Digital transformation continues to multiply the potential attack surface exponentially, bringing new opportunities for the cyber-criminal community. In addition to their expanding arsenal of sophisticated malware and zero day threats, AI and machine learning are new tools being added to their toolbox. To the surprise of almost no-one, AI is being weaponized by cyber adversaries.
Leveraging AI and automation enables bad actors to commit more attacks at a faster rate and that means security teams are going to have to likewise quicken their speed to keep up. Adding fuel to the fire, this is happening in real-time, and were seeing rapid development, so there is little time for deciding whether to deploy your own AI countermeasures.
AI offers cyber actors more bang for the buck
Just like their victims, cyber actors are subject to economic realities: zero day threats can cost upwards of six figures to identify and exploit; developing new threats and malware takes time and can be expensive, as can renting Malware as a Service tools off the dark web. Like anyone else, they are looking to get the most bang for their buck, that means getting the most ROI with the least amount of overhead expenditure, including money, time, and effort, while maximizing the efficiency and efficacy of the tools theyre using.
Using AI and ML enables cyber-criminals to create malware that can self-seek for vulnerabilities and then autonomously determine which payloads will be the most successful without exposing itself through constant communications back to its C2 server.
We have already seen multi-vector attacks combined with advanced persistent threats (APTs) or an array of payloads. AI accelerates the effectiveness of these tools by autonomously learning about targeted systems so attacks can be laser focused rather than taking the usual slower, scattershot approach that can alert a victim that they are under attack.
AI reduces time to breach
We can all expect attacks to become faster than ever before, especially as technologies such as 5G connections are added to networks. 5G also enables edge devices to communicate faster, creating ad hoc networks that are harder to secure and easier to exploit. This can lead to swarm-based attacks where individual elements perform a specific function as part of a larger, coordinated attack.
When you incorporate AI into a network of connected devices that can communicate at 5G speeds, you create a scenario where those devices can not only launch an attack on their own, but customize that attack at digital speeds based on what it learns during the attack process.
With swarm technology, intelligent swarms of bots can share information and learn from each in other in real-time. By incorporating self-learning technologies, cyber-criminals can create attacks capable of quickly assessing vulnerabilities and then apply methods of countering efforts to stop them.
AI-based cyber-attacks will be more affordable
Traditional cyber weapons built by humans can be complex to build. Because of this, they can sell for a lot of money on the dark web. With AI in place, bad actors will be able to build weapons far more quickly, in greater quantity, and with more flexibility than ever before.
This will decrease their black market value, while at the same time, these AI-based weapons will be more plentiful and readily available to a greater number of people. In the age-old battle of quality versus quantity, threat actors will no longer need to choose: quantity will increase while quality will improve as well.
AI is AIs greatest enemy
Solutions that use AI-based strategies are the only effective defense against AI-enhanced attack strategies. However, AI takes time often years and specialized skills to develop and train. It is far more than the specialized scripts many vendors label as AI, because not everyone understands what goes into a legitimate AI solution, enterprises looking to fight fire with fire can be left in a quandary as to which solutions they should select.
This decision is critical, as future cyber battles may evolve into Flash Wars where interactions between defensive and adversarial AI systems become so fast that the attack/defense cycle is over in microseconds. Like traditional stock traders trying to compete against systems that can bid for stocks using algorithms and AI/ML models, network security professionals do not want to have to compete without having the right tools in place.
Preparing now for the coming challenges
Swarm-based network attacks are still likely a couple of years away, but the impact of AI-enhanced threats are right around the corner. Enterprises need to start preparing now for this reality and it starts with basic cybersecurity hygiene. This is about more than just having a patching and updating program in place, it also includes having proper security architectures and segmentation in place to reduce a companys attack surface and prevent hackers from gaining access to the wider system.
Collaboration is another key component to combatting the weaponization of AI. Security solutions need to be able to see and share threat intelligence, and participate in a unified and coordinated response to a detected threat, even across different network ecosystems such as multi-cloud environments.
Deception is another important tool to add to your arsenal, and which will increase in importance as attacks become faster and more sophisticated. Its essentially counterintelligence deploying decoys across the network to lure in attackers and unmask them because theyre unable to tell which assets are real and which are fake.
AI gives security teams the upper hand in the cyber arms race
As threat actors gain decreased latency and more intelligent attack resources, security teams will have to respond with even greater speed and intelligence. Humans alone cannot respond to these coming threats, and neither can the traditional security solutions they have in place. Instead, defensive strategies will have to incorporate advanced automation technology, including ML and AI.
