Training ‘Artificial Intelligence’ against cyber bullying

December 9, 2017 7:00 am


By: Morten Illum, VP EMEA, Aruba, a Hewlett Packard Enterprise company

Artificial Intelligence (AI), often throws up visions of a futuristic earth, where self-aware robots are programmed to be ethical in their behaviour and protect human lives at all costs.

It’s clear that an AI future is already here, with chat bots and home assistants making the present almost as advanced as was envisaged years ago.

But what about the role of AI in protecting the network? With the increased threat of cyber-attacks across the world, what role can AI have within data protection?

Don’t miss: 2018 cyber security landscape predictions

AI takes on Cyber

The idea of using AI in combating cyber security breaches is not a new one, however, cyber security relies on the technical nous of those implementing and designing the technology, which means experts need to work practically error-free.

This undertaking is massive, and requires thousands of lines of code to be written and audited to ensure no vulnerabilities creep into the software used by businesses to protect their network. In order to be in full control, businesses need to be able to learn from their existing data.

Machine Learning, one of the key components for AI, is deployable in ways that can help companies develop technologies that can stand the malevolent-AI test. This is partly thanks to the vast quantities of data residing in enterprise networks made usable for machines to analyse and learn from.

With this insight and resource, IT professionals can make a significant amount of headway in their quest for AI capable of protecting large scale connected networks autonomously.

Read: The Jerusalem bombshell puts billions of American regional business at risk

IoT in context

These networks, huge as they are now, are going to expand even further thanks to the Internet of Things (IoT) becoming more prevalent in today’s society. IoT is a prodigious threat, as was shown by recent research, detailing the industries that are most affected by breaches of the technology.

By 2019, up to 89% of healthcare institutions will have adopted IoT technology in one form or another, yet 89% of organisations who have already deployed the technology have suffered a breach.

The research also showed that governments have suffered significant amounts of breaches, 85% in fact, but there are tactics in play and in development to help mitigate these risks.

IPSOS’s Saudi driving ban study reveals mind numbing results with huge impact

Strategies to deploy 

One such strategy called intent-based networking, which is a piece of software that aids in the planning, designing, implementing and operation of networks, is already a working concept. This takes the business goals and policies as input and converts that intelligence into a network configuration, which it generates into a design and configuration. 

The key for AI is to have readable and actionable data to feed off, which means networks that see a lot of data traffic can make decisions based on the behaviour of the user.

A technology called User and Entity Behaviour Analytics can do just this.

Through machine learning, and the innate knowledge of knowing what to look out for, it can monitor what end-points are using the network for.

Read: The New Year VAT countdown has begun: What you need to buy now

How to mitigate against threats

On the mitigation side, with the knowledge built up through data processing and analytics, networks can be programmed to take certain actions against suspected malicious behaviour, automatically.

Suspected individuals are asked to re-authenticate and obvious dangers can be quarantined.

When a breach does occur, AI can also use its knowledge to ‘score’ the risk of the threat, enabling security teams to quickly detect and respond to advanced cyber-attacks.

Artificial Intelligence and Machine Learning can work hand-in-hand on enterprise networks, learning the various nuances of the risks associated with cyber-attacks and responds adequately. Data is key for this process but so is diligence because criminals are usually one-step ahead.

Tags:

AMEinfo Staff
By AMEinfo Staff
AMEinfo staff members report business news and views from across the Middle East and North Africa region, and analyse global events impacting the region today.



AMEinfo EXPERTS