SlideShare a Scribd company logo
3
Most read
7
Most read
14
Most read
Cyber security with ai
Cyber Security
IN ARTIFICIAL INTELLIGENCE
Artificial Intelligence
ARTIFICIAL INTELLIGENCE OR AI IS THE INTELLIGENCE SHOWN BY
MACHINES. WHEN ANY MACHINE BECOMES AWARE OF ITS SURROUNDINGS
AND DOES SOMETHING KEEPING THAT IN MIND IN ORDER TO ACHIEVE
SOMETHING. USUALLY THE TERM ARTIFICIAL INTELLIGENCE IS USED WHEN A
MACHINE BEHAVES LIKE A HUMAN IN ACTIVITIES SUCH AS PROBLEM
SOLVING OR LEARNING, WHICH IS ALSO KNOWN AS MACHINE LEARNING. AI
IS A SCIENCE AND TECHNOLOGY BASED ON DISCIPLINES SUCH AS:
COMPUTER SCIENCE, ENGINEERING, PSYCHOLOGY ETC.
THE MAIN GOAL OF ARTIFICIAL INTELLIGENCE IS TO CREATE A TECHNOLO GY
THAT ALLOWS COMPUTERS AND MACHINES TO FUNCTION IN AN
INTELLIGENT MANNER. THE ENTIRE PROBLEM HAS BEEN BROKEN DOWN
INTO THE FOLLOWING SUB-PROBLEMS
· LEARNING
· NATURAL LANGUAGE PROCESSING
· REASONING AND PROBLEM SOLVING
· PLANNING
· CREATIVITY
Cyber Security
CYBER-SECURITY IS THE PRACTICE OF DEFENDING COMPUTERS, SERVERS,
MOBILE DEVICES, ELECTRONIC SYSTEMS, NETWORKS, AND DATA FROM
MALICIOUS ATTACKS. IT'S ALSO KNOWN AS INFORMATION TECHNOLOGY
SECURITY OR ELECTRONIC INFORMATION SECURITY. THE TERM APPLIES IN
A VARIETY OF CONTEXTS, FROM BUSINESS TO MOBILE COMPUTING, AND
CAN BE DIVIDED INTO A FEW COMMON CATEGORIES.
• NETWORK SECURITY IS THE PRACTICE OF SECURING A COMPUTER
NETWORK FROM INTRUDERS, WHETHER TARGETED ATTACKERS OR
OPPORTUNISTIC MALWARE.
• INFORMATION SECURITY PROTECTS THE INTEGRITY AND PRIVACY OF
DATA, BOTH IN STORAGE AND IN TRANSIT.
• DISASTER RECOVERY AND BUSINESS CONTINUITY DEFINE HOW AN
ORGANIZATION RESPONDS TO A CYBER-SECURITY INCIDENT OR ANY
OTHER EVENT THAT CAUSES THE LOSS OF OPERATIONS OR DATA.
DISASTER RECOVERY POLICIES DICTATE HOW THE ORGANIZATION
RESTORES ITS OPERATIONS AND INFORMATION TO RETURN TO THE
SAME OPERATING CAPACITY AS BEFORE THE EVENT. BUSINESS
CONTINUITY IS THE PLAN THE ORGANIZATION FALLS BACK ON WHILE
TRYING TO OPERATE WITHOUT CERTAIN RESOURCES.
The scale of the cyber threat
The U.S. government spends $19 billion per year on cyber-security but warns that
cyber-attacks continue to evolve at a rapid pace.To combat the proliferation of
malicious code and aid in early detection, the National Institute of Standards and
Technology (NIST)recommends continuous, real-time monitoring of all electronic
resources.
• The threats countered by cyber-security are three-fold:
• 1. Cybercrime includes single actors or groups targeting systems for financial
gain or to cause disruption.
• 2. Cyber attack often involves politically motivated information gathering.
• 3. Cyber terror is intended to undermine electronic systems to cause panic or
fear.
Common methods attackers use to control computers or networks include viruses,
worms, spyware,Trojans, and Ransom ware.Viruses and worms can self-replicate
and damage files or systems, while spyware andTrojans are often used for
surreptitious data collection. Ransom ware waits for an opportunity to encrypt all
the user’s information and demands payment to return access to the user.
Malicious code often spreads via an unsolicited email attachment or a legitimate-
looking download that actually carries a malware payload.
Cyber-security threats affect all industries, regardless of size.The industries that
reported the most cyber attacks in recent years are healthcare, manufacturing,
finance, and government. Some of these sectors are more appealing to
cybercriminals because they collect financial and medical data, but all businesses
that use networks can be targeted for customer data, corporate espionage, or
customer attacks.
Artificial Intelligence for Cyber security
• The next generation of cyber security products are increasingly incorporating
Artificial Intelligence (AI) and Machine Learning (ML) technologies. By training
AI software on large datasets of cyber security, network, and even physical
