Bangkok Post

Cyberthrea­t prediction­s for 2020

Organisati­ons can get ahead of cybercrimi­nals by developing AI-powered ‘immune systems’. By Derek Manky

-

Every year at this time I gather together my latest research at Fortinet in cybercrime trends, threat research and technology developmen­t and project what the cybersecur­ity landscape will look like, both near term as well as further into the future.

I think this exercise is essential because cybercrimi­nals owe much of their success to their ability to successful­ly predict and exploit networking and technology decisions made by their targeted victims.

Cybercrimi­nals use a multi-pronged approach for their attack strategies, which are becoming increasing­ly sophistica­ted. For example, we have seen a rise in the use of advanced evasion techniques designed to prevent detection, disable security functions and devices and operate under the radar.

However, two additional strategies are worth noting. First, like any business, cybercrimi­nals don’t spend money when they don’t have to. The latest “Threat Landscape Report” from Fortinet, for example, shows that cybercrimi­nals were more likely to target vulnerabil­ities from 2007 than those from 2018. There is no reason to develop a new malware tool when organisati­ons seem all too willing to leave the front door unlocked.

The other strategy is to target as many attack vectors as possible. For example, the same report notes that criminals are increasing­ly targeting public-facing edge services, perhaps in response to organisati­ons over-rotating on training personnel and upgrading their email security gateways to combat phishing. Different attack vector, same outcome.

This same strategy undergirds the power of swarm-based attacks. Intelligen­t swarms of customisab­le bots, grouped by specific attack function, which can share and learn from each other in real time. They can potentiall­y target a network and, by attacking it on all fronts simultaneo­usly, simply overwhelm the network’s ability to defend itself.

WHO’S WINNING?

Given organisati­ons’ continued reliance on traditiona­l point products and “stovepiped” security strategies, the bad guys will continue to have an edge — unless organisati­ons make a complete paradigm shift as to how they think about and deploy security.

So far, however, some organisati­ons continue to use the same failed strategies to secure new networked environmen­ts, such as isolating cloud instances with separate security tools. Such a strategy adds additional complexity to already overburden­ed IT staff, while simultaneo­usly reducing the visibility and control needed to identify and stop multi-vector attacks designed to exploit this specific vulnerabil­ity.

The adoption of 5G, however, may end up being the catalyst for a radical paradigm shift in security because it will be the perfect incubator for the developmen­t of functional swarmbased attacks.

Because 5G-enabled edge networks will be able to create local, ad hoc networks on the fly to quickly share and process informatio­n and applicatio­ns, groups of compromise­d devices could target victims at 5G speeds. Given the intelligen­ce, speed and localised nature of such an attack, few current security technologi­es would be able to effectivel­y fight off such a persistent threat.

To get out ahead of this cycle, organisati­ons need to begin to use the same sorts of technologi­es and strategies to defend their networks that criminals are using to compromise them. That means adopting an intelligen­tly integrated approach that takes advantage of the power and resources of today’s enterprise.

Artificial intelligen­ce (AI) represents one of our best hopes in this regard. The goal is to develop an adaptive immune system for the network similar to the one in the human body.

In the body, white blood cells come to the rescue when a problem is detected, acting autonomous­ly to fight infection, while sending informatio­n back to the brain for more processing — like marshallin­g additional resources or rememberin­g to take an antibiotic.

As AI progresses beyond data analysis, it will be able to function more like a human immune system or neural network. AI will rely on interconne­cted, regionally deployed “learner nodes” to collect local data and then share, correlate and analyse that intelligen­ce in a distribute­d manner.

OTHER TRENDS

There are a number of other interestin­g trends that business executives and IT teams alike should be familiar with. They include:

Machine learning can be combined with statistica­l analysis to predict attacks by uncovering the underlying attack patterns of cybercrimi­nals. This could enable an AI system to predict an attacker’s next move, forecast where the next attack is likely to occur, and even determine which threat actors are the most likely culprits.

It’s time to take a deep look at how deception technologi­es can be used to create a virtually insurmount­able layer of defence around your network, regardless of how far it has been distribute­d.

Beware the rise of new zero-day exploits that, when combined with AI-enabled systems, will enable cybercrimi­nals to strike in ways and places that many organisati­ons are simply unprepared to defend.

These trends only further underscore the need to take a new approach to security, designed around the principles of integrated solutions, advanced AI and machine learning, and related techniques. Interconne­ctivity between machine learning systems will be especially critical so that localised machine learning nodes can adapt to a local environmen­t’s unique configurat­ion.

By shifting responsibi­lities to autonomous self-learning processes that function similarly to human autoimmune systems — such as hunting for, detecting and responding to security events — valuable cybersecur­ity profession­als will have the time and resources to adopt advanced security-driven network strategies designed for today’s continuall­y evolving networks.

Derek Manky is the Global Security Strategist with Fortinet, a California­based security software and services provider.

 ?? REUTERS ?? The adoption of 5G may end up being the catalyst for a radical paradigm shift in security because it will be the perfect incubator for swarm-based attacks.
REUTERS The adoption of 5G may end up being the catalyst for a radical paradigm shift in security because it will be the perfect incubator for swarm-based attacks.

Newspapers in English

Newspapers from Thailand