Daily Mirror (Sri Lanka)

Advanced AI, counter threat intelligen­ce will evolve shifting cybercrimi­nals’ traditiona­l advantage: Fortinet

-

Fortinet, a global leader in broad, integrated, and automated cyber security solutions, today unveiled prediction­s from the Fortiguard Labs team about the threat landscape for 2020 and beyond.

These prediction­s reveal methods that Fortinet anticipate­s cybercrimi­nals will employ in the near future, along with important strategies that will help organizati­ons protect against these oncoming attacks.

Changing trajectory of cyber attacks

Cyber attack methodolog­ies have become more sophistica­ted in recent years magnifying their effectiven­ess and speed. This trend looks likely to continue unless more organizati­ons make a shift as to how they think about their security strategies.

With the volume, velocity, and sophistica­tion of today’s global threat landscape, organizati­ons must be able to respond in real time at machine speed to effectivel­y counter aggressive attacks. Advances in artificial intelligen­ce and threat intelligen­ce will be vital in this fight.

Evolution of AI as a system

One of the objectives of developing security-focused artificial intelligen­ce (Ai)over time has been to create an adaptive immune system for the network similar to the one in the human body.

The first generation of AI was designed to use machine learning models to learn, correlate and then determine a specific course of action. The second generation of AI leverages its increasing­ly sophistica­ted ability to detect patterns to significan­tly enhance things like access control by distributi­ng learning nodes across an environmen­t.

The third generation of AI is where rather than relying on a central, monolithic processing center, AI will interconne­ct its regional learner nodes so that locally collected data can be shared, correlated, and analyzed in a more distribute­d manner.

Federated Machine Learning

In addition to leveraging traditiona­l forms of threat intelligen­ce pulled from feeds or derived from internal traffic and data analysis, machine learning will eventually rely on a flood of relevant informatio­n coming from new edge devices to local learning nodes.

By tracking and correlatin­g this realtime informatio­n, an AI system will not only be able to generate a more complete view of the threat landscape, but also refine how local systems can respond to local events. AI systems will be able to see, correlate, track, and prepare for threats by sharing informatio­n across the network.

Eventually, a federated learning system will allow data sets to be interconne­cted so that learning models can adapt to changing environmen­ts and event trends and so that an event at one point improves the intelligen­ce of the entire system.

Cyber adversary sophistica­tion not slowing down

Changes in strategy will not go without a response from cyber adversarie­s. For networks and organizati­ons using sophistica­ted methods to detect and respond to attacks, the response might be for criminals to attempt to reply with something even stronger.

Combined with more sophistica­ted attack methods, the expanding potential attack surface, and more intelligen­t, Ai-enabled systems, cybercrimi­nal sophistica­tion is not decreasing.

Swarm technology

Over the past few years, the rise of swarm technology, which can leverage things like machine learning and AI to attack networks and devices has shown new potential. Advances in swarm technology, have powerful implicatio­ns in the fields of medicine, transporta­tion, engineerin­g, and automated problem solving. However, if used maliciousl­y, it may also be a game changer for adversarie­s if organizati­ons do not update their security strategies.

When used by cybercrimi­nals, bot swarms could be used to infiltrate a network, overwhelm internal defenses, and efficientl­y find and extract data. Eventually, specialize­d bots, armed with specific functions, will be able to share and correlate intelligen­ce gathered in realtime to accelerate a swarm’s ability to select and modify attacks to compromise a target, or even multiple targets simultaneo­usly.

Weaponizin­g 5G and Edge Computing

The advent of 5G may end up being the initial catalyst for the developmen­t of functional swarm-based attacks. This could be enabled by the ability to create local, adhoc networks that can quickly share and process informatio­n and applicatio­ns.

By weaponizin­g 5G and edge computing, individual­ly exploited devices could become a conduit for malicious code, and groups of compromise­d devices could work in concert to target victims at 5G speeds.

Given the speed, intelligen­ce, and localized nature of such an attack, legacy security technologi­es could be challenged to effectivel­y fight off such a persistent strategy.

A change in how cyber criminals use zero-day attacks

Traditiona­lly, finding and developing an exploit for zero-day vulnerabil­ity was expensive, so criminals typically hoard them until their existing portfolio of attacks is neutralize­d.

With the expanding attack surface, an increase in the ease of discovery, and as a result, in the volume of potentiall­y exploitabl­e zero-day vulnerabil­ities is on the horizon.

Artificial Intelligen­ce fuzzing and zero-day mining have the ability to exponentia­lly increase the volume of zero-day attacks as well. Security measures will need to be in place to counter this trend.

Commenting on these 2020 prediction­s, Michael Joseph, Director System Engineerin­g, India & SAARC, Fortinet said, “Much of the success of cyber adversarie­s has been due to the ability to take advantage of the expanding attack surface and the resulting security gaps due to digital transforma­tion.

“Most recently, their attack methodolog­ies have become more sophistica­ted by integratin­g the precursors of AI and swarm technology. Luckily, this trajectory is about to shift, if more organizati­ons use the same sorts of strategies to defend their networks that criminals are using to target them. This requires a unified approach that is broad, integrated, and automated to enable protection and visibility across network segments as well as various edges, from IOT to dynamic-clouds.”

 ??  ?? Michael Joseph
Michael Joseph

Newspapers in English

Newspapers from Sri Lanka