Gone are the days of the hobbyist hackermodern malware is a trillion-euro business.
Dr Eva Maia at VisionTechLab, a young cybersecurity firm in Matosinhos, Portugal, said that attacks on computer networks are not only multiplying, they are also growing sneakier.
Malwares typically go unnoticed for months by remaining dormant on infected computers, said Dr Maia. This was recently the case in the Panama Papers attack, where no one knew that the network had been compromised until long after the damage was done.
In the EU-funded SecTrap project, VisionTechLab has been studying the market for a new line of defence that could rob malicious software of its current hiding places.
Conventional antiviruses and firewalls are trained like nightclub bouncers to block known suspects from entering the system. But new threats can be added to the wanted list only after causing trouble. If computers could instead be trained as detectives, snooping around their own circuits and identifying suspicious behaviour, hackers would have a harder time camouflaging their attacks.
The challenge is that machines have traditionally been built to follow orders, not recognise patterns or draw conclusions. Dr Maia is working on advances in artificial intelligence (AI) to change that.
Bootcamp
We are seeing a boom in AI techniques, said Dr Maia. Research that was previously theoretical is now moving from academic laboratories to industry at an unprecedented pace.
Research that was previously theoretical is now moving from academic laboratories to industry at an unprecedented pace.
Dr Eva Maia, VisionTechLab, Portugal
Over the past few years, computers have started driving passenger cars,following voice orders and outmatching humans at identifying faces on photographs. These breakthroughs are the fruit of a new trend in AI based on mimicking living neural networks.
In the same way as our brains sort new information based on past experiences, enough practice data can teach computers to learn, categorise and generalise for themselves.
How many examples are needed to identify a trend can run into astronomical numbers. Fortunately, vast hoards of behavioural data are strewn everyday across the internet by heedless bloggers, commentators and social media users.
Computers learnt their first cognitive functions by devouring terabytesof this online text, sound and images. With the help of recent computing power and the kind of algorithms developed by Dr Maia, they have become so good at identifying content that they now label some of it for us.
The challenge in cybersecurity is to use this ability to distinguish between innocent and malicious behaviour on a computer. For this, Alberto Pelliccione, chief executive of ReaQta, a cybersecurity venture in Valletta, Malta, has found an analogous way of educating by experience.
ReaQta breeds millions of malware programs in a virtual testing environment known as a sandbox, so that algorithms can inspect their antics at leisure and in safety. It is not always necessary to know what they are trying to steal. Just to record the applications that they open and their patterns of operation can be enough.
So that the algorithms can learn about business as usual, they then monitor the behaviour of legal software, healthy computers, and ultimately the servers of each new client. Their lesson never ends. The algorithms continue to learn from their users even after being put into operation.
In doing so, ReaQtas algorithms can assess whether programs or computers are behaving unusually. If they are, they inform human operators, who can either shut them down or study the tactics of the malware infecting them. The objective of the artificial intelligence is not to teach computers what we define as good or bad data, but to spot anomalies, said Pelliccione.
Nowhere to hide
This is welcome news for IT administrators. Cyber criminals typically attack the computer networks of large organisations by compromising the machines of less security-savvy users on their periphery and working their way through to the centre. A few weak links in a sprawling network are difficult to spot and can progressively put an entire company at risk.
To make matters worse, hackers install dormant access points on each machine that they compromise. If security analysts manage to block one, hackers return through another. Dormant access points are notoriously difficult to spot because they do nothing until hackers activate them.
As part of the European ProBOS project, ReaQta has developed software that can be nested at the very core of machines, between their operating system and hardware. Its role is to monitor daily operations in every corner of the system, allowing AI algorithms to sift through ubiquitous data and spot any malicious installation.
ReaQta is licensing the security platform across European and Southeast Asian markets this month. Its first clients are companies that operate over 500 computers simultaneously.
Next year, VisionTechLab plans to release its first AI security services for banks and governments. In the longer term, Dr Maia sees applications for individuals.
For all the benefits of mobile devices, social networking and cloud computing, these technologies are placing more private data at risk. While AI may not yet be capable of guaranteeing its safety, it can now shine a powerful search light on any attempts to steal it.
Cybersecurity is at the heart of the EU's strategy for the Digital Single Market.
The EU's cybersecurity strategy was created to embed cybersecurity into new policies in areas such as automated driving, make the EU a strong player in the cybersecurity market, and ensure that all Member States have similar capabilities to fight cyber crime.
