Table of Contents
Will artificial intelligence replace humans in security?
How to deploy machine learning in cybersecurity
The future of machine learning in cybersecurity
Home Technology peripherals AI How to use machine learning and artificial intelligence in cybersecurity

How to use machine learning and artificial intelligence in cybersecurity

Apr 12, 2023 pm 08:52 PM
AI cyber security

How to use machine learning and artificial intelligence in cybersecurity

Cybercriminals are constantly looking for new ways to carry out attacks, but thanks to artificial intelligence (AI) and its subset, machine learning, it is possible to automatically defend against these attacks.

The secret lies in machine learning’s ability to monitor network traffic and understand what is normal within the system, using this information to flag any suspicious activity. As the technology's name suggests, it's able to leverage the vast amounts of security data businesses collect every day, becoming more effective over time.

At this point, when the machine detects an anomaly, it sends an alert to a human (usually a security analyst) to decide whether action needs to be taken. But some machine learning systems are already able to respond on their own, such as restricting access to certain users.

Will artificial intelligence replace humans in security?

Talk of automation and artificial intelligence often leads to job losses, but for the security industry, machine learning is being deployed to supplement existing expertise , rather than replacing it.

These systems are not designed to work autonomously, but to handle tasks that distract human workers from working effectively. For example, AI is very good at processing data, which can then be used for further analysis, a task that is still very much in need of humans.

However, AI data analysis can also provide other benefits, according to Tash Norris, head of cybersecurity at Moonpig. As a member of the IT Pro team, he said "analysts will naturally look for correlations they have seen before, or correlations they expect to see".

"A true implementation of artificial intelligence should be able to draw 'unbiased' correlations and bring more value from the data sets you have."

The panelists agreed that deploying artificial intelligence The smartest place for intelligence and machine learning systems is in the broad category of detection and response capabilities, including tasks like SIEM, SOAR, and EDR. By automating these more manual processes, employees are freed up to deal with more dangerous threats, using AI as a force multiplier to extend the capabilities of security teams.

Dave Palmer, technical director at Darktrace, said: “Having machine learning allows companies to prioritize more effectively. We don’t exclude human risk decision-making, but we allow for tactical firefighting, so it’s safe Teams can complete the work in their own timeframes."

The Cambridge-based AI startup recently partnered with Microsoft to provide AI-enhanced cybersecurity for organizations transitioning to the cloud. The partnership focuses on solving security challenges in "critical areas" such as email security, data integration, and streamlined security workflows. This includes Microsoft's Azure hosting Antigena Email, which uses Darktrace's artificial intelligence technology to block the most advanced email threats and is also available on the Azure Marketplace.

Dan Feinat, director of email security products at Darktrace, warned that the artificial intelligence startup sees every day "attackers impersonating CEOs or compromising vendor accounts, sending targeted hot messages that look legitimate." e-mail".

"As these attacks become more sophisticated, employee education and awareness are not enough. The answer lies in technology," he added.

Stuart Laidlaw, CEO of British cybersecurity startup Cyberlytic, also advocates using machine learning to ease the workload of security analysts. "It's about reducing the noise: These people are busy with their day jobs, and they can't react to everything. We use machine learning to do triage."

Gene Stevens, co-founder of cloud security company ProtectWise says that where machine learning shows its greatest potential is in interpreting the output of many different expert systems and integrating them together. "Humans spend a lot of time trying to rationalize it. Machine learning is good at taking these patterns and organizing the data, so humans can do a high degree of integration of the traffic on the network."

Machine learning can also be used for user behavior analysis. For example, Jamal Elmellas, chief technology officer at Auriga Consulting, said: "If someone logs in every day at 08:55 and then the time changes to 01:00, the system will flag this as suspicious behavior."

How to deploy machine learning in cybersecurity

As technology continues to evolve, so does the number of viable use cases.

One example is anomaly detection, which is being transformed by automation. This is largely due to the relative ease of applying the technology to the task, as you can start the system with fairly minimal training.

Steven Murdoch, a security architect at VASCO Innovation Center in Cambridge, said: "You feed it a series of data and flag things that look unusual. s things.". "This can then be used for intrusion protection."

Machine learning is also available at low cost: Like the cloud, products are often free to try. Additionally, Laidlaw said companies such as Amazon Web Services (AWS) provide AI components. “Some solutions just plug it in and you can have a couple of data scientists discover anomalies.”

Palmer advises: "Understand how it fits your business. Artificial intelligence as a field is very inclusive; books and training courses are available online."

