首页> 外文会议>Advanced machinery technology symposium >Machine Learning and Artificial Intelligence in Cybersecurity
【24h】

Machine Learning and Artificial Intelligence in Cybersecurity

机译:网络安全中的机器学习和人工智能

获取原文

摘要

Machine Learning and Artificial Intelligence are being applied more broadly as computing, data collection and storage capabilities increase. Machine Learning and Artificial Intelligence promise improved response with reduced human workload by automating repetitive tasks with Artificial Intelligence. Machine Learning provides the ability to rapidly analyze the overwhelming volume of data that our networks and applications see. As machines see this huge volume of data, threats are analyzed enabling the machine to learn and improve its responses. All this data is also captured to support predictive analytics that also improve cybersecurity. Machine Learning and Artificial Intelligence can greatly contribute to enhanced cybersecurity effectiveness as they bring unparalleled speed to the detection and remediation of threats."I believe we all recognize that in 2016 we hit an inflection point. There was a study done in Q3 of last year. The number of new machine-to-machine connections that were added to the network exceeded the number of phones and tablets added to the network," according to Chuck Robins, CEO of Cisco Systems, Inc. "We're moving into a world of unbelievable massive expansiveness. Distributed connectivity across hundreds of billions of devices. And through Artificial Intelligence, through Machine Learning and scale, we have the ability to extract greater insights from all these connections than we ever have in the past."Not every task is ideally suited for machines; there is still a major role for humans in the cybersecurity loop. A comprehensive cybersecurity strategy must address what human will do and how they will leverage the advantages of Machine Learning and Artificial Intelligence.Why Machine Learning? Humans alone simply cannot keep pace. As noted in the Cisco 2018 Annual Cybersecurity Report', "defenders fail to recognize the speed and scale at which adversaries are amassing and refining their cyber weaponry." The threat has become intelligent, automated and pervasive but our security typically remains static and confined to the edge. The new question is not of if you will be attacked, but when will you be attacked and how.The threat has changed. Adversaries are no longer just pranksters or petty thieves. Attacks have become commoditized and militarized. Everything from our electricity to our national security have become fair game. These attackers use Machine Learning to identify and exploit system vulnerabilities, often before the public becomes aware. Machine Learning can filter through seemingly innocuous personal data on the web to aid in constructing believable phishing messages. Machine Learning can even help attackers bypass traditional security.The attack model has also changed. The old method of shoring up the boundary to keep attackers out is no longer effective. Attackers now hide behind legitimate traffic and bury malware in encrypted packets to avoid detection by firewalls, intrusion detection and even sandboxed analysis. Malware has become self-propagating and no longer relies solely on human interaction to infect a system.We can no longer presume the attack will come from the outside, that it will be easy to see or understand or that defense boundary architectures will protect us. Today's greatest threat is within. Whether malicious or human error, up to 70% of attacks occur inside the trusted boundary on east-west traffic.The rapidly increasing threat leaves most organizations with a skills and resource gap. Security teams already overburdened with traditional IT security now oversee a rapidly expanding network of mobile and IOT devices. These devices operate locally and in the cloud. One size fits all security no longer applies. Boundary protection where there is no boundary no longer works.Staying ahead of the threat requires a paradigm shift from a defensive posture focused simply on strengthening the border against attack to a pervasive, self-learning security architecture capable of viewing the network, detecting threats and anomalies and then mitigating the threat. Machine Learning moves us toward the network that can think and act one step ahead of our adversaries.This paper will address some current uses of Machine Learning and Artificial Intelligence in cybersecurity.
机译:随着计算,数据收集和存储功能的增强,机器学习和人工智能得到了越来越广泛的应用。机器学习和人工智能通过使用人工智能自动执行重复性任务,有望在减少人员工作量的同时提高响应速度。机器学习提供了快速分析我们的网络和应用程序看到的大量数据的能力。当机器看到大量数据时,将对威胁进行分析,从而使机器能够学习并改善其响应。还捕获所有这些数据以支持预测分析,从而也可以提高网络安全性。机器学习和人工智能可以为威胁的检测和补救带来无与伦比的速度,从而可以极大地提高网络安全效率。 “我相信我们都认识到,2016年我们遇到了一个拐点。去年第三季度进行了一项研究。网络中新增的机器对机器连接的数量超过了所添加的手机和平板电脑的数量。思科系统公司首席执行官查克·罗宾斯(Chuck Robins)说:“我们正在进入一个令人难以置信的大规模扩展世界。分布式连接遍及数千亿个设备。通过人工智能,机器学习和规模化,我们有能力从所有这些联系中提取比以往更多的见解。” 并非每个任务都非常适合于机器;在网络安全循环中,人类仍然扮演着重要角色。全面的网络安全策略必须解决人类将做什么以及他们将如何利用机器学习和人工智能的优势。 为什么要机器学习?单靠人类是无法跟上步伐的。正如《思科2018年度网络安全报告》所指出的那样,“防御者未能意识到对手聚集和完善其网络武器的速度和规模。”威胁已经变得智能化,自动化且普遍存在,但我们的安全通常保持静态,并仅限于边缘。新的问题不是您是否会受到攻击,而是您什么时候会受到攻击以及如何受到攻击。 威胁已经改变。对手不再只是恶作剧或小偷。攻击已经商品化和军事化。从电力到国家安全,一切都变得公平。这些攻击者通常在公众尚未意识到之前,使用机器学习来识别和利用系统漏洞。机器学习可以过滤Web上看似无害的个人数据,以帮助构建可信的网络钓鱼消息。机器学习甚至可以帮助攻击者绕过传统的安全性。 攻击模式也已更改。扩大边界以阻止攻击者进入的旧方法不再有效。攻击者现在躲在合法流量后面,并将恶意软件埋在加密的数据包中,以避免被防火墙检测,入侵检测甚至沙盒分析。恶意软件已经自我传播,不再仅依靠人类的互动来感染系统。 我们不能再假定攻击将来自外部,这将很容易看到或理解,或者防御边界体系结构将保护我们。当今最大的威胁就在其中。无论是恶意错误还是人为错误,多达70%的攻击都发生在东西方流量的可信任边界内。 迅速增加的威胁使大多数组织缺乏技能和资源缺口。安全团队已经负担了传统IT安全的重任,现在负责监督迅速扩展的移动和IOT设备网络。这些设备在本地和云中运行。一种尺寸适用于所有安全性,不再适用。没有边界的边界保护不再起作用。 要保持威胁的领先地位,就需要将范式从仅专注于加强防御边界的防御姿态转变为能够查看网络,检测威胁和异常情况并缓解威胁的普遍的,自学式的安全体系结构。机器学习将我们带向可以思考并采取行动的网络,该网络比我们的对手领先一步。 本文将探讨机器学习和人工智能在网络安全中的一些当前用途。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号