Subscribe to RSS - Machine Learning

Machine Learning

Artificial Intelligence (AI) necessary to respond to cyberattacks

 - 
Wednesday, July 24, 2019

Being born in the late 70s, it’s been amazing to watch the evolution of computers, the Internet, cyber and the like. I remember sitting in my junior high computer class—7th grade, I believe. Working with Basic on an Apple 2e, I created white coding on a black screen that made a man (stick figure) jump, dance and run when the user got the correct answer to the math problem presented on the screen. That, my friends, was high tech! 

Now, the graphics are realistic and some even interact with voice; data is being produced and shared at the rate of zettabytes; and computers are turning into machine learners, all of which is absolutely amazing but at the same time scary as bad people have turned it into a free-for-all of mass hacking that is detrimental to people and society. 

Human security experts work tirelessly each and every day to keep people like you and me, and the world safe; however, being human, they have their limits. For example, cybersecurity involves repetitiveness and tediousness, scouring through big data to identify anomalous data points; long, exhausting hours of data analysis; and relentlessly monitoring data going in and out of enterprise networks. Enter the age of artificial intelligence (AI) penetrating into the cyber realm in terms of security, obviously known collectively as cybersecurity. Working along-side humans, AI can complement cybersecurity by performing the repetitive, tedious tasks; it can be trained to take predefined steps against attacks and learn the most ideal responses going forward; and AI is fast and accurate with data analysis. This enables and empowers human security experts to use their talents and skills on other projects to further enhance cybersecurity. 

Capgemini, a global leader in consulting, technology services and digital transformation, recently published “Reinventing Cybersecurity with Artificial Intelligence Report,” finding 61 percent of enterprises said they cannot detect breach attempts today without the use of AI technologies. That’s over half of the 850 senior executives surveyed from IT information security, cybersecurity and IT operations in seven sectors across 10 countries. And if that’s not eye-opening enough, check out these findings: 

  • 69 percent believe AI will be necessary to respond to cyberattacks; 
  • 73 percent are testing AI use cases for cybersecurity; 
  • 64 percent said AI lowers the cost and reduces overall time taken to detect and respond to breaches by 12 percent; and
  • 56 percent said their cybersecurity analysts are overwhelmed and approximately 23 percent are not able to successfully investigate all identified incidents. 

With numbers like these, it’s easy to see AI and machine learning are essential to cybersecurity now and into the future. So, here at SSN, we’ve taken a huge step to bring you the latest and greats cybersecurity news with the addition of a “cybersecurity” tab on our website. Yep, that’s right … a whole section dedicated to all things cybersecurity!

To get a taste of our cybersecurity content check out the articles “Federal government aims to modernize physical security practices” and “Data forensics: time is of the essence,” and as always, we value your feedback. 

 

 

Honeywell enters into brave new world of AI

SSN speaks with company about working with Intel and overall vision for AI
 - 
05/22/2019

ATLANTA—Following the recent announcement of its technology integration with Intel, which will enable new artificial intelligence (AI) capabilities in its MAXPRO connected security platform, it is clear that Honeywell is jumping with both feet into the brave new world of AI.

Open Security & Safety Alliance membership doubles; open platform initiatives surge forward

 - 
05/07/2019

SAN RAMON, Calif.—In the Fall of 2018, five companies — Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco by Schneider Electric and VIVOTEK, Inc. — came together for the good of the open platform community, becoming founding companies of the Open Security & Safety Alliance (OSSA), or simply, “the Alliance.”

AI coming to the aid of security-related applications

 - 
Wednesday, March 20, 2019

Our May 2019 News Poll got me really thinking about Artificial Intelligence (AI) and Machine Learning (ML), and the possibilities. My previous AI-related thoughts have been around Watson, the IBM-created, question-answering computer system that answers in natural language, and robots, and how AI can take over the world one day, according to some! Spooky! But, I wanted to know if AI is a legit, practical application for security-related functions, so I scoured the internet and found some exciting and unique, currently deployed uses. 

Physical Security

According the to China Morning Post, AI is revolutionizing physical security in Asia. It can detect people acting out of the ordinary and flag them, and then transmit that information to a command center, where human operators can make an informed decision. Additionally, AI and high-definition cameras can work together to first communicate to a human that a smoke detector, for example, has been activated, with the cameras identifying the exact location of the fire. 

