{"id":183479,"date":"2017-03-17T07:20:15","date_gmt":"2017-03-17T11:20:15","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/pentagon-sees-more-ai-involvement-in-cybersecurity-defense-systems\/"},"modified":"2017-03-17T07:20:15","modified_gmt":"2017-03-17T11:20:15","slug":"pentagon-sees-more-ai-involvement-in-cybersecurity-defense-systems","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/pentagon-sees-more-ai-involvement-in-cybersecurity-defense-systems\/","title":{"rendered":"Pentagon sees more AI involvement in cybersecurity &#8211; Defense Systems"},"content":{"rendered":"<p><p>    Cyber Defense  <\/p>\n<p>    As the Pentagons Joint Regional Security Stacks moves forward    with efforts to reduce the server footprint, integrate regional    data networks and facilitate improved interoperability between    previously stove-piped data systems, IT developers see    cybersecurity efforts moving quickly toward increased    artificial intelligence (AI) technology.  <\/p>\n<p>    I think within the next 18-months, AI will become a key factor    in helping human analysts make decisions about what to do,    former DOD Chief Information Officer Terry Halvorsen said.  <\/p>\n<p>    As technology and advanced algorithms progress, new autonomous    programs able to perform a wider range of functions by    themselves are expected to assist human programmers and    security experts defending DOD networks from intrusions and    malicious actors.  <\/p>\n<p>    Given the volume and where I see the threat moving, it will be    impossible for humans by themselves to keep pace, Halvorsen    added.  <\/p>\n<p>    Much of the conceptual development surrounding this AI    phenomenon hinges upon the recognition that computers are often    faster and more efficient at performing various procedural    functions; at the same time, many experts maintain that human    cognition is important when it comes to solving problems    or responding to fast-changing, dynamic situations.  <\/p>\n<p>    However, in some cases, industry is already integrating    automated computer programs designed to be deceptive  giving    potential intruders the impression that what they are probing    is human activity.  <\/p>\n<p>    For example, executives from the cybersecurity firm Galois are    working on a more sophisticated version of a honey pot    tactic, which seeks to create an attractive location for    attackers, only to glean information about them.  <\/p>\n<p>    Honey pots are an early version    ofcyberdeception. We are expanding on that concept    and broadening it greatly, said Adam Wick, research head at    Galois.  <\/p>\n<p>    A key element of these techniques uses computer automation to    replicate human behavior to confuse a malicious actor, hoping    to monitor or gather information from traffic going across a    network.  <\/p>\n<p>    Its goal is to generate traffic that misleads the attacker, so    that the attacker cannot figure out what is real and what is    not real, he added.  <\/p>\n<p>    The method generates very human looking web sessions, Wick    explained. An element of this strategy is to generate automated    or fake traffic to mask web searches and servers so that    attackers do not know what is real.  <\/p>\n<p>    Fake computers look astonishingly real, he said. We have not    to date been successful in always keeping people off of our    computers. How can we make the attackers job harder once they    get to the site, so they are not able to distinguish useful    data from junk.  <\/p>\n<p>    Using watermarks to identify cyber behavior of malicious actors    is another aspect of this more offensive strategy to identify    and thwart intruders.  <\/p>\n<p>    We cant predict every attack. Are we ever going to get where    everything is completely invulnerable? No, but with AI,    we can change the configuration of a network faster than humans    can, Halvorsen added.  <\/p>\n<p>    The concept behind the AI approach is to isolate a problem,    reroute around it, and then destroy the malware.  <\/p>\n<p>      About the Author    <\/p>\n<p>      Kris Osborn is editor-in-chief of Defense Systems. He can be      reached at <a href=\"mailto:kosborn@1105media.com\">kosborn@1105media.com<\/a>.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/defensesystems.com\/articles\/2017\/03\/16\/cio.aspx\" title=\"Pentagon sees more AI involvement in cybersecurity - Defense Systems\">Pentagon sees more AI involvement in cybersecurity - Defense Systems<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cyber Defense As the Pentagons Joint Regional Security Stacks moves forward with efforts to reduce the server footprint, integrate regional data networks and facilitate improved interoperability between previously stove-piped data systems, IT developers see cybersecurity efforts moving quickly toward increased artificial intelligence (AI) technology. I think within the next 18-months, AI will become a key factor in helping human analysts make decisions about what to do, former DOD Chief Information Officer Terry Halvorsen said <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/pentagon-sees-more-ai-involvement-in-cybersecurity-defense-systems\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187743],"tags":[],"class_list":["post-183479","post","type-post","status-publish","format-standard","hentry","category-ai"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183479"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=183479"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183479\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=183479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=183479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=183479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}