Machine learning and AI

Cooperation between Humans and Artificial Intelligence in the Name of Security

Dimitar Kostadinov
May 1, 2018 by
Dimitar Kostadinov

Artificial intelligence (AI), machine learning (ML) and deep learning (DL)

Artificial intelligence as a term dates back to the 1950s but only recently came into prominence because of the rapid advance of science and technology in the last decade or so.

AI is software (or a robot) that can display some sort of cognitive, learning and decision-making process akin to a real human's cognitive, learning and decision-making process. AI is a contradiction because it strives to make man-made appliances mixed up with software to solve simple problems, most of which are mundane, human tasks, while at the same time constantly trying to push the technology barrier beyond human capability.

Learn Cybersecurity Data Science

Learn Cybersecurity Data Science

Build your skills using machine learning and other cutting-edge tools to perform various cybersecurity tasks.

Concerning this point, let us see the 3 types of AI:

  1. Artificial Narrow Intelligence – as of this writing, and as far as I am aware of, this is the only AI that humanity has achieved. These AIs are good at performing a single task, for example, playing chess or image recognition. Google's translation engine is a product based on ANI.
  2. Artificial General Intelligence – that is a human level intelligence, and it would be a giant leap for the robots, and hopefully for humans, too. Nevertheless, AGI is a very difficult state for computers to achieve because they must acquire abstract thinking skills and be able to come up with creative ideas.
  3. Artificial Super Intelligence – it is the phase where AI is much more creative and smart than any human brain, perhaps even the brain power of all human beings combined. While the distance between ANI and AGP may be huge, the majority of scientists consider the transition period between AGI and ASI would be very short – an almost instant development of the world's most advanced species.

In light of the fact that now robots can compose classical music, the philosopher of music Stephen Davies, of the University of Auckland in New Zealand, concludes:

"People said computers would not be able to show the same original thinking, as opposed to crunching random calculations. However, now it is hard to see the difference between people and computers concerning creativity in chess. Music, too, is rule-governed in a way that should make it easily simulated."

Whether the development of full AI will be beneficial to Homo sapiens is a matter of great dispute. That is not the focal point of this writing, however.

Due to machine learning (ML), an important subset of AI, computers can recognize patterns in data and learn new things like a human being. AI algorithms make use of ML to sift through enormous amounts of data and adapt over time. Thereby, one could reveal unknown facts that are the result of a thorough examination of all relevant information sources. Deep learning (DL) is a subdomain of machine learning. It is essentially another, more advanced level of ML based on a layered structure of algorithms dubbed an artificial neural network, which is something like the technical equivalent of the human brain's biological neural network.

AI-induced unemployment?

An interesting amalgam of technical and public policy researchers from distinguished universities published a 98-page study on AI in February 2018. There was no consensus among the paper's creators on whether the massive automation, which will result from ML products, would cause widespread unemployment or other social dislocations.

It is estimated that there will be 3.5 unfilled positions in the cybersecurity sector by 2021. Another study conducted by the Center for Cyber Safety and Education and ISC2 prognosed a 1.8 million shortfall among cybersecurity professionals by 2022. The existing workforce will have to work longer or harder – or both – to compensate for so many unoccupied positions, but even now IT professionals work on an average 52 hours a week.

AI may reduce these long hours. Given that the said technology is successfully used to detect simple attacks and threats, this will further help security personnel to focus on more complex cases only. In this regard, Steve Grobman, a CTO at McAfee, thinks that AI will reduce the need for corporations to have big armies of cybersecurity staffers as opposed to making human cybersecurity profession distinct.

The notorious security expert Bruce Schneier seems to believe in the ability of autonomous security systems to provide something that is now missing in the realm of IT security, a new (artificially generated) perspective. He also seems to be an optimist concerning the anticipated labor-market disruption that AI is expected to cause:

"We're a long way off AI from making humans redundant in cybersecurity, but there's more interest in [using AI for] human augmentation, which is making people smarter. You still need people defending you. Good systems use people and technology together."

With his Neural Lace project, Elon Musk (the founder and CEO of Tesla and Space X) is a distinguished figure in the field of human augmentation. His invention intends to equalize the future discrepancy between a human and a full-fledged autonomous AI.