Financial Security

Shoplifting literally costs billions of dollars here in the United States, which trickles down to honest consumers who end up paying more for goods and services. Vaak, a Tokyo-based company, spent more than 100 hours showing their AI system closed-circuit television footage of honest shoppers and shoplifters. The system can now identify suspicious activity based on more than 100 aspects of shoppers’ behavior including gait, hand movements, facial expressions, clothing choices and even “restless” and “sneaking” behaviors. Store employees are alerted of suspiciousness via an app and they can decide what to do. 

Life Security

Paris-based startup, Pharnext, was founded by Daniel Cohen, who “mapped” the human genome and demonstrated it is possible to use Big Data and automation to speed up the processing of DNA samples. Today, Cohen is using AI to analyze and map the chain of reactions of disease in the body. With this information, he and his team are combining existing drugs, known as “repurposing,” to create therapeutic effects that each drug lacks on its own. His overall goal is to use existing medicines to treat all disease, preventing the design of new medicines. 

Cybersecurity

Post-doctoral research fellow at Stanford University, Dr. Srijan Kuman, is developing an AI method — REV2 — to identify online conflict using data and machine learning to predict internet trolling before it happens. (Trolling is an action by a person who posts inflammatory and often deceptive and disinformation online to provoke others to respond on pure emotion.) Kuman uses statistical analysis, graph mining, embedding and deep learning to determine normal and malicious behaviors. His method is currently being used by Flipkart, an online store, to identify fake reviews and reviewers, and he was able to accurately predict when one Reddit community will troll another. 

Be sure to check out our editor’s blog that talks about worldwide spending on AI systems to reach $35.8 billion in 2019, according to International Data Corporation. 

 

New tech holds the key to stopping cybercrime, study finds

 - 
Tuesday, February 12, 2019

You don’t have to look too hard to find a sobering example of cybercrime, as it's as pervasive as ever these days, even on the national level with recent reports that cyber criminals have access to critical infrastructure such as our national power grids and gas lines. The good news, though, is technology may be our best weapon against these invisible criminals.

In fact, the use of big data and blockchain technologies are key to fighting cybercrime, according to a new study from Frost & Sullivan that looks at how effective machine learning is in aiding early detection of cyber anomalies, and how good blockchain is at creating a trustworthy network between endpoints.

Frost and Sullivan noted that the rise of the Internet of Things has opened up numerous points of vulnerabilities, compelling cybersecurity companies, especially startups, to develop innovative solutions to protect enterprises from emerging threats. As cybercrime becomes more sophisticated and even a method of warfare, the research firm found, technologies such as machine learning, big data, and blockchain will become prominent.

"Deploying Big Data solutions is essential for companies to expand the scope of cybersecurity solutions beyond detection and mitigation of threats,” Hiten Shah, research analyst, TechVision, said in the announcement of the findings. "This technology can proactively predict breaches before they happen, as well as uncover patterns from past incidents to support policy decisions."

The study, Envisioning the Next-Generation Cybersecurity Practices, presents an overview of cybersecurity in enterprises and analyzes the drivers and challenges to the adoption of best practices in cybersecurity. It also covers the technologies impacting the future of cybersecurity and the main purchase factors.

"Startups need to make their products integrable with existing products and solutions as well as bundle their solutions with market-leading solutions from well-established companies," noted Shah. "Such collaborations will lead to mergers and acquisitions, ultimately enabling companies to provide more advanced solutions."

Technologies that are likely to find the most application opportunities include:

•    Big Data: It enables automated risk management and predictive analytics. Its  adoption will be mostly driven by the need to identify usage and behavioral patterns to help security operations spot anomalies.
•    Machine Learning: It allows security teams to prioritize corrective actions and automate real-time analysis of multiple variables. Using the vast pools of data collected by companies, machine-learning algorithms can zero in on the root cause of the attack and fix detected anomalies in the network.
•    Blockchain: The data stored on blockchain cannot be manipulated or erased by design. The tractability of activities performed on blockchain is integral to establishing a trustworthy network between endpoints. Furthermore, the decentralized nature of blockchain greatly increases the cost of breaching blockchain-based networks, which discourages hackers.

Envisioning the Next-Generation Cybersecurity Practices is part of Frost & Sullivan’s global Information & Communication Growth Partnership Service program.