Ultimately, enterprises have far more resources available to them than cyber-criminals do. Teams that can incorporate technologies like machine learning and AI into their cyber defenses will be able to build the quintessential security system that will not only able them to survive, but for the first time ever, gain the upper hand in the escalating cyber war.
Go here to see the original:
Delving Into the Weaponization of AI - Infosecurity Magazine
- Classic reasoning systems like Loom and PowerLoom vs. more modern systems based on probalistic networks - November 8th, 2009 [November 8th, 2009]
- Using Amazon's cloud service for computationally expensive calculations - November 8th, 2009 [November 8th, 2009]
- Software environments for working on AI projects - November 8th, 2009 [November 8th, 2009]
- New version of my NLP toolkit - November 8th, 2009 [November 8th, 2009]
- Semantic Web: through the back door with HTML and CSS - November 8th, 2009 [November 8th, 2009]
- Java FastTag part of speech tagger is now released under the LGPL - November 8th, 2009 [November 8th, 2009]
- Defining AI and Knowledge Engineering - November 8th, 2009 [November 8th, 2009]
- Great Overview of Knowledge Representation - November 8th, 2009 [November 8th, 2009]
- Something like Google page rank for semantic web URIs - November 8th, 2009 [November 8th, 2009]
- My experiences writing AI software for vehicle control in games and virtual reality systems - November 8th, 2009 [November 8th, 2009]
- The URL for this blog has changed - November 8th, 2009 [November 8th, 2009]
- I have a new page on Knowledge Management - November 8th, 2009 [November 8th, 2009]
- N-GRAM analysis using Ruby - November 8th, 2009 [November 8th, 2009]
- Good video: Knowledge Representation and the Semantic Web - November 8th, 2009 [November 8th, 2009]
- Using the PowerLoom reasoning system with JRuby - November 8th, 2009 [November 8th, 2009]
- Machines Like Us - November 8th, 2009 [November 8th, 2009]
- RapidMiner machine learning, data mining, and visualization tool - November 8th, 2009 [November 8th, 2009]
- texai.org - November 8th, 2009 [November 8th, 2009]
- NLTK: The Natural Language Toolkit - November 8th, 2009 [November 8th, 2009]
- My OpenCalais Ruby client library - November 8th, 2009 [November 8th, 2009]
- Ruby API for accessing Freebase/Metaweb structured data - November 8th, 2009 [November 8th, 2009]
- Protégé OWL Ontology Editor - November 8th, 2009 [November 8th, 2009]
- New version of Numenta software is available - November 8th, 2009 [November 8th, 2009]
- Very nice: Elsevier IJCAI AI Journal articles now available for free as PDFs - November 8th, 2009 [November 8th, 2009]
- Verison 2.0 of OpenCyc is available - November 8th, 2009 [November 8th, 2009]
- What’s Your Biggest Question about Artificial Intelligence? [Article] - November 8th, 2009 [November 8th, 2009]
- Minimax Search [Knowledge] - November 8th, 2009 [November 8th, 2009]
- Decision Tree [Knowledge] - November 8th, 2009 [November 8th, 2009]
- More AI Content & Format Preference Poll [Article] - November 8th, 2009 [November 8th, 2009]
- New Planners Solve Rescue Missions [News] - November 8th, 2009 [November 8th, 2009]
- Neural Network Learns to Bluff at Poker [News] - November 8th, 2009 [November 8th, 2009]
- Pushing the Limits of Game AI Technology [News] - November 8th, 2009 [November 8th, 2009]
- Mining Data for the Netflix Prize [News] - November 8th, 2009 [November 8th, 2009]
- Interview with Peter Denning on the Principles of Computing [News] - November 8th, 2009 [November 8th, 2009]
- Decision Making for Medical Support [News] - November 8th, 2009 [November 8th, 2009]
- Neural Network Creates Music CD [News] - November 8th, 2009 [November 8th, 2009]
- jKilavuz - a guide in the polygon soup [News] - November 8th, 2009 [November 8th, 2009]
- Artificial General Intelligence: Now Is the Time [News] - November 8th, 2009 [November 8th, 2009]
- Apply AI 2007 Roundtable Report [News] - November 8th, 2009 [November 8th, 2009]