Training the AI

AI algorithms are not independent, self-sufficient, self-aware, and neither are they self-thought. Since the AI technology is yet to mature, it presents no panacea at the moment with respect to some sophisticated cyber-attacks. Moreover, AI is in its infancy, and like every infant, it needs some tutoring (but also parenting and supervision) to grow to its full potential and know how to behave reasonably and be respectful of humans and other forms of existence. Therefore, the AI could live up to its true potential only if there is a trained team of human analysts by its side.

A skilled workforce is needed to oversee this emerging technology, as well. The ML tends to produce a significant number of false positives, which inevitably increases the security team's workload, but after a while, it starts to make a clear distinction between normal and unusual activities. One weak point in the whole ML scheme is the fact that AI draws its intelligence from the data it analyzes. Thus, if the data is corrupt, we cannot ignore expert computer brilliance.

Learn Cybersecurity Data Science

Learn Cybersecurity Data Science

Build your skills using machine learning and other cutting-edge tools to perform various cybersecurity tasks.

Defenses: Manual vs. automatic

According to the CEO of Coalfire, a company that specializes in cyber risk management and compliance services, "[t]he future will see self-healing and self-defending networks, which can leverage AI to take steps to fight and defend the network." /Source: "AI's Future in Cybersecurity" by Pedro Hernandez/

To put it concisely, a manual process simply cannot reliably spot anomalies in cloud environments that consist of thousands of transient containers each of which may generate thousands of events per minute.

"Unfortunately, a lot of organizations still depend on manual process -- this will have to change if systems are going to remain secure in the future," says Martin Ford, futurist, and author of 'Rise of the Robots.'

The majority of machine learning inventions are trained in a manner similar to an anti-virus program with malware samples being compared with signatures in a database. Unfortunately, because this equates AI with advanced anti-virus software, it represents no evolution at all.

According to George Avetisov, the CEO and co-founder of biometric security company HYPR, companies have to let go of the rules-based engine finally they have relied on for decades. What makes machine learning technology so strong is its ability to learn about threats in real-time, thus adapting even to threats that did not previously exist (the so-called zero threats).

Magical defensive capabilities of AI

Learning capabilities based on neural networks are the AI's way of conducting entity and pattern recognition for intrusion detection or digital forensics purposes. What is best of all is the lightning speed at which these cutting-edge solutions can classify entities and events, as well as analyze the malicious behavior behind cyber intrusions. By identifying and prioritizing vulnerabilities for preemptive protection, AI could make risk and threat assessment easier. This would certainly allow for a thorough network traffic inspection and eventually block harmful traffic right on the spot.

The ability to detect abnormal patterns could prove useful in various areas: encrypted web traffic, IoT and cloud environments, to name a few. Encryption is great security-wise, but it can be a conundrum for companies that desperately seek to protect their information assets because, through a cloud of encrypted data, attackers are trying to conceal their command-and-control activity. In fact, Cisco inspected malware samples over a year and revealed more than a threefold increase in encrypted network communications. The ML technology can study traffic patterns and learn over time to distinguish malicious traffic from a legitimate one.

The cybersecurity areas in which AI is presently mostly applied are malware detection, anti-phishing prevention, and blocking brute-force attacks. To avert phishing scams, for example, AI could analyze variables of importance such as location data, wording, grammar, semantics, and IP addresses.

People and AI could complete each other instead of with each other

Jacob Sendowski, senior product manager at automated threat management specialist Vectra, consider that there will be an excellent symbiosis between the two leading species of the future:

"AI-enabled security solutions will become integral components of the security team as they can birddog high-threat hosts to a human analyst team[.] Skilled human analysts will be critical in the incident response process, reviewing evidence and directing an investigation based on the indications that AI tools provide."

With the help of AI, the reaction time in the context of security events will decrease, the analytics team will receive better fine-grained data analysis, and autonomous technology can use statistical models to predict or anticipate threat behavior.

Being deployed in a security operations center (SOC), artificial intelligence solutions will help with checklist-driven activities normally entrusted to leading, experienced analysts who will examine logs for indicators of compromise. Unlike the analysts, however, these solutions will not become tired or weary of repeating security tasks.

A thorough evaluation of all security events is almost impossible from a human point of view since a security analyst can review on average only between 10 and 20 critical security incidents per day, according to IBM. Neural networks in particular excel in monitoring a system's processes. ML could study the behavior and intent of even benign-looking threats.

