SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
The Application
of AI to Cybersecurity
An Avira White Paper
www.avira.com
Executive Summary
Machine Learning – sometimes referred to more
generally as Artificial Intelligence (AI) - is a
powerful tool used by cyber-security companies
to scale their response to an escalating threat
from the malware industry.
The rate at which malware is being created
far exceeds the financial resource - or human
capability – available to the cyber-security
industry to manually analyze or create rules for
each and every new form of emerging threat.
The technology of Applied Artificial Intelligence
(AI powered by Machine Learning) is an
increasingly important way in which we can
scale the detection and classification of malware.
We do not promote AI or Machine Learning as
a wunderheilung - a miracle remedy to all of the
world’s cyber-evils. We believe it is, nevertheless,
a very powerful tool.
Although Machine Learning is for many, a Black
Art, it is already in its third generation at Avira.
Our approach is to embed it in our cloud-based
security services (Avira Protection Cloud), and
within our endpoint security technology (SAVAPI).
We leverage our extensive data sources – 100
million sensors worldwide, and a database that has
been evolving for decades - with expert human
analytical expertise. The result is our AI platform,
NightVision, a core element of the industry’s best
performing malware detection service.
The Application of AI to Cybersecurity | An Avira White Paper | Page 2
Index
3
The changing pace of cybercrime
3
The need to augment human analytics
4
Forms of Artificial Intelligence
5
Applied AI: Machine and Deep Learning
7
Cyber hype versus AI reality
8
Avira’s approach
8
A bright future for AI in cybersecurity
A successful cyber-attack can have devastating consequences for an individual or business. Our digital presence
includes vast amounts of personal and financial information which we cannot afford to lose. In the business world it
is no different. Attacks have the potential to materially damage the reputation of a company or bring it down entirely,
and of course, so many attacks begin with the weakest link in the chain – the human employees and their devices.
Gone are the days when cybercrime was mostly digital graffiti designed to cause mayhem. Today cybercriminals
are part of a multibillion dollar global industry targeting top tier brands, governments, financial institutions and,
increasingly, individuals. The most recent research available states that malware writers see a 1,245% return on
investment [Trustwave Global Security Report 2015]; with such a lucrative business model, it is no surprise that
these criminals continue to invest in their own trade, exploring new ways to compromise systems and thus forcing
the cybersecurity industry to evolve quickly, to predict and thwart new threats.
In any given six-month period, Avira will typical register a 100 percent increase in threats. Trojan malware threats
will more than double; ransomware instances will grow by 20+ percent; phishing attacks will become yet more
targeted towards individual businesses and consumers. According to The Breach Level Index (BLI), a global database
that tracks data breaches and measures their severity, data breaches are set to cost the global economy $450 billion
in 2017, a figure that will no doubt continue to rise as the nature of cyber-attacks become increasingly targeted.
The changing pace of cybercrime
The need to augment human analytics
The rate at which new threats are being created now far exceeds the financial resource or human capability required
to manually analyze or create rules for each and every new piece of malware code. It is now more vital than ever for
our industry to seek an automated method of identifying malicious files and, over the past few years, more security
vendors have started examining how Artificial Intelligence could potentially serve this overarching aim by:
•	 Analyzing vast amounts of data to minimize the impact of cyber solutions on day-to-day web access
•	 Recognizing patterns and anomalies within files to highlight possible attacks
•	 Providing faster detection when cyber incidents occur to minimize damage and allows for quicker recovery
The Application of AI to Cybersecurity | An Avira White Paper | Page 3
Forms of Artificial Intelligence
On a fundamental level, what is AI?
Put simply AI is a subsection of computer science aimed at developing computers capable of performing activities
that are considered ‘intelligent’ by humans. AI today can be divided into three basic categories:
1.	Applied AI – sometimes termed Narrow or Weak AI is a system which is designed to deliver excep-
tional performance for a specific task, e.g. malware detection, object recognition in images. It op-
erates – and is capable of continuously improving – within a pre-defined range. It may or may not be
modelled after the human brain. There is a strong indication that the dominant use of AI in the fors-
eeable future will be ‘Applied AI’, designed for specific tasks such as TV or film recommendations on
Netflix, providing answers to specific questions via Amazon’s Echo or Apple’s Siri, or autonomous-
ly-powered self-driving vehicles. Applied AI is commonly delivered using one of several ‘well known’
techniques including Supervised or Unsupervised Machine Learning (specifically Deep Learning / Neural
Networks), and Natural Language Processing, each with its own benefits to the application required.
