Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Artificial Intelligence Taking a Bigger Role in Antimalware Technology

    Written by

    Scot Petersen
    Published August 3, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      LAS VEGAS—Even as artificial intelligence is having a bigger role in stopping malware and other cyber-threats, attackers are finding ways to get around it and even using AI as a way to enhance their own attack strategies.

      “Can we break machine learning? The answer is, yes we can,” said Hyrum Anderson, Principal Data Scientist for security vendor Endgame, during his presentation at DefCon here last week. “It’s actually become quite fashionable to break machine learning.”

      AI, or more specifically a form of AI known as machine learning, has been coded into a next-generation antivirus (AV) programs. Traditional forms of AV are based on signatures, which are identifiers of known security threats. But signature-based AV is not enough, because attackers can quickly change malware or disguise it enough to evade AV signatures.

      This is where machine learning comes in and not a moment too soon, because 357 million new malware threats were detected in 2016, according to security vendor Symantec. Traditional antivirus programs simply cannot keep up.

      AI-based threat detection systems are designed to catch anything that traditional AV misses, at least in theory. Machine learning models are not foolproof, however. They can determine only within a certain degree of confidence if a particular file is malicious or benign, Anderson explained. If attackers can learn how a machine-learning detection model works, they may be able to tweak their malware files enough that they can sneak through.

      “The idea is to insert a file that our model knows is malicious with high confidence, and make a few subtle changes to the bytes or modify elements that don’t break the file format or its behavior and then trick our model into thinking that’s benign,” said Anderson.

      AI on the attack

      AI methods are also being applied directly by attackers as a means to aggregate and analyze data to help target and customize their attacks. “We are now seeing systematic attacks against industry sectors” using AI methods, said Vincent Weafer, vice president of McAfee Labs.

      With new cloud-based models and compute engines, machine learning is becoming inexpensive and accessible to whoever wants to use it. At the Black Hat conference here, McAfee announced that its flagship product, McAfee ATD (Advanced Threat Defense) 4.0, is now augmented with machine learning models.

      Another company, Darktrace, applies machine learning to network security. Darktrace’s product, dubbed the Enterprise Immune System, creates a model based on normal usage for a network and then applies an AI system that can determine if certain activity is malicious or benign.

      If questionable activity is detected, it sends a warning to security administrators, said CEO Nicole Eagan in an interview with eWEEK at Black Hat. Darktrace’s Antigena product can also take action on its own to shut off the activity, Eagan said.

      Darktrace this month is announcing a new version of the Enterprise Immune System, she said. In the new version, Darktrace will add a mobile app that will allow administrators to react to recommendations more easily. It will also include a new 3-D visualizer and an ask-the-expert feature that enables administrators to send signs of malicious activity to Darktrace for analysis by its experts.

      The future of AI

      Besides being able to detect malware that is not registered with a signature, machine-learning systems will spare vendors and security administrators the task of constantly updating their threat detection systems. While signature-based systems must be updated daily, AI models have a longer shelf life—as much as six months before needing to be adjusted, said Homer Strong, Director of Data Science at Cylance.

      He also said that the industry just getting started with using AI to augment security. “Cylance was ahead in applying well-known machine learning techniques without a lot of original research. But now in special domains like security, companies are starting to invest in original research,” he said, adding that AI algorithms will continue to evolve and improve as more AI experts enter security field.

      Experts say that as good as AI is getting, it remains only one part of the best practice of “security in depth.” Endpoint and network security, both traditional antivirus and AI-based, must be coupled with other forms of protection, including intrusion detection, encryption, data loss prevention and many others, including the emerging role of “threat hunter.”

      But before users begin to apply those strategies, they must still tackle the biggest problems out there, which include software patching and system updates, file backups, and user training. At Black Hat, the conference released its latest attendee survey that showed that the number one concern (38%) of security administrators is end users who violate security policy and are too easily fooled by social engineering attacks, up from 28 percent the year before.

      Some things never change.

      Scot Petersen is a technology analyst at Ziff Brothers Investments, a private investment firm. He has an extensive background in the technology field. Prior to joining Ziff Brothers, Scot was the editorial director, Business Applications & Architecture, at TechTarget. Before that, he was the director, Editorial Operations, at Ziff Davis Enterprise. While at Ziff Davis Media, he was a writer and editor at eWEEK. No investment advice is offered in his blog. All duties are disclaimed. Scot works for a private investment firm, which may at any time invest in companies whose products are discussed in this blog, and no disclosure of securities transactions will be made.

      Scot Petersen
      Scot Petersen
      Scot Petersen is a technology analyst at Ziff Brothers Investments, a private investment firm. Prior to joining Ziff Brothers, Scot was the editorial director, Business Applications & Architecture, at TechTarget. Before that, he was the director, Editorial Operations, at Ziff Davis Enterprise, While at Ziff Davis Media, he was a writer and editor at eWEEK.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.