The Risk Of AI Being Used For Offensive Purposes

Apart from a few leading-edge companies, the deployment of Artificial Intelligence (AI) in business has been slower that it supporters might have hoped for. Whereas governments and their intelligence and security agencies are committed to use AI  to help deal with threats from criminals and hostile states which use AI to strengthen their own attacks, they are evidently not yet on top of AI.

A study, undertaken by Forrester Consulting on behalf of Darktrace, has revealed that around half of executives are worried about the use of AI to attack both their digital and hardware systems.

Today’s cybersecurity threats are incredibly smart and sophisticated. Security experts face a daily battle to identify and assess new risks, identify possible mitigation measures and decide what to do about the residual risk. This next generation of cyber security threats require agile and intelligent programs that can rapidly adapt to new and unforeseen attacks. Indeed, AI is no longer a tool only for the “good guys”; malicious actors now use it as a force multiplier as well.

A Complex Environment

It’s increasingly common for organisations to have a multi-faceted digital infrastructure that contains hybrid, multi-cloud and IoT environments. The growing complexity of their working environment, with an expanded infrastructure leading to a significant growth in security challenges that are only compounded by the speed and sophistication of attacks. 

This provides a multitude of operational benefits, but it also provides an ever growing expanse to protect and secure from attacks. 

In fact, the Forrester report finds that 83% of executives think that their digital infrastructure had expanded in such a way as to make developing a unified security strategy significantly harder. Nowhere is this complexity more evident than in the growth in AI-enabled attacks.

The report highlights how machines are already commonly attacking machines, but that it’s increasingly common for machines to successfully attack humans, and this new approach is something that businesses aren’t ready for. “It’s no surprise that 86% of cyber security decision makers are concerned with threat actors leveraging AI to supercharge attacks and a further 88% believe it’s inevitable for AI-driven attacks to go mainstream.” the report concludes.

A Losing Battle

Many corporate cyber security teams are at risk of fighting yesterday’s battles, where their traditional defenses are reliant upon outdated attack scenarios which are no longer resistant to AI-powered attacks. There are signs that things are changing, however, or at least, that there is a need for change.  There’s a growing appreciation for the need for speed, both in identifying attacks and then responding to them. Despite this, less than 25% of businesses said they could recover from an attack in less than 3 hours.

Organisations need to develop the capability to detect, interpret, and respond to attacks as quickly and nimbly as the attackers are themselves acting.

As the breadth of infrastructure grows, the number of vulnerabilities grows alongside it, and so organisations have to adopt an agile approach to keeping their infrastructure safe. As well as the lightning speed of AI-driven attacks, executives also worried about the nature of attacks, with two thirds expecting offensive AI to conduct attacks that no human could conceive of. 
They expect these attacks to be unpredictable and stealthy, therefore evading more traditional security measures that reference historical attacks. Many expect to utilise AI in a defensive capacity, with a machine learning approach used to upgrade defences far faster than humans could manage. “The real issue with this is that because AI moves faster and better than current legacy defenses, the “evil AI” will win in most instances.”he report says. 

The use of AI to both protect and attack digital systems is an inevitability of the modern age, but the lack of strategic focus on cybersecurity renders many organisations more vulnerable than they need to be. In a digital arms race,

AI tooling and capabilities are no longer nice to haves, but should be fundamental parts of the security toolkit. 

While there is a growing awareness of this requirement, it remains to be seen how many cyber security managers are given the tools and resources they need to maintain the security of their systems.

AI & Machine Learning

AI and machine learning technologies address these challenges and are giving rise to new possibilities for cyber security threat protection.  AI in cyber security plays an important role in threat detection, pattern recognition, and response time reduction. Adopting AI in cyber security offers better solutions when it comes to analysing massive quantities of data, speeding up response times, and increasing efficiency of often under-resourced security teams.

AI is designed and trained to collect, store, analyse and process significant amounts of data from both structured and unstructured sources.

Deploying technologies such as machine learning and deep learning allows the AI to constantly evolve and improve its knowledge about cybersecurity threats and cyber risk. For example, by recognising patterns in our environment and applying complex analytics, AI enables us to automatically flag unusual patterns and enable detection of network problems and cyber-attacks in real-time. 

This visibility supplies deeper insights into the threat landscape which in turn informs the machine learning. This means that AI-based security systems are constantly learning, adapting and improving.

Darktrace:        Cyber News:      ZDNet:      Information Security Buzz

You Might Also Read: 

Artificial Intelligence – A Brief History (£)

« Analysts Detect New Bank Malware
What Is A Cyber Security Audit? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

National Forensic Sciences University (NFSU)

National Forensic Sciences University (NFSU)

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.