Deep Learning & Cybersecurity

The cyber-electronic-scape is a changing environment as current network security measures like signature-based detection techniques, firewalls and sandboxing are failing to keep up.  
 
With corporate networks becoming a prime target for threat actors, software vendors are beginning to use deep learning and other types of AI in cybersecurity. 
 
Much of the progress we’ve seen in artificial intelligence in the past five years is due to deep learning. 
 
Advances in software algorithm models, processing power and dramatically lower costs have put deep learning within reach of more companies, opening the door for broader innovation in products and services, and also supporting the execution of complex business processes.
 
The startup company, Blue Hexagon, has developed a deep-learning-powered network security platform, which was able to detect an Emotet infection as soon as it hit one of Heffernan Insurance Brokers’ servers. Deep learning and neural network technology are some of the most advanced techniques that can be used to help defend an enterprise from threats. Although deep learning was having a significant impact on image and speech recognition, these techniques were not being used in computer security.
 
The company’s deep learning platform focuses on threats that pass through the network. It looks at a packet as they flow through the network and applies deep learning. 
 
The Blue Hexagon deep learning models inspect the complete network flow, payloads, headers, malicious URLs and C2 communications, and are able to deliver threat inference in less than a second, according to the company. Threat prevention can then be enabled on firewalls, endpoint devices and network proxies. However, Gartner analyst Augusto Barros told techtarget.com that “many machine learning implementations, including those using deep learning, can find threats, such as new malware, for example, that has common characteristics with what we already know as malware”. 
 
“They can be very effective in identifying parameters that can be used to identify malware, but first we need to feed them with what we know as malware and also with what we know as not malware so they can learn. New threat types … won’t be magically identified by machine learning.”
 
Nevertheless, there are several advantages of Deep Learning versus the more traditional Machine Learning:
 
  • Deep learning algorithms thrive on big data. The generalisation error bound shrinks as the training data set size increases. This means that while deep learning continues to excel in performance and efficacy, traditional machine learning systems will plateau at some point no matter how much more data you train it with. 
  •  Deep learning models can represent complex non-linear separating functions. Certain tasks require the ability to learn complex concepts, deep learning is the ideal technique to solve this. No feature engineering is required and therefore minimises the likelihood of introducing human bias to the model.  
  • Deep learning can harness parallel computational power to learn better models, with the fast advances of GPUs, deep learning models can be trained and optimised in a more efficient manner than before.
Some other services that have shifted from traditional machine learning to deep learning include face detection, speech recognition and language translation.
 
Blue Hexagon:         I-HLS:
 
You Might Also Read:
 
Artificial Intelligence Or Deep Learning? What's The Difference?:
 
« N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime
Huawei To Be Given 5G Contracts In The UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.