{"id":185930,"date":"2017-04-02T08:03:21","date_gmt":"2017-04-02T12:03:21","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-ai-can-change-the-locks-in-cybersecurity-venturebeat\/"},"modified":"2017-04-02T08:03:21","modified_gmt":"2017-04-02T12:03:21","slug":"how-ai-can-change-the-locks-in-cybersecurity-venturebeat","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/how-ai-can-change-the-locks-in-cybersecurity-venturebeat\/","title":{"rendered":"How AI can &#8216;change the locks&#8217; in cybersecurity &#8211; VentureBeat"},"content":{"rendered":"<p><p>    Some of the worlds best known brands have invested millions of    dollars in information security. So have their adversaries.    Malicious actors are counting on the fact that your defenses    areoperated mostly by humans who make changes.  <\/p>\n<p>    When you moved into your neighborhood, did you change your    locks or do you have the exact same ones as all your neighbors?    Think about what could happen if a thief can compromise just    one of those shared locks? For some reason the world of    information security has a same-lock mentality. And some of    their customers are malicious actors working hard to do harm.    Given the situation, we should not be surprised that even with    the massive amount of money being spent defenses still fail.  <\/p>\n<p>    If cyber defenders are ever going to have a chance at winning,    we must begin to level this playing field. Vendors distribute    identical copies of their security products to customers    because its easier for them, not because its better for their    customers.  <\/p>\n<p>    How many variants of a signature is an anti-virus company    supposed to produce for each malware sample it analyzes? Do all    host-based artificial intelligence (AI) defenses learn in their    environment? In the past, tailoring these approaches for each    enterprise was not feasible. Luckily, new techniques are    emerging within cybersecurity that produce unique detection    behaviors for each customer. Behaviors that can help level the    playing field, and maybe even help win the game.  <\/p>\n<p>    These emerging techniques broadly fall into the area of AI and    machine learning. At the heart of any AI system is the ability    to learn. Some AI solutions learn from their local environment    while others learn strictly from a global context. Those    solutions that build some or all of their threat detection    capability using data that only exists in a customers network    environmentand produce a type of moving defense unique to    that environment will win out. These include:  <\/p>\n<p>    Similar tohow adding cryptographyto a password    helps protect it from compromise, deploying cybersecurity    solutions that use the network environment to differentiate    themselves from all other copies helps protect the enterprise    from compromise.  <\/p>\n<p>    AI systems use many thousands of features to discern if content    traversing a network is malicious or if user or system    behaviors are anomalous. Each feature alone provides only a    small piece of evidence needed to make a final determination or    classification.  <\/p>\n<p>    Only in intricate and complex combinations are they useful.    Machine learning algorithms try to figure out how to combine    features to produce accurate insights and predictions using a    dedicated set or period of training.  <\/p>\n<p>    Depending on each AI systems approach, training data can    originatefrom the local environment, a global context or    a hybrid of the two. However, unlike traditional approaches,    the resulting models are never based on simple rules or    patterns easily understood and described by subject matter    experts. The natural opacity of these models and their dynamic    construction provide the building blocks for an effective    moving defense.  <\/p>\n<p>    You can alter theAI models by adjusting the training set    or period. Whether additional training data is simply added or    used to replace older training data wont matter  the results    are the same.  <\/p>\n<p>    New models are created with different ways of using existing    features and possibly using totally new features. With AI and    machine learning, the cost of building tailored detection    solutions is negligible. There must, however, be a vision on    the part of the solution provider to enable this approach. Some    security providers using machine learning and AI still deploy    their models in a traditional manner and wont leverage the    local data for tailoring their solution.  <\/p>\n<p>    Of course, there are challenges with moving defenses, and not    just those faced by the malicious actors that will continue to    try to defeat them. The most significant challenge is ensuring    parity among the tailored solutions. Nobody wants the    second-best detection model. Care must be taken to verify    that any technical implementation produces a statistically    equivalent model with detection accuracy and error rates nearly    identical across all tailored variants.  <\/p>\n<p>    Its hard to find a security concept simpler than a moving    defense. Change your locks is amongst the most well    established security advice. In cybersecurity, however, some    locks are just easier to change than others.  <\/p>\n<p>    Scott Miserendino is the chief data scientist at    BluVector.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/venturebeat.com\/2017\/04\/01\/how-ai-can-change-the-locks-in-cybersecurity\/\" title=\"How AI can 'change the locks' in cybersecurity - VentureBeat\">How AI can 'change the locks' in cybersecurity - VentureBeat<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Some of the worlds best known brands have invested millions of dollars in information security. So have their adversaries <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/how-ai-can-change-the-locks-in-cybersecurity-venturebeat\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187743],"tags":[],"class_list":["post-185930","post","type-post","status-publish","format-standard","hentry","category-ai"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185930"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=185930"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185930\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=185930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=185930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=185930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}