2.	(a) Artificial General Intelligence: a system which can perform not only one but the full range of intelligent
(cognitive) tasks at least as good as a human (or learn how to do it). It may or may not be modelled after the
human brain.
(b) Strong AI: the same as 2(a), but the system has its own consciousness and self-awareness. It may or may
not be modelled after the human brain.
Whether there is a difference between strong or general AI is a philosophical question (what is “consciousness”?
Does it exist at all?). That’s why you often see people treat Artificial General Intelligence and Strong AI as synonyms,
despite the fact that – contrary to what you might read or see in the media or in marketing literature – we are still
a long way from achieving either Artificial General Intelligence or Strong AI.
The Application of AI to Cybersecurity | An Avira White Paper | Page 4
We estimate that endpoint solutions, even those harnessing advanced heuristics or signature based protection,
will only ever achieve an overall level of between 85-95 percent protection. The reason for this is that endpoint
solutions will likely let any genuinely new threats – such as zero-day attacks – slip through undetected. The fact
is, that for a threat to be protected against, it must first be known to the endpoint solution. Just five percent of
existing malware code needs to be obfuscated to create a piece of unknown malware capable of bypassing a local
scanning engine.
With hundreds of thousands new threats being uncovered every day, it is also becoming more and more difficult
to continuously roll out up-to-date endpoint protection. Even if a security vendor had limitless human capacity to
manually analyze and write rules to protect against each and every new threat spotted on a daily basis, the frequency
and size of the updates being rolled out to each endpoint solution would be untenable, effectively destroying the online
experience for the vast majority of customers. Consequently, a combined approach, using a local scanning engine
in combination with a cloud security engine, both powered by AI / Machine Learning is, we believe, the optimum
approach to delivering the best malware protection.
It is interesting to take a moment to review the current Gartner Hype Cycle for Emerging Technologies
http://www.gartner.com/newsroom/id/3412017.
Gartner places General Machine Learning (or Artificial General Intelligence) as a technology that is more than 10
years away from mainstream adoption, and the majority of Machine Learning approaches at the top of the Hype
Cycle – at the ‘Peak of Inflated Expectations’.
This is an important observation, as technologies that are at the top of the Hype Cycle are very vulnerable to:
•	 over promise, under-performance (the Trough of Disillusionment)
•	 a lack of common methodologies to compare performance
•	 obfuscation by marketing departments.
Avira believes that Applied or Narrow AI based on Machine Learning will be dominant form of AI within the field of
cyber-security, and it already forms a key part of our malware detection capabilities.
Applied AI: Machine and Deep Learning
There are several general categories of Machine Learning which often overlap in their application, and are rarely
exclusive in their use.
Supervised or Unsupervised Machine Learning focuses on the development of computer programs that can change
and continually improve when exposed to new data. In the context of cybersecurity, this means giving them the
ability to identify and block new and emerging threats more quickly. An assumption ‘x’ is tested against data and
a result ‘y’ is obtained. ‘y’ is continually updated with new data, and the result of this brings us back to a new ‘x’ –
The Application of AI to Cybersecurity | An Avira White Paper | Page 5
The success of Deep Learning in a number of high profile cases has meant that there is a tendency in
industry, and even academia, for Machine Learning approaches to be rebranded in a Deep Learning
context. It’s good for business, and for raising funding for research, but may not always reflect reality.
One famous example of this misappropriation was the work done by AI research company Google Deep-
Mind who recently made headlines by developing AlphaGo, a Machine Learning-based computer pro-
gram which beat the world’s best player in the game of Go. The popular press reported this success as a
breakthrough in Artificial Intelligence, or Deep Learning, but it is clear from the technical publications
by Google DeepMind [Silver et al, 2016] that AlphaGo is actually a hybrid of many different techniques.
