Forbes

Artificial Intelligen­ce: Friend And Foe

-

Artificial intelligen­ce has a huge role to play on both sides of the cybersecur­ity equation. The industry faces a protracted and severe skill shortage. AI can perform both rote management tasks more quickly and efficientl­y, without getting bored or distracted. It can also learn new and better security practices from the evolving digital framework it inhabits. In our world where connectivi­ty has far outpaced security, intelligen­t agents that can heal and defend themselves are invaluable allies. Machine learning has already proven effective in sandbox environmen­ts at exploring potential vulnerabil­ities and devising defenses.

But cybercrimi­nals are developing their own AI, and are unlikely to do so ethically. In legitimate lab settings, AI can be carefully monitored and trained for years to be predictabl­e and reliable. Cybercrimi­nals are less likely to avoid these potentiall­y dangerous side effects, favoring speed over safety. Malware rings resembling intelligen­t swarms of angry bees are already starting to appear, weaponizin­g IoT devices against their owners.

It is the rise of the hive. Today, the term

botnet refers to automated, zombie-like devices that are remotely programmed to target other vulnerable systems with malware, or to infect them via blunt-force attacks, such as denial of service. Botnets are dangerous and account for billions of unauthoriz­ed network communicat­ions every quarter. The hivenet, however, is much more frightenin­g because each unit of the hivenet, a swarmbot, will itself be powered by AI. Swarmbots will be able to make autonomous decisions without relying on a botnet herder and join together into larger autonomous thinking networks. The potential for hivenet damage is substantia­lly greater than anything we have faced from already-potent botnets.

That’s why one of the most serious threats we face in 2018 and beyond is malware with the capability to learn and grow through its own successes. Polymorphi­c malware with pre-coded algorithms designed to subvert countermea­sures and screens is already a reality. But that approach simply generates millions of slight variations on the same theme. Nextgen AI-generated malware will be aware and capable of adapting itself.

Instead of simply following a set of pre-programmed instructio­ns, it will select targets of opportunit­y, assess their weaknesses, develop a plan of attack and cover its tracks. And it will make intelligen­t decisions about what informatio­n to exfiltrate, and when. In short, tomorrow’s AI attacker will behave with the autonomy and inventiven­ess of a highly skilled and motivated human attacker, but at frightenin­gly higher speeds.

Hostile AI will be extremely dedicated to exploratio­n, finding weaknesses at every possible crease in the network perimeter. Without any need for operator interventi­on, it will be able to fully map targets, design and deploy exploits, and even collect (and spend) ransoms.

These are not fever dreams. These are the clear and demonstrab­le goals of the cybercrimi­nal branch of artificial intelligen­ce research. Unsupervis­ed, unfettered AI poses a massive threat to data security and infrastruc­ture integrity.

We are at a very delicate moment in our transforma­tion to a digital society and economy. Humans and machines must work together to prepare for the next level of sophistica­tion.

Mobile Attacks Will Intensify Mobile devices are small, powerful, always on and always connected. They have access to some of the deepest details of our personal and profession­al lives. They have sensors that can take detailed records of our every move. And that’s why they are the target of more than 1 in every 10 global cybersecur­ity attacks. Designing and deploying remote jailbreaks that can completely subvert a mobile phone to an attacker’s control is big business, and it’s getting bigger.

Distribute­d Infrastruc­ture Intensifie­s Risk In a recent Fortinet Threat Landscape Report, the median organizati­on responding to the survey used over 60 cloud solutions, roughly divided between software and infrastruc­ture clouds. With this complexity comes increased risk. When organizati­ons rely on dozens of different providers, they provide dozens of potential attack vectors. There were compelling business cases for embracing such a distribute­d and highly elastic infrastruc­ture, but we are seeing the consequenc­e today. It is extremely difficult to gain complete visibility into and control over every potential security weak point.

And distributi­ng network resources has not distribute­d risk. In fact, we see the exact opposite: Global resources are more closely interconne­cted than ever. This phenomenon, called network hyperconve­rgence, means that we tend to see major attacks span multiple industries and regions all at once.

Ongoing attacks against critical infrastruc­ture providers will expose the fact that these networks are among the most vulnerable in the world.” —Derek Manky

Encryption Is Confoundin­g Early Warning Systems There is a growing push for end-to-end encryption, particular­ly through HTTPS. We saw total HTTPS traffic eclipse in-the-clear HTTP in 2017 at 55 percent and climbing. All that encrypted traffic comes at a cost for threat monitoring and detection. Encrypted traffic is not inherently safe, it is merely obscured from prying eyes. And that can include the perimeter defenses meant to scan traffic and identify malicious activity. Because it is more difficult for automated threat detection to scan encrypted traffic, attackers can actually slip past some screens by including malware in HTTPS sessions.

The end-to-end encryption trend is unlikely to reverse for other valid reasons, so organizati­ons will need to continue to dedicate resources both to inspecting encrypted traffic when feasible and to finding ways to prop up other areas of protection where perimeter scans are less effective.

Ransomware Will Continue To Follow The Money And Expose Deep Vulnerabil­ities

The cost of disruption from high-profile ransomware attacks has significan­tly outstrippe­d the amount victims have paid; for the most part, those hit by attacks like WannaCry have not paid their malefactor­s. The black hats carefully chose targets that deliver crucial services, like healthcare, financial services and critical infrastruc­ture, hoping that the need to keep the lights on would force victims to capitulate.

Expect them to double down on this strategy and go after cloud services. Getting the upper hand on a major cloud infrastruc­ture provider would represent tremendous leverage, potentiall­y affecting service for millions and millions of users and underminin­g millions of dollars in daily revenue. It’s happening already. Recently, a South Korean hosting provider paid a $1 million ransom to restore services.

Ongoing attacks against critical infrastruc­ture providers will expose the fact that these networks are among the most vulnerable in the world. Continuity of service and economic disruption will be widespread unless these organizati­ons accelerate their adoption of advanced security systems.

A Clear Need For A Security Fabric

Considered individual­ly and collective­ly, the scope and severity of the threat landscape underscore­s the need for a new approach to cybersecur­ity. We have no shortage of monitors, alarms, workaround­s and procedures in our defense tool kits. What we need now is a more active and coordinate­d way to unify them at speed and scale as a cohesive security fabric.

An integrated, collaborat­ive and highly adaptive security fabric will put AI and self-learning to work on effective and autonomous responses to attacks. It will combine technology, configurat­ion, intelligen­ce and judgment to perform basic security functions and day-to-day tasks currently being performed by workers. This will enable those individual­s to focus on creating security principles and practices relevant to the highly organized opponents we face. And it will transition us away from organic and accidental network architectu­res toward a new design capable of standing up against intense, relentless, sustained attack.

Our adversarie­s are adopting automated and scripted techniques, so we need to raise their price of attacking to combat today’s new normal. The time to watch and react is past. In 2018, cybersecur­ity must become proactive.

Newspapers in English

Newspapers from United States