首页> 外文会议>Advanced machinery technology symposium >Machine Learning and Artificial Intelligence in Cybersecurity
【24h】

Machine Learning and Artificial Intelligence in Cybersecurity

机译:网络安全机器学习和人工智能

获取原文

摘要

Machine Learning and Artificial Intelligence are being applied more broadly as computing, data collection and storage capabilities increase. Machine Learning and Artificial Intelligence promise improved response with reduced human workload by automating repetitive tasks with Artificial Intelligence. Machine Learning provides the ability to rapidly analyze the overwhelming volume of data that our networks and applications see. As machines see this huge volume of data, threats are analyzed enabling the machine to learn and improve its responses. All this data is also captured to support predictive analytics that also improve cybersecurity. Machine Learning and Artificial Intelligence can greatly contribute to enhanced cybersecurity effectiveness as they bring unparalleled speed to the detection and remediation of threats."I believe we all recognize that in 2016 we hit an inflection point. There was a study done in Q3 of last year. The number of new machine-to-machine connections that were added to the network exceeded the number of phones and tablets added to the network," according to Chuck Robins, CEO of Cisco Systems, Inc. "We're moving into a world of unbelievable massive expansiveness. Distributed connectivity across hundreds of billions of devices. And through Artificial Intelligence, through Machine Learning and scale, we have the ability to extract greater insights from all these connections than we ever have in the past."Not every task is ideally suited for machines; there is still a major role for humans in the cybersecurity loop. A comprehensive cybersecurity strategy must address what human will do and how they will leverage the advantages of Machine Learning and Artificial Intelligence.Why Machine Learning? Humans alone simply cannot keep pace. As noted in the Cisco 2018 Annual Cybersecurity Report', "defenders fail to recognize the speed and scale at which adversaries are amassing and refining their cyber weaponry." The threat has become intelligent, automated and pervasive but our security typically remains static and confined to the edge. The new question is not of if you will be attacked, but when will you be attacked and how.The threat has changed. Adversaries are no longer just pranksters or petty thieves. Attacks have become commoditized and militarized. Everything from our electricity to our national security have become fair game. These attackers use Machine Learning to identify and exploit system vulnerabilities, often before the public becomes aware. Machine Learning can filter through seemingly innocuous personal data on the web to aid in constructing believable phishing messages. Machine Learning can even help attackers bypass traditional security.The attack model has also changed. The old method of shoring up the boundary to keep attackers out is no longer effective. Attackers now hide behind legitimate traffic and bury malware in encrypted packets to avoid detection by firewalls, intrusion detection and even sandboxed analysis. Malware has become self-propagating and no longer relies solely on human interaction to infect a system.We can no longer presume the attack will come from the outside, that it will be easy to see or understand or that defense boundary architectures will protect us. Today's greatest threat is within. Whether malicious or human error, up to 70% of attacks occur inside the trusted boundary on east-west traffic.The rapidly increasing threat leaves most organizations with a skills and resource gap. Security teams already overburdened with traditional IT security now oversee a rapidly expanding network of mobile and IOT devices. These devices operate locally and in the cloud. One size fits all security no longer applies. Boundary protection where there is no boundary no longer works.Staying ahead of the threat requires a paradigm shift from a defensive posture focused simply on strengthening the border against attack to a pervasive, self-learning security architecture
机译:机器学习和人工智能更广泛地应用于计算,数据收集和存储能力增加。通过自动化人工智能自动化,机器学习和人工智能承诺改善了人工工作量减少的响应。机器学习提供了快速分析我们网络和应用程序的压倒性数据量的能力。由于机器看到这一大量数据,分析了威胁,使机器能够学习和改进其响应。还捕获所有这些数据以支持还提高网络安全的预测分析。机器学习和人工智能可以大大有助于提高网络安全效果,因为它们对威胁的检测和修复无与伦比的速度。“我相信我们都认识到2016年我们遇到了一个拐点。去年第四季度进行了一项研究。添加到网络的新机器连接的数量超过了添加的手机和平板电脑的数量到网络,“根据Cisco Systems,Inc。的Chuck Robins的说法,”我们正在进入一个令人难以置信的大规模扩张性世界。分布在数十亿台设备上的连接。通过机器学习和规模,通过人工智能,我们有能力从所有这些联系中提取更大的见解,而不是我们过去拥有过的。“不是每项任务都非常适合机器;网络安全循环中的人类仍然存在主要作用。全面的网络安全战略必须解决人类的意愿以及如何利用机器学习和人工智能的优势。为什么机器学习?单独的人根本无法保持步伐。如思科2018年度网络安全报告“,”捍卫者未能认识到对手的速度和规模,伴随着积累和炼制他们的网络武器。“威胁已成为智能,自动化和普遍性,但我们的安全性通常保持静态并限制在边缘。新问题不是如果你会被攻击,但你什么时候攻击以及如何攻击。威胁已经改变了。对手不再只是恶作剧或小偷。攻击已成为商品化和军事化。我们电力到国家安全的一切都成为公平的比赛。这些攻击者使用机器学习来识别和利用系统漏洞,通常在公众意识到之前。机器学习可以通过网上的看似无害的个人数据过滤,以帮助构建可信的网络钓鱼消息。机器学习甚至可以帮助攻击者绕过传统安全。攻击模式也发生了变化。支撑边界的旧方法保持攻击者的否则不再有效。攻击者现在隐藏在加密数据包中的合法流量和埋葬恶意软件,以避免通过防火墙,入侵检测甚至沙箱分析检测。恶意软件已成为自我传播,不再依赖于人类的互动来感染系统。我们再也不能假设攻击来自外面,即将容易看到或理解或者防御边界架构将保护我们。今天的最大威胁是在内的。是否恶意或人为错误,高达70%的袭击事件发生在东西部交通的可信赖边界内。快速增加的威胁留下了具有技能和资源缺口的大多数组织。安全团队已经过负担过量,传统IT安全现在监督移动和物联网设备的快速扩展网络。这些设备在本地和云中运行。一个尺寸适合所有安全性不再适用。没有边界的边界保护不再有效。保持领先于威胁需要从防守态势的范式转变,即仅在加强对攻击普遍,自学安全架构的攻击的边界

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号