Their previous work on playing ATARI games used a pure Deep Learning based approach [Mnih et al,
2015], but the deep reinforcement learning component of AlphaGo is only one part of many. The bulk of
the work is actually done by a decade-old “classical” technique called Monte Carlo tree search. Never-
theless, it is still described as a Deep Learning approach.
The Application of AI to Cybersecurity | An Avira White Paper | Page 6
and this cycle repeats. Supervised Machine Learning is a process of retraining and relearning, supported by human
guidance to manually analyze any data that exceeds the parameters of the technology, so that the findings can be
fed back in to better retrain it.
In the field of malware classification many of the techniques used to implement supervised or unsupervised Machine
Learning offer significant benefits in terms of accurate and fast classification of malware with very low False Positive
rates, but it does require a large training base, extensive data expertise and resources.
Deep Learning: A particular approach to Machine Learning is Deep Learning. This is a subfield of Machine Learning
based on (deep) Neural Networks. Composed of many layers, inspired by biological neural systems, artificial neural
networks have recently been very successful in a number of applications, and are used to estimate functions that
can depend on large numbers of inputs. The more layers that can be introduced, the more the system begins to
resemble a functioning brain, thus enabling it to adapt and learn from its history.
Deep Learning is the current state of the art for many Applied AI tasks especially in the computer vision field,
but as with other Machine Learning techniques is has advantages and disadvantages in its application to malware
detection. One of the advantages of Deep Learning is that it starts at the raw data and aims to avoid the need for
explicit feature engineering, one of the most time-consuming parts of Machine Learning practice. This approach
works well in domains such as image classification where the represented data (a collection of pixels) is a reflection
of the true nature of the sample that needs to be classified. The abundance of data available with which to train
the classifier plays to the strength of Deep Learning. However, the huge amount of training data required for Deep
Learning systems becomes a problem in the case of obfuscated and decrypted data, which is very common in malware
detection. In order to compete with hand-crafted features obtained by using deeper levels of binary analysis or
advanced features obtained through emulation, unpacking or de-obfuscation, the Deep Learning algorithm requires
a very large quantity of data to detect meaningful patterns in the raw data. Another disadvantage is that Deep
Learning systems are extremely computationally expensive to ‘train’ – in other words ‘learn’ about the data. Even
when the system trains on a modest amount of data, they can take weeks to cluster (learn a model, eg, cluster
similar files) using hundreds of machines and powerful Graphical Processors (GPUs). As a result of this, training
times are long and Deep Learning systems lack the capacity to retrain quickly, i.e. the model is challenged to adapt
quickly to new families of malware, leaving users vulnerable should the system mis-classify a piece of malware.
The reality is that the distinction between Machine Learning and Deep Learning is somewhat artificial. While a key
difference to traditional Machine Learning is that Deep Learning aims to start at the raw data and learn the features
that represent the data rather than being guided by human intervention, the basic building blocks used in its
layers are essentially the same as in other Machine Learning approaches: Deep learning uses fundamental concepts
used in many different areas of Machine Learning and is complementary, not superior, to other Machine Learning
approaches.
Almost every security vendor currently purports to offer some form of AI or Machine Learning capability and many
literally shout it from advertising hoardings. However, the terms AI and Machine Learning have multiple definitions
and applications, not to mention being subject to frequent over-hyping and misappropriation, it’s not always clear
what these vendors are doing or how they apply Machine Learning beyond ‘cybersecurity delivered by AI’.
Often progress with Machine Learning and the scale of implementation has been limited. The reality is that the
barriers to entry for AI in cybersecurity are very high, for three reasons. Firstly, there is a significant cost involved in
building the fundamental systems required to operate the technology, not to mention additional costs required to
continue scaling the system to cope with the ever-growing number of threats being analyzed. Secondly, there is a
limited talent pool of engineers that possess expertise both in AI coding and the complex mathematical principles
needed to create an effective AI solution.
