Deep Learning & Cybersecurity

The cyber-electronic-scape is a changing environment as current network security measures like signature-based detection techniques, firewalls and sandboxing are failing to keep up.  
 
With corporate networks becoming a prime target for threat actors, software vendors are beginning to use deep learning and other types of AI in cybersecurity. 
 
Much of the progress we’ve seen in artificial intelligence in the past five years is due to deep learning. 
 
Advances in software algorithm models, processing power and dramatically lower costs have put deep learning within reach of more companies, opening the door for broader innovation in products and services, and also supporting the execution of complex business processes.
 
The startup company, Blue Hexagon, has developed a deep-learning-powered network security platform, which was able to detect an Emotet infection as soon as it hit one of Heffernan Insurance Brokers’ servers. Deep learning and neural network technology are some of the most advanced techniques that can be used to help defend an enterprise from threats. Although deep learning was having a significant impact on image and speech recognition, these techniques were not being used in computer security.
 
The company’s deep learning platform focuses on threats that pass through the network. It looks at a packet as they flow through the network and applies deep learning. 
 
The Blue Hexagon deep learning models inspect the complete network flow, payloads, headers, malicious URLs and C2 communications, and are able to deliver threat inference in less than a second, according to the company. Threat prevention can then be enabled on firewalls, endpoint devices and network proxies. However, Gartner analyst Augusto Barros told techtarget.com that “many machine learning implementations, including those using deep learning, can find threats, such as new malware, for example, that has common characteristics with what we already know as malware”. 
 
“They can be very effective in identifying parameters that can be used to identify malware, but first we need to feed them with what we know as malware and also with what we know as not malware so they can learn. New threat types … won’t be magically identified by machine learning.”
 
Nevertheless, there are several advantages of Deep Learning versus the more traditional Machine Learning:
 
  • Deep learning algorithms thrive on big data. The generalisation error bound shrinks as the training data set size increases. This means that while deep learning continues to excel in performance and efficacy, traditional machine learning systems will plateau at some point no matter how much more data you train it with. 
  •  Deep learning models can represent complex non-linear separating functions. Certain tasks require the ability to learn complex concepts, deep learning is the ideal technique to solve this. No feature engineering is required and therefore minimises the likelihood of introducing human bias to the model.  
  • Deep learning can harness parallel computational power to learn better models, with the fast advances of GPUs, deep learning models can be trained and optimised in a more efficient manner than before.
Some other services that have shifted from traditional machine learning to deep learning include face detection, speech recognition and language translation.
 
Blue Hexagon:         I-HLS:
 
You Might Also Read:
 
Artificial Intelligence Or Deep Learning? What's The Difference?:
 
« N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime
Huawei To Be Given 5G Contracts In The UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.