The great number and diversity of new malware strains that crop up every day is astounding. Gartner made one very curious prediction — every new software product released by 2020 will contain some ML feature. Self-defending and self-healing networks are the future — every major IT company inter alia have jumped on the AI bandwagon. On the other hand, AI can bring about unknown and unknowable problems.

The following paragraph serves as the climax of this short story:

"The limitations of machine-based analysis have also emerged. While machines can detect known malware executables and simple unknown ones, they cannot analyze complex unknown malware files, which numbered almost 75,000 last week. Complex unknown files require expert human analysis."

As the technology reporter Nick Ismail concluded, AI could be a good base on which human intelligence can build on. In reality, to pair ML with human intelligence is what makes sense, at least in the short term. In the end, humans will oversee not only the AI but also the data on which AI bases its conclusions. Furthermore, "intuition" is a card that can be played only by human beings (disclaimer: this may change in the not so distant future, too). What a machine learning product may be lacking in the first stages of its development is a "humanized touch;" or "Just a little of that Human Touch" if we trust the Boss on what is important in life.

Rather than doing all the work (and thus dispensing from these unevolved creatures called humans), AI and automation will most likely work better as a counselor whose specialty is crunching big sets of data and presenting them in readily available threads of intelligence. This would undoubtedly support organizations in their day-to-day activities and also strengthen already existing teams through the mysterious ways the most advanced technologies work.

Conclusion

We all know how devastating a security breach can be. Unfortunately, employee/third-party error or behavior is the root cause of the large majority of data breaches, and increased automation is something that may change things for the better.

More and more cybersecurity experts have a recourse to automation to improve their job performance. Despite that fact, an ESG research indicates that no more than 30% of interviewed IT security professionals feel confident about their knowledge of ML and its practical application to information security analytics. With so many firms that still do not even perform regular patch management, AI remains an overly avant-garde concept for some people that is regarded more as a luxury than as something of perceivable importance.

Let us not forget about the never-ending arms race between good and bad guys. Since there is enough evidence that cybercriminals have employed technologies such as deep learning neural networks for quite some time, it is somewhat imperative that white hats employ such techniques as well if they want to not lag behind this crucial trend in the cyber arms race.

AI is not just a distant future hype; it is a product already in use by many businesses. The percentage of enterprises that were using AI in 2016 (38% ) will grow to 62% by 2018, according to a Narrative Science survey. Also, Forrester Research predicts an astounding 300% increase in AI investment on a yearly basis.

Machine learning technologies can work either as helper apps or in a stand-alone fashion. One security researcher sees the initial role of AI as "an intelligent assistant." The big question is: Will AI products continue to be content with their role of (extremely) "intelligent assistant" after they become very intelligent?

Maybe the biggest problem in the context of proper "communication" between humans and self-aware robots is the misinterpretation of commands by the latter … however, which is ultimately a fault of the former. It is something that can occur not only in movies and sci-fi novels but also in real products such as Alexa, Google Assistant, Siri, and Cortana. Maybe the key to a bright future ahead of us is mutual trust and good relations between the two parties throughout the entire development cycle of AI.

Learn Cybersecurity Data Science

Learn Cybersecurity Data Science

Build your skills using machine learning and other cutting-edge tools to perform various cybersecurity tasks.

Reference list

Dimitar Kostadinov
Dimitar Kostadinov

Dimitar Kostadinov applied for a 6-year Master’s program in Bulgarian and European Law at the University of Ruse, and was enrolled in 2002 following high school. He obtained a Master degree in 2009. From 2008-2012, Dimitar held a job as data entry & research for the American company Law Seminars International and its Bulgarian-Slovenian business partner DATA LAB. In 2011, he was admitted Law and Politics of International Security to Vrije Universiteit Amsterdam, the Netherlands, graduating in August of 2012. Dimitar also holds an LL.M. diploma in Intellectual Property Rights & ICT Law from KU Leuven (Brussels, Belgium). Besides legal studies, he is particularly interested in Internet of Things, Big Data, privacy & data protection, electronic contracts, electronic business, electronic media, telecoms, and cybercrime. Dimitar attended the 6th Annual Internet of Things European summit organized by Forum Europe in Brussels.