{"id":202284,"date":"2017-06-29T11:16:09","date_gmt":"2017-06-29T15:16:09","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-artificial-intelligence-is-taking-on-ransomware-abc-news\/"},"modified":"2017-06-29T11:16:09","modified_gmt":"2017-06-29T15:16:09","slug":"how-artificial-intelligence-is-taking-on-ransomware-abc-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/how-artificial-intelligence-is-taking-on-ransomware-abc-news\/","title":{"rendered":"How artificial intelligence is taking on ransomware &#8211; ABC News"},"content":{"rendered":"<p><p>    Twice in the space of six weeks, the world has suffered major    attacks of ransomware  malicious software that locks up    photos and other files stored on your computer, then demands    money to release them.  <\/p>\n<p>    It's clear that the world needs better defenses, and    fortunately those are starting to emerge, if slowly and in    patchwork fashion. When they arrive, we may have artificial    intelligence to thank.  <\/p>\n<p>    Ransomware isn't necessary trickier or more dangerous than    other malware that sneaks onto your computer, but it can be    much more aggravating, and at times devastating. Most such    infections don't get in your face about taking your digital    stuff away from you the way ransomware does, nor do they shake    you down for hundreds of dollars or more.  <\/p>\n<p>    Despite those risks, many people just aren't good at keeping up    with security software updates. Both recent ransomware attacks    walloped those who failed to install a Windows update released    a few months earlier.  <\/p>\n<p>    Watchdog security software has its problems, too. With this    week's ransomware attack , only two of about 60 security    services tested caught it at first, according to security    researchers.  <\/p>\n<p>    \"A lot of normal applications, especially on Windows, behave    like malware, and it's hard to tell them apart,\" said Ryan    Kalember, an expert at the California security vendor Proofpoint.  <\/p>\n<p>    HOW TO FIND MALWARE  <\/p>\n<p>    In the early days, identifying malicious programs such as    viruses involved matching their code against a database of    known malware. But this technique was only as good as the    database; new malware variants could easily slip through.  <\/p>\n<p>    So security companies started characterizing malware by its    behavior. In the case of ransomware, software could look for    repeated attempts to lock files by encrypting them. But that    can flag ordinary computer behavior such as file compression.  <\/p>\n<p>    Newer techniques involve looking for combinations of behaviors.    For instance, a program that starts encrypting files without    showing a progress bar on the screen could be flagged for    surreptitious activity, said Fabian Wosar, chief technology    officer at the New Zealand security company Emsisoft. But that    also risks identifying harmful software too late, after some    files have already been locked up.  <\/p>\n<p>    An even better approach identifies malware using observable    characteristics usually associated with malicious intent  for    instance, by quarantining a program disguised with a PDF icon    to hide its true nature.  <\/p>\n<p>    This sort of malware profiling wouldn't rely on exact code    matches, so it couldn't be easily evaded. And such checks could    be made well before potentially dangerous programs start    running.  <\/p>\n<p>    MACHINE VS. MACHINE  <\/p>\n<p>    Still, two or three characteristics might not properly    distinguish malware from legitimate software. But how about    dozens? Or hundreds? Or even thousands?  <\/p>\n<p>    For that, security researchers turn to machine learning, a form    of artificial intelligence. The security system analyzes    samples of good and bad software and figures out what    combination of factors is likely to be present in malware.  <\/p>\n<p>    As it encounters new software, the system calculates the    probability that it's malware, and rejects those that score    above a certain threshold. When something gets through, it's a    matter of tweaking the calculations or adjusting the threshold.    Now and then, researchers see a new behavior to teach the    machine.  <\/p>\n<p>    AN ARMS RACE  <\/p>\n<p>    On the flip side, malware writers can obtain these security    tools and tweak their code to see if they can evade detection.    Some websites already offer to test software against leading    security systems. Eventually, malware authors may start    creating their own machine-learning models to defeat    security-focused artificial intelligence.  <\/p>\n<p>    Dmitri Alperovitch, co-founder and chief technology officer at    the California vendor CrowdStrike, said that even if a    particular system offers 99 percent protection, \"it's just a    math problem of how many times you have to deviate your attack    to get that 1 percent.\"  <\/p>\n<p>    Still, security companies employing machine learning have    claimed success in blocking most malware, not just ransomware.    SentinelOne even offers a $1 million guarantee against    ransomware; it hasn't had to pay it yet.  <\/p>\n<p>    A FUNDAMENTAL CHALLENGE  <\/p>\n<p>    So why was ransomware still able to spread in recent weeks?  <\/p>\n<p>    Garden-variety anti-virus software  even some of the free    versions  can help block new forms of malware, as many are    also incorporating behavioral-detection and machine-learning    techniques. But such software still relies on malware databases    that users aren't typically good at keeping up to date.  <\/p>\n<p>    Next-generation services such as CrowdStrike, SentinelOne and    Cylance tend to ditch databases completely in favor of machine    learning.  <\/p>\n<p>    But these services focus on corporate customers, charging $40    to $50 a year per computer. Smaller businesses often don't have    the budget  or the focus on security  for that kind of    protection.  <\/p>\n<p>    And forget consumers; these security companies aren't selling    to them yet. Though Cylance plans to release a consumer version    in July, it says it'll be a tough sell  at least until someone    gets attacked personally or knows a friend or family member who    has.  <\/p>\n<p>    As Cylance CEO Stuart McClure puts it: \"When you haven't been    hit with a tornado, why would you get tornado insurance?\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/abcnews.go.com\/Technology\/wireStory\/artificial-intelligence-taking-ransomware-48331335\" title=\"How artificial intelligence is taking on ransomware - ABC News\">How artificial intelligence is taking on ransomware - ABC News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Twice in the space of six weeks, the world has suffered major attacks of ransomware malicious software that locks up photos and other files stored on your computer, then demands money to release them. It's clear that the world needs better defenses, and fortunately those are starting to emerge, if slowly and in patchwork fashion. When they arrive, we may have artificial intelligence to thank <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/how-artificial-intelligence-is-taking-on-ransomware-abc-news\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187742],"tags":[],"class_list":["post-202284","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202284"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=202284"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202284\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=202284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=202284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=202284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}