Lastly, even if firms can achieve all of the above, they may still be hampered by their lack of cybersecurity heritage
– and an extensive database with which to train their AI. Detailed knowledge and understanding of the evolution of
malware threats – scores of which have continually developed and mutated over periods of many years – cannot be
easily acquired. It’s not as simple as purchasing a database with basic details of every threat; it’s about collecting and
analyzing every single file to gain a comprehensive understanding of how each one operates, how different malware
families and coding patterns interlink and relate to one another, how tiny obfuscations in code can uniquely alter the
behavior and classification of a piece of malware etc. AI cybersecurity solutions can only be as good as the data being
fed into the AI platform, and this data is vast, rich and complex.
At Avira, we possess 30 years of malware data within a giant information repository that is continually being updated
with fresh intelligence – this is what feeds our Machine Learning-based AI platform.
Cyber hype versus AI reality
The Application of AI to Cybersecurity | An Avira White Paper | Page 7
Avira’s approach
Today we stand alone in the cybersecurity industry as the only third-generation AI security vendor, having first
invested in AI technology and expertise almost a decade ago. Consequently, we can offer customers – both
consumers and our technology partners – a hybrid approach to cybersecurity, augmenting our leading endpoint
malware protection with advanced, secure, cloud-based AI technology.
Avira does not rely on a single approach to the problem, but uses an ensemble of different Machine Learning
techniques, ranging from linear models such as logistic regression to nonlinear models such as kernelized support
vector machines, random forests and, for problems where it is the best choice, Deep Learning techniques such
as convolutional neural networks. Those techniques are applied for different detection tasks including malware
detection and phishing detection, depending on the needs of the user and the capabilities of the underlying platform.
By augmenting local endpoint security measures with a cloud based security solution – of which one technology is
Machine Learning AI – we create many layers of additional complexity for malware authors looking to evade detection.
We developed the Avira Protection Cloud to augment our endpoint security solution and afford our customers
access to our NightVision AI platform. Combining endpoint security with the Avira Protection Cloud and our AI
capabilities ensures customers permanently benefit from 99.9% percent protection against threats.
A bright future for AI in cybersecurity
AtAvira,wehavebeenattheforefrontofAIcybersecurityinnovationforadecade.Asthefirstvendorwithinthesecurityindustry
to identify how to apply AI to our field, we have continued to invest in the development of NightVision to the extent that it is
now matured to its third generation and provides a capability level unmatched within our industry. Yet we also know that other
security vendors continue to innovate within AI and ultimately, this can only be a good thing for consumers and businesses, as
the better the overall standard of AI, the better the level of protection they’ll be afforded. Today, potential customers compare
scanning engines when making a purchase decision; in two years’ time, we expect them to be comparing AI engines.
It is our believe that the industry will always need humans to continue upholding the highest levels of protection
for customers, whether it is conducting in-depth analysis in order to create new file attributes that help the AI learn
more effectively, or whether it is to ensure oversight and overarching system functionality. We know that the threat
landscape is only going to continue evolving, and we believe it makes strong strategic sense to augment technology
innovation with human expertise to best monitor and respond to these changes as they occur.
At Avira, we are hugely optimistic about AIs potential. Once designed, AI systems can be easily and quickly scaled
to take on more and more functionality – it’s simply a question of resources, underpinning the AI systems with the
technology required to operate them with the needed speed and efficiency. Yes, this means additional investment,
but in an industry forever facing the risk of being out-resourced and outflanked by the malware creators, this future
investment in AI must surely be deemed a necessity rather than a nice-to-have.
If you’ve found this overview of AI and its application in the realm of cybersecurity useful, please share it with your colleagues
and peers to help spread the word about the advantages of using AI-powered technologies to protect against cybercrime.