Link:
Artificial intelligence being turned against spyware - Horizon magazine
- Classic reasoning systems like Loom and PowerLoom vs. more modern systems based on probalistic networks - November 8th, 2009 [November 8th, 2009]
- Using Amazon's cloud service for computationally expensive calculations - November 8th, 2009 [November 8th, 2009]
- Software environments for working on AI projects - November 8th, 2009 [November 8th, 2009]
- New version of my NLP toolkit - November 8th, 2009 [November 8th, 2009]
- Semantic Web: through the back door with HTML and CSS - November 8th, 2009 [November 8th, 2009]
- Java FastTag part of speech tagger is now released under the LGPL - November 8th, 2009 [November 8th, 2009]
- Defining AI and Knowledge Engineering - November 8th, 2009 [November 8th, 2009]
- Great Overview of Knowledge Representation - November 8th, 2009 [November 8th, 2009]
- Something like Google page rank for semantic web URIs - November 8th, 2009 [November 8th, 2009]
- My experiences writing AI software for vehicle control in games and virtual reality systems - November 8th, 2009 [November 8th, 2009]
- The URL for this blog has changed - November 8th, 2009 [November 8th, 2009]
- I have a new page on Knowledge Management - November 8th, 2009 [November 8th, 2009]
- N-GRAM analysis using Ruby - November 8th, 2009 [November 8th, 2009]
- Good video: Knowledge Representation and the Semantic Web - November 8th, 2009 [November 8th, 2009]
- Using the PowerLoom reasoning system with JRuby - November 8th, 2009 [November 8th, 2009]
- Machines Like Us - November 8th, 2009 [November 8th, 2009]
- RapidMiner machine learning, data mining, and visualization tool - November 8th, 2009 [November 8th, 2009]
- texai.org - November 8th, 2009 [November 8th, 2009]
- NLTK: The Natural Language Toolkit - November 8th, 2009 [November 8th, 2009]
- My OpenCalais Ruby client library - November 8th, 2009 [November 8th, 2009]
- Ruby API for accessing Freebase/Metaweb structured data - November 8th, 2009 [November 8th, 2009]
- Protégé OWL Ontology Editor - November 8th, 2009 [November 8th, 2009]
- New version of Numenta software is available - November 8th, 2009 [November 8th, 2009]
- Very nice: Elsevier IJCAI AI Journal articles now available for free as PDFs - November 8th, 2009 [November 8th, 2009]
- Verison 2.0 of OpenCyc is available - November 8th, 2009 [November 8th, 2009]
- What’s Your Biggest Question about Artificial Intelligence? [Article] - November 8th, 2009 [November 8th, 2009]
- Minimax Search [Knowledge] - November 8th, 2009 [November 8th, 2009]
- Decision Tree [Knowledge] - November 8th, 2009 [November 8th, 2009]
- More AI Content & Format Preference Poll [Article] - November 8th, 2009 [November 8th, 2009]
- New Planners Solve Rescue Missions [News] - November 8th, 2009 [November 8th, 2009]
- Neural Network Learns to Bluff at Poker [News] - November 8th, 2009 [November 8th, 2009]
- Pushing the Limits of Game AI Technology [News] - November 8th, 2009 [November 8th, 2009]
- Mining Data for the Netflix Prize [News] - November 8th, 2009 [November 8th, 2009]
- Interview with Peter Denning on the Principles of Computing [News] - November 8th, 2009 [November 8th, 2009]
- Decision Making for Medical Support [News] - November 8th, 2009 [November 8th, 2009]
- Neural Network Creates Music CD [News] - November 8th, 2009 [November 8th, 2009]
- jKilavuz - a guide in the polygon soup [News] - November 8th, 2009 [November 8th, 2009]
- Artificial General Intelligence: Now Is the Time [News] - November 8th, 2009 [November 8th, 2009]
- Apply AI 2007 Roundtable Report [News] - November 8th, 2009 [November 8th, 2009]
- What Would You do With 80 Cores? [News] - November 8th, 2009 [November 8th, 2009]
- Software Finds Learning Language Child's Play [News] - November 8th, 2009 [November 8th, 2009]