- What Would You do With 80 Cores? [News] - November 8th, 2009 [November 8th, 2009]
- Software Finds Learning Language Child's Play [News] - November 8th, 2009 [November 8th, 2009]
- Artificial Intelligence in Games [Article] - November 8th, 2009 [November 8th, 2009]
- Artificial Intelligence Resources - November 8th, 2009 [November 8th, 2009]
- Alan Turing: Mathematical Biologist? - April 25th, 2012 [April 25th, 2012]
- BBC Horizon: The Hunt for AI ( Artificial Intelligence ) - Video - April 30th, 2012 [April 30th, 2012]
- Can computers have true artificial intelligence" Masonic handshake" 3rd-April-2012 - Video - April 30th, 2012 [April 30th, 2012]
- Kevin B. Korb - Interview - Artificial Intelligence and the Singularity p3 - Video - April 30th, 2012 [April 30th, 2012]
- Artificial Intelligence - 6 Month Anniversary - Video - April 30th, 2012 [April 30th, 2012]
- Science Breakthroughs - April 30th, 2012 [April 30th, 2012]
- Hitman: Blood Money - Part 49 - Stupid Artificial Intelligence! - Video - April 30th, 2012 [April 30th, 2012]
- Research Members Turned Off By HAARP Artificial Intelligence - Video - April 30th, 2012 [April 30th, 2012]
- Artificial Intelligence Lecture No. 5 - Video - April 30th, 2012 [April 30th, 2012]
- The Artificial Intelligence Laboratory, 2012 - Video - April 30th, 2012 [April 30th, 2012]
- Charlie Rose - Artificial Intelligence - Video - April 30th, 2012 [April 30th, 2012]
- Expert on artificial intelligence to speak at EPIIC Nights dinner - May 4th, 2012 [May 4th, 2012]
- Filipino software engineers complete and best thousands on Stanford’s Artificial Intelligence Course - May 4th, 2012 [May 4th, 2012]
- Vodafone xone™ Hackathon Challenges Developers and Entrepreneurs to Build a New Generation of Artificial Intelligence ... - May 4th, 2012 [May 4th, 2012]
- Rocket Fuel Packages Up CPG Booster - May 4th, 2012 [May 4th, 2012]
- 2 Filipinos finishes among top in Stanford’s Artificial Intelligence course - May 5th, 2012 [May 5th, 2012]
- Why Your Brain Isn't A Computer - May 5th, 2012 [May 5th, 2012]
- 2 Pinoy software engineers complete Stanford's AI course - May 7th, 2012 [May 7th, 2012]
- Percipio Media, LLC Proudly Accepts Partnership With MIT's Prestigious Computer Science And Artificial Intelligence ... - May 10th, 2012 [May 10th, 2012]
- Google Driverless Car Ok'd by Nevada - May 10th, 2012 [May 10th, 2012]
- Moving Beyond the Marketing Funnel: Rocket Fuel and Forrester Research Announce Free Webinar - May 10th, 2012 [May 10th, 2012]
- Rocket Fuel Wins 2012 San Francisco Business Times Tech & Innovation Award - May 13th, 2012 [May 13th, 2012]
- Internet Week 2012: Rocket Fuel to Speak at OMMA RTB - May 16th, 2012 [May 16th, 2012]
- How to Get the Most Out of Your Facebook Ads -- Rocket Fuel's VP of Products, Eshwar Belani, to Lead MarketingProfs ... - May 16th, 2012 [May 16th, 2012]
- The Digital Disruptor To Banking Has Just Gone International - May 16th, 2012 [May 16th, 2012]
- Moving Beyond the Marketing Funnel: Rocket Fuel Announce Free Webinar Featuring an Independent Research Firm - May 23rd, 2012 [May 23rd, 2012]
- MASA Showcases Latest Version of MASA SWORD for Homeland Security Markets - May 23rd, 2012 [May 23rd, 2012]
- Bluesky Launches Drones for Aerial Surveying - May 23rd, 2012 [May 23rd, 2012]
- Artificial Intelligence: What happened to the hunt for thinking machines? - May 25th, 2012 [May 25th, 2012]
- Bubble Robots Move Using Lasers [VIDEO] - May 25th, 2012 [May 25th, 2012]
- UHV assistant professors receive $10,000 summer research grants - May 27th, 2012 [May 27th, 2012]
- Artificial intelligence: science fiction or simply science? - May 28th, 2012 [May 28th, 2012]
- Exetel taps artificial intelligence - May 29th, 2012 [May 29th, 2012]
- Software offers brain on the rain - May 29th, 2012 [May 29th, 2012]
- New Dean of Science has high hopes for his faculty - May 30th, 2012 [May 30th, 2012]
- Cognitive Code Announces "Silvia For Android" App - May 31st, 2012 [May 31st, 2012]
- A Rat is Smarter Than Google - June 5th, 2012 [June 5th, 2012]