Of course, as with any new technology All the same, there are some flaws you need to overcome. Not every expert is convinced that machine learning has a bright future in cybersecurity, as cybercriminals can also use artificial intelligence to attack companies. This includes the possibility that hackers can trick a defense system and turn it against its owner.

Machine learning also has its limitations. Charl van der Walt, chief security strategy officer at SecureData, said many cyberattacks don't fit the patterns machine learning is trained to identify. "Adversaries are flexible and changing all the time. Therefore, it is difficult to find data sets with adversarial patterns."

Dr. Yifeng Zeng, leader of the machine intelligence research group at Teesside University, said, Using data to make accurate predictions is the number one challenge. Furthermore, he said: “Using machine learning, companies claim they can handle previous attacks, but how will they handle new attacks? An important question in cybersecurity is predicting future attacks. So, how do we use previous data to identify surprises? Pattern?”

The future of machine learning in cybersecurity

Despite the challenges, cybersecurity experts believe machine learning is here to stay. As technology advances, there may be programs that understand when they are under attack and take steps to protect themselves.

Meanwhile, Palmer said: “Machines could study how humans respond to different types of attacks and how they investigate them. For example, they could make recommendations such as, ‘What would a person in your situation do? Down will take these steps "to serve as a coach or sounding board in a contextually useful way."

Additionally, it has been suggested that machine learning systems will soon be deployed to deceive adversaries rather than just use it to predict what It's a bad thing.

"This requires artificially reshaping your environment to make it a moving target and encourage adversaries to pursue a large number of red herrings," Vanderwalt said.

This may include creating fake targets for the adversary, such as files and systems that look real but are not. “Here’s another way to think about machine learning: Deception is a defensive strategy.”

Back in the day, how could AI and machine learning be part of a company’s cybersecurity strategy? It has a big Potential, but the technology can't be a company's only means of security; it's part of an overall defense. For now, Laidlaw advises: "Know where your crown jewels are, protect what's most valuable, and use AI as part of that protection."

The above is the detailed content of How to use machine learning and artificial intelligence in cybersecurity. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Bytedance Cutting launches SVIP super membership: 499 yuan for continuous annual subscription, providing a variety of AI functions Bytedance Cutting launches SVIP super membership: 499 yuan for continuous annual subscription, providing a variety of AI functions Jun 28, 2024 am 03:51 AM

This site reported on June 27 that Jianying is a video editing software developed by FaceMeng Technology, a subsidiary of ByteDance. It relies on the Douyin platform and basically produces short video content for users of the platform. It is compatible with iOS, Android, and Windows. , MacOS and other operating systems. Jianying officially announced the upgrade of its membership system and launched a new SVIP, which includes a variety of AI black technologies, such as intelligent translation, intelligent highlighting, intelligent packaging, digital human synthesis, etc. In terms of price, the monthly fee for clipping SVIP is 79 yuan, the annual fee is 599 yuan (note on this site: equivalent to 49.9 yuan per month), the continuous monthly subscription is 59 yuan per month, and the continuous annual subscription is 499 yuan per year (equivalent to 41.6 yuan per month) . In addition, the cut official also stated that in order to improve the user experience, those who have subscribed to the original VIP

Context-augmented AI coding assistant using Rag and Sem-Rag Context-augmented AI coding assistant using Rag and Sem-Rag Jun 10, 2024 am 11:08 AM

Improve developer productivity, efficiency, and accuracy by incorporating retrieval-enhanced generation and semantic memory into AI coding assistants. Translated from EnhancingAICodingAssistantswithContextUsingRAGandSEM-RAG, author JanakiramMSV. While basic AI programming assistants are naturally helpful, they often fail to provide the most relevant and correct code suggestions because they rely on a general understanding of the software language and the most common patterns of writing software. The code generated by these coding assistants is suitable for solving the problems they are responsible for solving, but often does not conform to the coding standards, conventions and styles of the individual teams. This often results in suggestions that need to be modified or refined in order for the code to be accepted into the application

Seven Cool GenAI & LLM Technical Interview Questions Seven Cool GenAI & LLM Technical Interview Questions Jun 07, 2024 am 10:06 AM

To learn more about AIGC, please visit: 51CTOAI.x Community https://www.51cto.com/aigc/Translator|Jingyan Reviewer|Chonglou is different from the traditional question bank that can be seen everywhere on the Internet. These questions It requires thinking outside the box. Large Language Models (LLMs) are increasingly important in the fields of data science, generative artificial intelligence (GenAI), and artificial intelligence. These complex algorithms enhance human skills and drive efficiency and innovation in many industries, becoming the key for companies to remain competitive. LLM has a wide range of applications. It can be used in fields such as natural language processing, text generation, speech recognition and recommendation systems. By learning from large amounts of data, LLM is able to generate text