The Application of AI to Cybersecurity | An Avira White Paper | Page 8
© 2017 Avira Operations GmbH & Co. KG | All rights reserved
Avira | Kaplaneiweg 1 | 88069 Tettnang | Germany | Phone: +49 7542 5000 | www.avira.com
Product and company names mentioned herein are registered trademarks of their respective companies | Our general terms and conditions of business and license
terms can be found online: www.avira.com | May be subject to errors and technical changes | V1_0

Mais conteúdo relacionado

Mais procurados

2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 

Mais procurados (20)

Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 

Semelhante a Whitepaper Avira about Artificial Intelligence to cyber security

Semelhante a Whitepaper Avira about Artificial Intelligence to cyber security (20)

Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewRole of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
How AI can help with cybersecurity
How AI can help with cybersecurityHow AI can help with cybersecurity
How AI can help with cybersecurity
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Último (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

Whitepaper Avira about Artificial Intelligence to cyber security

  • 1. The Application of AI to Cybersecurity An Avira White Paper www.avira.com
  • 2. Executive Summary Machine Learning – sometimes referred to more generally as Artificial Intelligence (AI) - is a powerful tool used by cyber-security companies to scale their response to an escalating threat from the malware industry. The rate at which malware is being created far exceeds the financial resource - or human capability – available to the cyber-security industry to manually analyze or create rules for each and every new form of emerging threat. The technology of Applied Artificial Intelligence (AI powered by Machine Learning) is an increasingly important way in which we can scale the detection and classification of malware. We do not promote AI or Machine Learning as a wunderheilung - a miracle remedy to all of the world’s cyber-evils. We believe it is, nevertheless, a very powerful tool. Although Machine Learning is for many, a Black Art, it is already in its third generation at Avira. Our approach is to embed it in our cloud-based security services (Avira Protection Cloud), and within our endpoint security technology (SAVAPI). We leverage our extensive data sources – 100 million sensors worldwide, and a database that has been evolving for decades - with expert human analytical expertise. The result is our AI platform, NightVision, a core element of the industry’s best performing malware detection service. The Application of AI to Cybersecurity | An Avira White Paper | Page 2 Index 3 The changing pace of cybercrime 3 The need to augment human analytics 4 Forms of Artificial Intelligence 5 Applied AI: Machine and Deep Learning 7 Cyber hype versus AI reality 8 Avira’s approach 8 A bright future for AI in cybersecurity
  • 3. A successful cyber-attack can have devastating consequences for an individual or business. Our digital presence includes vast amounts of personal and financial information which we cannot afford to lose. In the business world it is no different. Attacks have the potential to materially damage the reputation of a company or bring it down entirely, and of course, so many attacks begin with the weakest link in the chain – the human employees and their devices. Gone are the days when cybercrime was mostly digital graffiti designed to cause mayhem. Today cybercriminals are part of a multibillion dollar global industry targeting top tier brands, governments, financial institutions and, increasingly, individuals. The most recent research available states that malware writers see a 1,245% return on investment [Trustwave Global Security Report 2015]; with such a lucrative business model, it is no surprise that these criminals continue to invest in their own trade, exploring new ways to compromise systems and thus forcing the cybersecurity industry to evolve quickly, to predict and thwart new threats. In any given six-month period, Avira will typical register a 100 percent increase in threats. Trojan malware threats will more than double; ransomware instances will grow by 20+ percent; phishing attacks will become yet more targeted towards individual businesses and consumers. According to The Breach Level Index (BLI), a global database that tracks data breaches and measures their severity, data breaches are set to cost the global economy $450 billion in 2017, a figure that will no doubt continue to rise as the nature of cyber-attacks become increasingly targeted. The changing pace of cybercrime The need to augment human analytics The rate at which new threats are being created now far exceeds the financial resource or human capability required to manually analyze or create rules for each and every new piece of malware code. It is now more vital than ever for our industry to seek an automated method of identifying malicious files and, over the past few years, more security vendors have started examining how Artificial Intelligence could potentially serve this overarching aim by: • Analyzing vast amounts of data to minimize the impact of cyber solutions on day-to-day web access • Recognizing patterns and anomalies within files to highlight possible attacks • Providing faster detection when cyber incidents occur to minimize damage and allows for quicker recovery The Application of AI to Cybersecurity | An Avira White Paper | Page 3