information, cyber security solutions providers aim to detect and block
abnormal behavior.
• There are different approaches to using AI for cyber security, and it is
important first to determine which is appropriate for the organization. Some
software applications analyze raw network data to spot an irregularity, while
others focus on user/asset/entity behavior to detect patterns that deviate from
normal.The types of data streams, how they are collected, and the level of
effort needed by analysts all vary by approach.
Artificial Intelligence for Cyber security
• Cyber security solutions utilizing AI and ML can greatly reduce the amount of
time needed for threat detection and incident response, often being able to
alert IT staff of anomalous behavior in real time.These technologies also help
reduce and prioritize traditional security alerts, increasing the efficacy of
existing investments and human analysts.
• Attackers are also using AI and ML to better understand their targets and
launch attacks. AI increases the ability of defenders to identify attacks, but it
may also help hackers learn about a target’s vulnerabilities.
Which types of artificial intelligence
applications are being used in cyber security
solutions?
It is up to human imagination. For the sake of clarity, following application categories
can be examined:
• Spam Filter Applications (spam assassin)
• Network Intrusion Detection and Prevention
• Fraud detection
• Credit scoring and next-best offers
• Botnet Detection
• Secure User Authentication
• Cyber security Ratings
• Hacking Incident Forecasting
How can an artificial intelligence application
that does malware analysis be used?
It’s possible to detect a software whether is a Malware or a normal software with
artificial intelligence. In order to develop an artificial intelligence application that
does malware detection the first thing to do is to determine some distinctive
features. In addition of some harmless software and some malware to those
features, the system is trained.
Here are some features to use in analyzation of a software:
• Accessed APIs.
• Accessed fields on the disk.
• Accessed environmental products (camera, keyboard etc.)
How can an artificial intelligence application
that does malware analysis be used?
• Consumed processor power.
• Consumed bandwidth.
• Amount of data transmitted over the internet.
By using the distinguished features, the system is built. Once you give a test
software to the system, it tries to detect whether the software is a malware or
not by analyzing these distinguished features.
Is artificial intelligence(AI) used to detect cyber
attacks, how is its success rate?
Of courseAI can be used to detect cyber attacks.There are plenty of academic
researches about detecting cyber attacks using artificial intelligence. The
success rate of those researches varies between 85% and 99%.
In the last few years, in addition to academic researches, some products have
been improved to detect cyber attacks with the help of artificial intelligence like
DarkTrace. DarkTrace claims to have more than 99% of success rate and it also
has a very low rate of false positives.
Are there any companies that develop cyber
security applications using artificial
intelligence?
There are lots of companies that develop cyber security applications by using
artificial intelligence. The companies that started early focusing on this domain
started worthing more in a very short time. Here are the example.
Dark trace, the company that was founded in 2013, developed a product that
does anomaly detection on a network with machine learning.The company is
now worth 825 million$. CYLANCE, the company that was founded in 2012,
developed a product to prevent advanced level of cyber threats.The company is
worth 1 billion $ now.
Examples of the machine learning algorithms
which are being used to develop cyber security
