www.amazon.com/author/paulbabicki
====================================================
The following is really a frightening outline of the potential of AI in the future. We may be faced with a proxy war, relying on our AI technology to keep us safe!
=================================================
SC Magazine US
by Bradley Barth, Senior
Reporter
February 17, 2017
The dark side of AI
For all the good that machine learning
can accomplish in cybersecurity, the technology is also accessible to bad
actors.
For all the
good that machine learning can accomplish in cybersecurity, it's important to
remember that the technology is also accessible to bad actors.
While writers
and futurists dream up nightmarish scenarios of artificial intelligence turning
on its creators and exterminating mankind like Terminators and Cylons – heck,
Stephen Hawking and Elon Musk have warned AI is dangerous – the more pressing
concern today is that machines can be intentionally programmed to abet
cybercriminal operations.
Could we one
day see the benevolent AIs of the world matching wits with malicious machines,
with the fate of our IT systems at stake? Here's what experts had to say…
Derek Manky,
global security strategist, Fortinet
“In the future
we will have attacker/defender AI scenarios play out. At first, they will
employ simple mechanics. Later, they will play out intricate scenarios with
millions of data points to analyze and action. However, at the end of the day –
there is only one output, a compromise or not.”
“In the coming
year we expect to see malware designed with adaptive, success-based learning to
improve the success and efficacy of attacks. This new generation of malware
will be situation-aware, meaning that it will understand the environment it is
in and make calculated decisions about what to do next. In many ways, it will
begin to behave like a human attacker: performing reconnaissance, identifying
targets, choosing methods of attack, and intelligently evading detection.”
“Autonomous
malware operates much like branch prediction technology, which is designed to
guess which branch of a decision tree a transaction will take before it is
executed… [This] malware, as with intelligent defensive solutions, are guided
by the collection and analysis of offensive intelligence, such as types of
devices deployed in a network segment, traffic flow, applications being used,
transaction details, time of day transactions occur, etc.”
“We will also
see the growth of cross-platform autonomous malware designed to operate on and
between a variety of mobile devices. These cross-platform tools, or
“transformers,” include a variety of exploit and payload tools that can operate
across different environments. This new variant of autonomous malware includes
a learning component that gathers offensive intelligence about where it has
been deployed, including the platform on which it has been loaded, then
selects, assembles, and executes an attack against its target using the
appropriate payload.”
Ryan Permeh,
founder and chief cyber scientist, Cylance
“Bad guys will
use AI… not just to create new types of attacks, but to find the limits in
existing defensive approaches… Having information on the limits of a defender's
defense is useful to an attacker, even if it isn't an automatic break of the
defenses.”
Justin Fier,
director of cyber intelligence and analysis, Darktrace
“I think we're
going to start to see in the next probably 12- 18 months… AI moving into the
other side. You're already starting to see polymorphic malware that [infects a]
network and then changes itself, or…automatically deletes itself and
disappears. So in its simplest form it's already there.”
“Where I think
it could potentially head is where it actually sits dormant on a system and
learns the user and then finds the most opportune time to take an action.”
Diana Kelley,
global executive security adviser, IBM
“Malware is
getting very, very situationally aware. There's some malware for example… that
can get onto the system and figure out, ‘Is there AV on here? Is there other
malware on here, shut it down so they're the only malware. Or even, ‘Oh look,
I've landed on a point-of-sale system rather than on a server, so I'm just
going to shut down all of my functions that would work on a regular server and
just have my ram scraper going cause that's what I want on the point of sale.”
Staffan Truve,
co-founder and CTO of Recorded Future
Truve said that
AI will be used to automatically craft effective spear-phishing emails that
contain victims' personal information, leveraging powerful data resources and
natural-language generation capabilities to sound convincing.
“I'm sure it
will be…very hard to identify phishing emails in the future.”
Additionally,
“We'll definitely be seeing AI that can analyze code and figure out ways to
find vulnerabilities.”
“It's going to
be an arms race between the good and bad guys… The good side is a bit ahead
right now and mostly I think the reason for that is that the bad guys are
successful enough with old methods… You can find enough targets that are who
unsophisticated enough to be vulnerable to current technologies.”
===================================Good Netiquette And A Green Internet To All! =====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting.
We can be contacted at:
===============================================================In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
Additionally, I am the president of Tabula Rosa Systems,
a “best of breed” reseller of products for communications, email,
network management software, security products and professional
services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.
No comments:
Post a Comment