- Artificial Intelligence in Games [Article] - November 8th, 2009 [November 8th, 2009]
- Artificial Intelligence Resources - November 8th, 2009 [November 8th, 2009]
- Alan Turing: Mathematical Biologist? - April 25th, 2012 [April 25th, 2012]
- BBC Horizon: The Hunt for AI ( Artificial Intelligence ) - Video - April 30th, 2012 [April 30th, 2012]
- Can computers have true artificial intelligence" Masonic handshake" 3rd-April-2012 - Video - April 30th, 2012 [April 30th, 2012]
- Kevin B. Korb - Interview - Artificial Intelligence and the Singularity p3 - Video - April 30th, 2012 [April 30th, 2012]
- Artificial Intelligence - 6 Month Anniversary - Video - April 30th, 2012 [April 30th, 2012]
- Science Breakthroughs - April 30th, 2012 [April 30th, 2012]
- Hitman: Blood Money - Part 49 - Stupid Artificial Intelligence! - Video - April 30th, 2012 [April 30th, 2012]
- Research Members Turned Off By HAARP Artificial Intelligence - Video - April 30th, 2012 [April 30th, 2012]
- Artificial Intelligence Lecture No. 5 - Video - April 30th, 2012 [April 30th, 2012]
- The Artificial Intelligence Laboratory, 2012 - Video - April 30th, 2012 [April 30th, 2012]
- Charlie Rose - Artificial Intelligence - Video - April 30th, 2012 [April 30th, 2012]
- Expert on artificial intelligence to speak at EPIIC Nights dinner - May 4th, 2012 [May 4th, 2012]
- Filipino software engineers complete and best thousands on Stanford’s Artificial Intelligence Course - May 4th, 2012 [May 4th, 2012]
- Vodafone xone™ Hackathon Challenges Developers and Entrepreneurs to Build a New Generation of Artificial Intelligence ... - May 4th, 2012 [May 4th, 2012]
- Rocket Fuel Packages Up CPG Booster - May 4th, 2012 [May 4th, 2012]
- 2 Filipinos finishes among top in Stanford’s Artificial Intelligence course - May 5th, 2012 [May 5th, 2012]
- Why Your Brain Isn't A Computer - May 5th, 2012 [May 5th, 2012]
- 2 Pinoy software engineers complete Stanford's AI course - May 7th, 2012 [May 7th, 2012]
- Percipio Media, LLC Proudly Accepts Partnership With MIT's Prestigious Computer Science And Artificial Intelligence ... - May 10th, 2012 [May 10th, 2012]
- Google Driverless Car Ok'd by Nevada - May 10th, 2012 [May 10th, 2012]
- Moving Beyond the Marketing Funnel: Rocket Fuel and Forrester Research Announce Free Webinar - May 10th, 2012 [May 10th, 2012]
- Rocket Fuel Wins 2012 San Francisco Business Times Tech & Innovation Award - May 13th, 2012 [May 13th, 2012]
- Internet Week 2012: Rocket Fuel to Speak at OMMA RTB - May 16th, 2012 [May 16th, 2012]
- How to Get the Most Out of Your Facebook Ads -- Rocket Fuel's VP of Products, Eshwar Belani, to Lead MarketingProfs ... - May 16th, 2012 [May 16th, 2012]
- The Digital Disruptor To Banking Has Just Gone International - May 16th, 2012 [May 16th, 2012]
- Moving Beyond the Marketing Funnel: Rocket Fuel Announce Free Webinar Featuring an Independent Research Firm - May 23rd, 2012 [May 23rd, 2012]
- MASA Showcases Latest Version of MASA SWORD for Homeland Security Markets - May 23rd, 2012 [May 23rd, 2012]
- Bluesky Launches Drones for Aerial Surveying - May 23rd, 2012 [May 23rd, 2012]
- Artificial Intelligence: What happened to the hunt for thinking machines? - May 25th, 2012 [May 25th, 2012]
- Bubble Robots Move Using Lasers [VIDEO] - May 25th, 2012 [May 25th, 2012]
- UHV assistant professors receive $10,000 summer research grants - May 27th, 2012 [May 27th, 2012]
- Artificial intelligence: science fiction or simply science? - May 28th, 2012 [May 28th, 2012]
- Exetel taps artificial intelligence - May 29th, 2012 [May 29th, 2012]
- Software offers brain on the rain - May 29th, 2012 [May 29th, 2012]
- New Dean of Science has high hopes for his faculty - May 30th, 2012 [May 30th, 2012]
- Cognitive Code Announces "Silvia For Android" App - May 31st, 2012 [May 31st, 2012]
- A Rat is Smarter Than Google - June 5th, 2012 [June 5th, 2012]