applications
Spam assassin, for instance, is a project that is an open source code and it does
spam mail filtering. Spam assassin makes a feature list in order to control if an
email is a spam mail or not. Extracted features from an analyzed email is
processed with Naive Bayes algorithm.The most common algorithms in cyber
attack systems are, Random Forest, DecisionTree, SupportVector Machines etc.
In the last few years, the most commonly used machine learning algorithm is
without a doubt, Deep Learning algorithm. Deep learning is a machine learning
algorithm that uses artificial neural networks. Nowadays, most of the companies
that do artificial intelligence researchers use this method.
Is it possible to detect cyber attacks before
they happen?
In order for a cyber attack to be successful, there are some steps to follow
successfully.These steps are called “Cyber Kill Chain”. Attackers might leave
some traces in some of these steps or they can access information about the
targeted company that was leaked before, while they’re in information
acquisition phase. We can see similar situations like this one. Preventing these
kind of situations is only possible if you observe your company constantly with
the eyes of an attacker. In addition to that, knowing what the attackers can find
when they do their research about your company beforehand, and as a result,
taking precautions prevents these situations.
Norm shield Cyber Risk Scorecard, scans most of the information about your
company, that can be accessed via internet.
Some of the information that can be accessed about your company are:
• Posts that target your company in dark forums or social media.
• Leaked information about your company’s customers and employees. (e-mail,
passwords, credit card information etc.)
• Phish website, mobile and desktop applications about your company.
If you know your virtual existence well and can manage it, you can reduce the
risk of being affected from a cyber attack. Cyber Risk Scorecard, gives you the
possibility to access information about your company from various sources and
lets you manage that data which results to taking precautions.
Advantages of Artificial Intelligence
• Organizations face millions of threats each day making is impossible for
security researcher to analyze and categorize them.This task can be done by
using Machine Learning in an efficient way.
• By finding a way to work towards unsupervised and supervised machine
learning will enable us to fully utilize our current knowledge of threats and
vectors. Once those are combined with the ability to detect new attacks and
discover new vulnerabilities, our systems will be able to protect us from threats
is a much better and efficient way.
• Another benefit of using AI based machines is that, in theory, these systems
would work in a more calculated approach and in a more accurate way
resulting in eliminating human error. Additionally, these systems could work
simultaneously on various tasks, monitoring and protecting a vast number of
devices and systems.They can therefore mitigate large scale attacks
Disadvantages of Artificial Intelligence
• The biggest disadvantage of any AI based system is that we cannot predict
what it’ll do. If fallen into the wrong hands, the result could be fatal and a
whole different level can could do more damage than good.
• A super-intelligent AI will be really good at completing goals, but, if those
goals aren’t aligned with ours, we’ll have a problem. AI in security systems had
foregone the utilization of valuable analyst skills and therefore didn’t benefit
from human feedback.
• Even though the initial concerns about the development on AI in cyber security
may revolve around concerns about eliminating the much needed human
expertise, intuition and judgment, the real disadvantage of artificial
intelligence is its unpredictability.
ThankYou

