to innovate and grow.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.