Artificial Intelligence (AI) has yet to reach a level of thinking, reasoning, and decision-making like humans can do, only digitally. Nonetheless, its benevolence is appreciated in efforts to streamline customer support, improve online shopping, provide auto-advisory, and more. The application of AI is thought to be endless. It would seem it may optimize just about anything. According to Cheddar, today I saw AI can be used to roll a joint more effectively. But let’s not get into that.
AI has been embraced by cybersecurity practitioners and solution providers to keep IT and application infrastructure running smoothly. It is effectively employed to predict vulnerabilities, exploit methods, and potentially identify malicious activity that presents a significant risk to an organization. With AI-based tools, security teams can scour and analyze hundreds (of thousands) of data points for patterns, far more thoroughly and quickly than human efforts. The hope is that with AI, they can identify sophisticated exploits before attackers can steal massive amounts of information or cause havoc. Some have dubbed it the ‘security’ silver bullet. But that it is not.
Recently, researchers in Australia found a way to trick Cylance’s AI-based anti-virus into tagging malware as benign. According to a Motherboard article, actors were able to subvert the machine-learning algorithm and cause it to falsely tag already known malware as “goodware.” This was achieved by applying a camouflage over the malware. Instead of altering application code, strings from a non-malicious file were appended to a malicious file, preventing the system from seeing that the malicious file is in fact malicious. There also have been cases where attackers attempt to disturb the machine learning-based defense systems with garbage data inputs. AI alone is not foolproof.
AI Algorithms are only as good as the code that governs them, the data used to teach them, the developer, and those monitoring and tuning. AI and machine learning have to be explicitly taught the rules for processing relevant data, and the dataset informing the AI needs to be of high quality.
Experts mention concerns about the accuracy of AI and machine learning: If the technology gets something wrong, it can actually negatively affect business efficiency. Today it is primarily a ‘postdictive’ technology – discovering events that have happened.
AI infrastructure can increase the vulnerable surface area at each data source integration point. Plan implementations carefully so as not to introduce a means for attackers to access your networked system.
As you look to optimize your infrastructure, keep these key points in mind:.
Artificial intelligence is one element of your security toolset. As you incorporate AI, you should also update your server-side application security strategy. Apply technologies that protect all aspects of the composite application from the web to microservices, down-stream application components and controllers, and at the lowest level – application memory. After all, Gartner now calls memory protection “mandatory.” Ensure vulnerable applications are secured whether or not they are developed in house, and even when threats do not originate over the network.
Visit www.Virsec.com to learn how Virsec ensures application security against the most dangerous attacks for all high valued applications and critical infrastructure systems.
Further resources:
Steps Companies Can Take to Stop Crypto-Miners from Hijacking Servers
ZombieLoad Affects Data Centers and Here’s What You Can Do About Itu-can-do-about-it/
White paper: Why Web Application Firewalls Are Not Enough
White paper: White Paper: Making Applications Truly Self-Defending
2-minute Video: Virsec Overview: Protecting Against Advanced Cyberattacks