  • 4. Forms of Artificial Intelligence On a fundamental level, what is AI? Put simply AI is a subsection of computer science aimed at developing computers capable of performing activities that are considered ‘intelligent’ by humans. AI today can be divided into three basic categories: 1. Applied AI – sometimes termed Narrow or Weak AI is a system which is designed to deliver excep- tional performance for a specific task, e.g. malware detection, object recognition in images. It op- erates – and is capable of continuously improving – within a pre-defined range. It may or may not be modelled after the human brain. There is a strong indication that the dominant use of AI in the fors- eeable future will be ‘Applied AI’, designed for specific tasks such as TV or film recommendations on Netflix, providing answers to specific questions via Amazon’s Echo or Apple’s Siri, or autonomous- ly-powered self-driving vehicles. Applied AI is commonly delivered using one of several ‘well known’ techniques including Supervised or Unsupervised Machine Learning (specifically Deep Learning / Neural Networks), and Natural Language Processing, each with its own benefits to the application required. 2. (a) Artificial General Intelligence: a system which can perform not only one but the full range of intelligent (cognitive) tasks at least as good as a human (or learn how to do it). It may or may not be modelled after the human brain. (b) Strong AI: the same as 2(a), but the system has its own consciousness and self-awareness. It may or may not be modelled after the human brain. Whether there is a difference between strong or general AI is a philosophical question (what is “consciousness”? Does it exist at all?). That’s why you often see people treat Artificial General Intelligence and Strong AI as synonyms, despite the fact that – contrary to what you might read or see in the media or in marketing literature – we are still a long way from achieving either Artificial General Intelligence or Strong AI. The Application of AI to Cybersecurity | An Avira White Paper | Page 4 We estimate that endpoint solutions, even those harnessing advanced heuristics or signature based protection, will only ever achieve an overall level of between 85-95 percent protection. The reason for this is that endpoint solutions will likely let any genuinely new threats – such as zero-day attacks – slip through undetected. The fact is, that for a threat to be protected against, it must first be known to the endpoint solution. Just five percent of existing malware code needs to be obfuscated to create a piece of unknown malware capable of bypassing a local scanning engine. With hundreds of thousands new threats being uncovered every day, it is also becoming more and more difficult to continuously roll out up-to-date endpoint protection. Even if a security vendor had limitless human capacity to manually analyze and write rules to protect against each and every new threat spotted on a daily basis, the frequency and size of the updates being rolled out to each endpoint solution would be untenable, effectively destroying the online experience for the vast majority of customers. Consequently, a combined approach, using a local scanning engine in combination with a cloud security engine, both powered by AI / Machine Learning is, we believe, the optimum approach to delivering the best malware protection.
  • 5. It is interesting to take a moment to review the current Gartner Hype Cycle for Emerging Technologies http://www.gartner.com/newsroom/id/3412017. Gartner places General Machine Learning (or Artificial General Intelligence) as a technology that is more than 10 years away from mainstream adoption, and the majority of Machine Learning approaches at the top of the Hype Cycle – at the ‘Peak of Inflated Expectations’. This is an important observation, as technologies that are at the top of the Hype Cycle are very vulnerable to: • over promise, under-performance (the Trough of Disillusionment) • a lack of common methodologies to compare performance • obfuscation by marketing departments. Avira believes that Applied or Narrow AI based on Machine Learning will be dominant form of AI within the field of cyber-security, and it already forms a key part of our malware detection capabilities. Applied AI: Machine and Deep Learning There are several general categories of Machine Learning which often overlap in their application, and are rarely exclusive in their use. Supervised or Unsupervised Machine Learning focuses on the development of computer programs that can change and continually improve when exposed to new data. In the context of cybersecurity, this means giving them the ability to identify and block new and emerging threats more quickly. An assumption ‘x’ is tested against data and a result ‘y’ is obtained. ‘y’ is continually updated with new data, and the result of this brings us back to a new ‘x’ – The Application of AI to Cybersecurity | An Avira White Paper | Page 5