Can fine-tuning really allow LLM to learn new things: introducing new knowledge may make the model produce more hallucinations Can fine-tuning really allow LLM to learn new things: introducing new knowledge may make the model produce more hallucinations Jun 11, 2024 pm 03:57 PM

Large Language Models (LLMs) are trained on huge text databases, where they acquire large amounts of real-world knowledge. This knowledge is embedded into their parameters and can then be used when needed. The knowledge of these models is "reified" at the end of training. At the end of pre-training, the model actually stops learning. Align or fine-tune the model to learn how to leverage this knowledge and respond more naturally to user questions. But sometimes model knowledge is not enough, and although the model can access external content through RAG, it is considered beneficial to adapt the model to new domains through fine-tuning. This fine-tuning is performed using input from human annotators or other LLM creations, where the model encounters additional real-world knowledge and integrates it

To provide a new scientific and complex question answering benchmark and evaluation system for large models, UNSW, Argonne, University of Chicago and other institutions jointly launched the SciQAG framework To provide a new scientific and complex question answering benchmark and evaluation system for large models, UNSW, Argonne, University of Chicago and other institutions jointly launched the SciQAG framework Jul 25, 2024 am 06:42 AM

Editor |ScienceAI Question Answering (QA) data set plays a vital role in promoting natural language processing (NLP) research. High-quality QA data sets can not only be used to fine-tune models, but also effectively evaluate the capabilities of large language models (LLM), especially the ability to understand and reason about scientific knowledge. Although there are currently many scientific QA data sets covering medicine, chemistry, biology and other fields, these data sets still have some shortcomings. First, the data form is relatively simple, most of which are multiple-choice questions. They are easy to evaluate, but limit the model's answer selection range and cannot fully test the model's ability to answer scientific questions. In contrast, open-ended Q&A

SOTA performance, Xiamen multi-modal protein-ligand affinity prediction AI method, combines molecular surface information for the first time SOTA performance, Xiamen multi-modal protein-ligand affinity prediction AI method, combines molecular surface information for the first time Jul 17, 2024 pm 06:37 PM

Editor | KX In the field of drug research and development, accurately and effectively predicting the binding affinity of proteins and ligands is crucial for drug screening and optimization. However, current studies do not take into account the important role of molecular surface information in protein-ligand interactions. Based on this, researchers from Xiamen University proposed a novel multi-modal feature extraction (MFE) framework, which for the first time combines information on protein surface, 3D structure and sequence, and uses a cross-attention mechanism to compare different modalities. feature alignment. Experimental results demonstrate that this method achieves state-of-the-art performance in predicting protein-ligand binding affinities. Furthermore, ablation studies demonstrate the effectiveness and necessity of protein surface information and multimodal feature alignment within this framework. Related research begins with "S

Five schools of machine learning you don't know about Five schools of machine learning you don't know about Jun 05, 2024 pm 08:51 PM

Machine learning is an important branch of artificial intelligence that gives computers the ability to learn from data and improve their capabilities without being explicitly programmed. Machine learning has a wide range of applications in various fields, from image recognition and natural language processing to recommendation systems and fraud detection, and it is changing the way we live. There are many different methods and theories in the field of machine learning, among which the five most influential methods are called the "Five Schools of Machine Learning". The five major schools are the symbolic school, the connectionist school, the evolutionary school, the Bayesian school and the analogy school. 1. Symbolism, also known as symbolism, emphasizes the use of symbols for logical reasoning and expression of knowledge. This school of thought believes that learning is a process of reverse deduction, through existing

SK Hynix will display new AI-related products on August 6: 12-layer HBM3E, 321-high NAND, etc. SK Hynix will display new AI-related products on August 6: 12-layer HBM3E, 321-high NAND, etc. Aug 01, 2024 pm 09:40 PM

According to news from this site on August 1, SK Hynix released a blog post today (August 1), announcing that it will attend the Global Semiconductor Memory Summit FMS2024 to be held in Santa Clara, California, USA from August 6 to 8, showcasing many new technologies. generation product. Introduction to the Future Memory and Storage Summit (FutureMemoryandStorage), formerly the Flash Memory Summit (FlashMemorySummit) mainly for NAND suppliers, in the context of increasing attention to artificial intelligence technology, this year was renamed the Future Memory and Storage Summit (FutureMemoryandStorage) to invite DRAM and storage vendors and many more players. New product SK hynix launched last year

See all articles