Should we give AI the key to our security?

Sam Curry Sam Curry
February 15, 2019 Big Data, Cloud & DevOps

Ready to learn Data Science? Browse courses like Data Science Training and Certification developed by industry thought leaders and Experfy in Harvard Innovation Lab.

experfy-blog

The cyber security industry is a good example of a field where artificial intelligence (AI) is both being looked to as a near-magical perfect solution while also already being deployed in a practical way every day. But can we trust it?

The cyber world is notoriously unbalanced, with the hostile attackers having their pick of thousands of vulnerabilities to launch their strikes, along with deploying an ever-increasing arsenal of tools to evade detection once they have breached a system. While they only have to be successful once, the security teams tasked with defending a system have to stop every attack, every time.

The inhuman speed and power of an advanced AI would be able to tip these scales at last, levelling the playing field for the security practitioners who are constantly on the back foot.

The perfect AI would be able to detect and thwart even the most well-planned, high level attacks – all without the need for any human intervention.

What we currently have – machine learning helping people

While we wait for our perfect, genius artificial intelligence to appear, AI is currently being heavily used in the security industry in the form of machine learning (ML).

Essentially a system that can learn without being explicitly programmed to do so, ML lacks the self-awareness that is popularly ascribed to AI. However, it is still incredibly valuable when it comes to handling large amounts of data and identifying patterns and trends.

This capability is used by cyber security practitioners to better get to grips with the vast amount of potential evidence they need to sift through after a cyber attack.

One of the earliest tenants of forensic criminal investigations is Locard’s Exchange Principle, the idea that all crime scenes involve an exchange of the perpetrator taking something away, but leaving something behind in return. The investigators are tasked with finding and understanding these traces in order to help them understand what has happened, and hopefully track down the criminal.

Cybercrime has upended Locard’s Exchange Principle because the average attack creates an exponentially larger amount of potential evidence to be examined – with many specifically designed to conceal or disrupt the evidence and hinder the investigation.

Analytical tools powered by ML enable cyber investigators to regain the advantage by handling the heavy lifting of sorting through the enormous piles of digital evidence and breaking it down into key points and trends. Rather than having to tediously comb through everything themselves, the human practitioners can focus on the most important evidence first.

Every minute counts when it comes to investigating a breach, so the support of ML is proving to be increasingly invaluable.

But humans still have a place – turtle stuff

As powerful an asset as ML is however, I believe it will be sometime before the self-sufficient cyber security AI the industry dreams of becomes reality. One of the biggest challenges facing AI developers in every field is the fact that unlike a real human brain, an artificial mind is not truly capable of intuition or assumption, and runs purely on data.

A powerful example of this issue appeared in October when MIT researchers were consistently able to trick Google’s AI into identifying a 3D printed model of a turtle as a rifle. MIT’s Labsix team achieved this bizarre feat by adding visual noise designed to confuse the AI – a concept known as an adversarial image. The turtle was so successful it fooled the AI from every angle, and the researchers also had success in convincing it that a baseball was an espresso and a kitten was a bowl of guacamole.

This same technique could also be applied by cyber criminals to fool a forensic AI and throw it off the scent of an investigation.

If attackers are aware of the data points and trends used by the AI, they can hide their activity within noise that will have the AI thinking nothing is amiss, or lead it in the wrong direction.

Just as the human eye will obviously know the difference between a turtle and a rifle, a real security professional will be able to see through this adversarial noise.

The human brain’s capacity to make logical leaps and work by intuition rather than cold data means that the expertise of real human professionals will be a vital part of cyber security for many years to come.

Originally posted at ACCESS AI

  • Experfy Insights

    Top articles, research, podcasts, webinars and more delivered to you monthly.

  • Sam Curry

    Tags
    Data Science
    © 2021, Experfy Inc. All rights reserved.
    Leave a Comment
    Next Post
    Why Advanced Persistent Threats Are Targeting the Internet of Things

    Why Advanced Persistent Threats Are Targeting the Internet of Things

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    More in Big Data, Cloud & DevOps
    Big Data, Cloud & DevOps
    Cognitive Load Of Being On Call: 6 Tips To Address It

    If you’ve ever been on call, you’ve probably experienced the pain of being woken up at 4 a.m., unactionable alerts, alerts going to the wrong team, and other unfortunate events. But, there’s an aspect of being on call that is less talked about, but even more ubiquitous – the cognitive load. “Cognitive load” has perhaps

    5 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    How To Refine 360 Customer View With Next Generation Data Matching

    Knowing your customer in the digital age Want to know more about your customers? About their demographics, personal choices, and preferable buying journey? Who do you think is the best source for such insights? You’re right. The customer. But, in a fast-paced world, it is almost impossible to extract all relevant information about a customer

    4 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    3 Ways Businesses Can Use Cloud Computing To The Fullest

    Cloud computing is the anytime, anywhere delivery of IT services like compute, storage, networking, and application software over the internet to end-users. The underlying physical resources, as well as processes, are masked to the end-user, who accesses only the files and apps they want. Companies (usually) pay for only the cloud computing services they use,

    7 MINUTES READ Continue Reading »

    About Us

    Incubated in Harvard Innovation Lab, Experfy specializes in pipelining and deploying the world's best AI and engineering talent at breakneck speed, with exceptional focus on quality and compliance. Enterprises and governments also leverage our award-winning SaaS platform to build their own customized future of work solutions such as talent clouds.

    Join Us At

    Contact Us

    1700 West Park Drive, Suite 190
    Westborough, MA 01581

    Email: [email protected]

    Toll Free: (844) EXPERFY or
    (844) 397-3739

    © 2025, Experfy Inc. All rights reserved.