  • 6. The success of Deep Learning in a number of high profile cases has meant that there is a tendency in industry, and even academia, for Machine Learning approaches to be rebranded in a Deep Learning context. It’s good for business, and for raising funding for research, but may not always reflect reality. One famous example of this misappropriation was the work done by AI research company Google Deep- Mind who recently made headlines by developing AlphaGo, a Machine Learning-based computer pro- gram which beat the world’s best player in the game of Go. The popular press reported this success as a breakthrough in Artificial Intelligence, or Deep Learning, but it is clear from the technical publications by Google DeepMind [Silver et al, 2016] that AlphaGo is actually a hybrid of many different techniques. Their previous work on playing ATARI games used a pure Deep Learning based approach [Mnih et al, 2015], but the deep reinforcement learning component of AlphaGo is only one part of many. The bulk of the work is actually done by a decade-old “classical” technique called Monte Carlo tree search. Never- theless, it is still described as a Deep Learning approach. The Application of AI to Cybersecurity | An Avira White Paper | Page 6 and this cycle repeats. Supervised Machine Learning is a process of retraining and relearning, supported by human guidance to manually analyze any data that exceeds the parameters of the technology, so that the findings can be fed back in to better retrain it. In the field of malware classification many of the techniques used to implement supervised or unsupervised Machine Learning offer significant benefits in terms of accurate and fast classification of malware with very low False Positive rates, but it does require a large training base, extensive data expertise and resources. Deep Learning: A particular approach to Machine Learning is Deep Learning. This is a subfield of Machine Learning based on (deep) Neural Networks. Composed of many layers, inspired by biological neural systems, artificial neural networks have recently been very successful in a number of applications, and are used to estimate functions that can depend on large numbers of inputs. The more layers that can be introduced, the more the system begins to resemble a functioning brain, thus enabling it to adapt and learn from its history. Deep Learning is the current state of the art for many Applied AI tasks especially in the computer vision field, but as with other Machine Learning techniques is has advantages and disadvantages in its application to malware detection. One of the advantages of Deep Learning is that it starts at the raw data and aims to avoid the need for explicit feature engineering, one of the most time-consuming parts of Machine Learning practice. This approach works well in domains such as image classification where the represented data (a collection of pixels) is a reflection of the true nature of the sample that needs to be classified. The abundance of data available with which to train the classifier plays to the strength of Deep Learning. However, the huge amount of training data required for Deep Learning systems becomes a problem in the case of obfuscated and decrypted data, which is very common in malware detection. In order to compete with hand-crafted features obtained by using deeper levels of binary analysis or advanced features obtained through emulation, unpacking or de-obfuscation, the Deep Learning algorithm requires a very large quantity of data to detect meaningful patterns in the raw data. Another disadvantage is that Deep Learning systems are extremely computationally expensive to ‘train’ – in other words ‘learn’ about the data. Even when the system trains on a modest amount of data, they can take weeks to cluster (learn a model, eg, cluster similar files) using hundreds of machines and powerful Graphical Processors (GPUs). As a result of this, training times are long and Deep Learning systems lack the capacity to retrain quickly, i.e. the model is challenged to adapt quickly to new families of malware, leaving users vulnerable should the system mis-classify a piece of malware.
