Contact Brookcourt +44 (0)1737 886111 Email Brookcourt Get in touch Follow Brookcourt Follow us on LinkedIn
Machine Learning Cyber Security
 

Machine Learning In Cyber Security

 

Techniques in artificial intelligence (AI) and machine learning are changing our view of the world. According to Recorded Future, cyber security has seen some of the widest ranging and impacting implementations of machine learning, deep learning, natural language processing, and more.

AI and machine learning are impacting how we interact with technology and raising our expectations of what is possible. AI has been touted as the natural next step to solving a whole range of problems in fields like fraud prevention, medicine, and transportation. In reality, it’s cyber security that has arguably seen some of the widest ranging and impacting implementations of AI and machine learning.

Why Now?

This development has been fueled by decades of exponential improvement in raw computing power, combined with progress in algorithms and, perhaps most importantly, a huge increase in the volume of data for training and testing that is readily available on the internet. The combination of these three factors is now giving us everything from voice-controlled digital assistants to autonomous cars. It is safe to say that “this changes everything.”

Aren’t AI and Machine Learning the Same Thing?

As these concepts move into mainstream consciousness, it’s inevitable that there will be confusion in defining these technologies and what they do. Big data and analytics expert Bernard Marr endeavors to broadly define both AI and machine learning:

“Artificial intelligence is the broader concept of machines being able to carry out tasks in a way that we would consider “smart.” Machine learning is a current application of AI based around the idea that we should really just be able to give machines access to data and let them learn for themselves.”

What Are the Applications for Cyber Security?

There has been much speculation of an impending “arms race” between threat actors and security professionals both using AI. Some phishing scams already use AI to generate convincing social engineering campaigns. Security products are currently integrating AI to aid with challenges like threat detection, threat modeling, and anomaly detection. At Brookcourt Solutions, we believe man and machine working together as cyber security centaurs will create teams capable of tackling the most difficult cyber adversaries.

Some claim that computers have become fast enough that the efficiency afforded by human collaboration on a centaur team may no longer make a difference in chess, but the space of possible actions for threat actors is far more expansive than a chess game, and there is little tolerance for unexpected blind spots. Also, unlike in chess, the counterparts in cyber surveillance do not follow any rules.

We look to the centaur model to create the best possible threat analysts, incident responders, and security teams, combining the speed and depth of AI with the strategic vision of a human expert.
You can find out how this approach to threat intelligence and cyber security as a whole offers the greatest opportunity to get ahead of emerging threats by reading the attached white paper, “Machine Learning in Cyber Security: Age of Centaurs”: Machine Learning in Cyber Security White Paper – Brookcourt

 

Sign up to our newsletter Stay connected