  • 7. The reality is that the distinction between Machine Learning and Deep Learning is somewhat artificial. While a key difference to traditional Machine Learning is that Deep Learning aims to start at the raw data and learn the features that represent the data rather than being guided by human intervention, the basic building blocks used in its layers are essentially the same as in other Machine Learning approaches: Deep learning uses fundamental concepts used in many different areas of Machine Learning and is complementary, not superior, to other Machine Learning approaches. Almost every security vendor currently purports to offer some form of AI or Machine Learning capability and many literally shout it from advertising hoardings. However, the terms AI and Machine Learning have multiple definitions and applications, not to mention being subject to frequent over-hyping and misappropriation, it’s not always clear what these vendors are doing or how they apply Machine Learning beyond ‘cybersecurity delivered by AI’. Often progress with Machine Learning and the scale of implementation has been limited. The reality is that the barriers to entry for AI in cybersecurity are very high, for three reasons. Firstly, there is a significant cost involved in building the fundamental systems required to operate the technology, not to mention additional costs required to continue scaling the system to cope with the ever-growing number of threats being analyzed. Secondly, there is a limited talent pool of engineers that possess expertise both in AI coding and the complex mathematical principles needed to create an effective AI solution. Lastly, even if firms can achieve all of the above, they may still be hampered by their lack of cybersecurity heritage – and an extensive database with which to train their AI. Detailed knowledge and understanding of the evolution of malware threats – scores of which have continually developed and mutated over periods of many years – cannot be easily acquired. It’s not as simple as purchasing a database with basic details of every threat; it’s about collecting and analyzing every single file to gain a comprehensive understanding of how each one operates, how different malware families and coding patterns interlink and relate to one another, how tiny obfuscations in code can uniquely alter the behavior and classification of a piece of malware etc. AI cybersecurity solutions can only be as good as the data being fed into the AI platform, and this data is vast, rich and complex. At Avira, we possess 30 years of malware data within a giant information repository that is continually being updated with fresh intelligence – this is what feeds our Machine Learning-based AI platform. Cyber hype versus AI reality The Application of AI to Cybersecurity | An Avira White Paper | Page 7
  • 8. Avira’s approach Today we stand alone in the cybersecurity industry as the only third-generation AI security vendor, having first invested in AI technology and expertise almost a decade ago. Consequently, we can offer customers – both consumers and our technology partners – a hybrid approach to cybersecurity, augmenting our leading endpoint malware protection with advanced, secure, cloud-based AI technology. Avira does not rely on a single approach to the problem, but uses an ensemble of different Machine Learning techniques, ranging from linear models such as logistic regression to nonlinear models such as kernelized support vector machines, random forests and, for problems where it is the best choice, Deep Learning techniques such as convolutional neural networks. Those techniques are applied for different detection tasks including malware detection and phishing detection, depending on the needs of the user and the capabilities of the underlying platform. By augmenting local endpoint security measures with a cloud based security solution – of which one technology is Machine Learning AI – we create many layers of additional complexity for malware authors looking to evade detection. We developed the Avira Protection Cloud to augment our endpoint security solution and afford our customers access to our NightVision AI platform. Combining endpoint security with the Avira Protection Cloud and our AI capabilities ensures customers permanently benefit from 99.9% percent protection against threats. A bright future for AI in cybersecurity AtAvira,wehavebeenattheforefrontofAIcybersecurityinnovationforadecade.Asthefirstvendorwithinthesecurityindustry to identify how to apply AI to our field, we have continued to invest in the development of NightVision to the extent that it is now matured to its third generation and provides a capability level unmatched within our industry. Yet we also know that other security vendors continue to innovate within AI and ultimately, this can only be a good thing for consumers and businesses, as the better the overall standard of AI, the better the level of protection they’ll be afforded. Today, potential customers compare scanning engines when making a purchase decision; in two years’ time, we expect them to be comparing AI engines. It is our believe that the industry will always need humans to continue upholding the highest levels of protection for customers, whether it is conducting in-depth analysis in order to create new file attributes that help the AI learn more effectively, or whether it is to ensure oversight and overarching system functionality. We know that the threat landscape is only going to continue evolving, and we believe it makes strong strategic sense to augment technology innovation with human expertise to best monitor and respond to these changes as they occur. At Avira, we are hugely optimistic about AIs potential. Once designed, AI systems can be easily and quickly scaled to take on more and more functionality – it’s simply a question of resources, underpinning the AI systems with the technology required to operate them with the needed speed and efficiency. Yes, this means additional investment, but in an industry forever facing the risk of being out-resourced and outflanked by the malware creators, this future investment in AI must surely be deemed a necessity rather than a nice-to-have. If you’ve found this overview of AI and its application in the realm of cybersecurity useful, please share it with your colleagues and peers to help spread the word about the advantages of using AI-powered technologies to protect against cybercrime. The Application of AI to Cybersecurity | An Avira White Paper | Page 8 © 2017 Avira Operations GmbH & Co. KG | All rights reserved Avira | Kaplaneiweg 1 | 88069 Tettnang | Germany | Phone: +49 7542 5000 | www.avira.com Product and company names mentioned herein are registered trademarks of their respective companies | Our general terms and conditions of business and license terms can be found online: www.avira.com | May be subject to errors and technical changes | V1_0