More Related Content

PPTX
Overview of Artificial Intelligence in Cybersecurity
PPTX
Artificial Intelligence and Cybersecurity
PPTX
Cyber Security in AI (Artificial Intelligence)
PDF
HOW AI CAN HELP IN CYBERSECURITY
PPTX
AI and ML in Cybersecurity
PDF
Combating Cyber Security Using Artificial Intelligence
PDF
Artificial Intelligence for Cyber Security
PPTX
6th Generation of network Architecture (6G)
Overview of Artificial Intelligence in Cybersecurity
Artificial Intelligence and Cybersecurity
Cyber Security in AI (Artificial Intelligence)
HOW AI CAN HELP IN CYBERSECURITY
AI and ML in Cybersecurity
Combating Cyber Security Using Artificial Intelligence
Artificial Intelligence for Cyber Security
6th Generation of network Architecture (6G)

What's hot (20)

PPTX
How is ai important to the future of cyber security
PPTX
Cyber security and AI
PPTX
Machine Learning in Cyber Security
PPTX
Deep Learning Explained
PDF
The Top Trends in Artificial Intelligence
PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
PPTX
Machine learning in Cyber Security
PDF
AI in security
PDF
Generative AI
PDF
AI and Cybersecurity - Food for Thought
PDF
20 Latest Computer Science Seminar Topics on Emerging Technologies
PDF
An Introduction to Generative AI
PPTX
Cybersecurity artificial intelligence presentation
PPTX
What is Deep Learning?
PPTX
AI and the Impact on Cybersecurity
PPTX
Application of Machine Learning in Cybersecurity
PDF
Practical Applications of Machine Learning in Cybersecurity
PPTX
Generative AI
PPTX
Artificial intelligence
PPTX
Presentation on Ethical Hacking ppt
How is ai important to the future of cyber security
Cyber security and AI
Machine Learning in Cyber Security
Deep Learning Explained
The Top Trends in Artificial Intelligence
“AI techniques in cyber-security applications”. Flammini lnu susec19
Machine learning in Cyber Security
AI in security
Generative AI
AI and Cybersecurity - Food for Thought
20 Latest Computer Science Seminar Topics on Emerging Technologies
An Introduction to Generative AI
Cybersecurity artificial intelligence presentation
What is Deep Learning?
AI and the Impact on Cybersecurity
Application of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
Generative AI
Artificial intelligence
Presentation on Ethical Hacking ppt
Ad

Similar to Cyber security with ai (20)

PPT
Ethical hacking a licence to hack
PDF
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PPTX
First line of defense for cybersecurity : AI
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
Introduction to cyber security
PDF
What Is Cyber Threat Intelligence | How It Work? | SOCVault
PPTX
Module 1Introduction to cyber security.pptx
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
PDF
Cyber Security Notes Unit 1 for Engineering
PPTX
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
PPTX
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
PPTX
Vulnerability in ai
PPT
Ethicalhackingalicencetohack 120223062548-phpapp01
PDF
Implications of Misuse and Cyber Security.pdf
PPTX
Introduction to Cyber Security
PDF
How AI can help with cybersecurity
PDF
Cyber Security Matters a book by Hama David Bundo
PDF
Cyber security for Developers
Ethical hacking a licence to hack
Top Positive and Negative Impacts of AI & ML on Cybersecurity
First line of defense for cybersecurity : AI
Whitepaper Avira about Artificial Intelligence to cyber security
Cybersecurity Basics of awareness presentation .pptx
Cybersecurity Basics of awareness presentation .pptx
Introduction to cyber security
What Is Cyber Threat Intelligence | How It Work? | SOCVault
Module 1Introduction to cyber security.pptx
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
Cyber Security Notes Unit 1 for Engineering
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
Vulnerability in ai
Ethicalhackingalicencetohack 120223062548-phpapp01
Implications of Misuse and Cyber Security.pdf
Introduction to Cyber Security
How AI can help with cybersecurity
Cyber Security Matters a book by Hama David Bundo
Cyber security for Developers
Ad

More from Burhan Ahmed (20)

PPTX
Wireless mobile communication
PPTX
Virtual function
PPTX
Uses misuses and risk of software
PPTX
Types of computer
PPTX
PPTX
Topology
PPTX
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
PPTX
Software house organization
PPT
Social interaction
PPTX
Role model
PPTX
Rights and duties
PPTX
Planning work activities
PPTX
Peripheral devices
PPTX
Parallel computing and its applications
PPTX
Operator overloading
PPT
Normalization
PPTX
Managing strategy
PPT
Letter writing
PPTX
Job analysis and job design
PPTX
Intellectual property
Wireless mobile communication
Virtual function
Uses misuses and risk of software
Types of computer
Topology
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
Software house organization
Social interaction
Role model
Rights and duties
Planning work activities
Peripheral devices
Parallel computing and its applications
Operator overloading
Normalization
Managing strategy
Letter writing
Job analysis and job design
Intellectual property

Recently uploaded (20)

PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
System and Network Administration Chapter 2
PPTX
Materi-Enum-and-Record-Data-Type (1).pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
history of c programming in notes for students .pptx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Transform Your Business with a Software ERP System
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Complete React Javascript Course Syllabus.pdf
PPT
JAVA ppt tutorial basics to learn java programming
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Essential Infomation Tech presentation.pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
How to Choose the Right IT Partner for Your Business in Malaysia
Operating system designcfffgfgggggggvggggggggg
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
System and Network Administration Chapter 2
Materi-Enum-and-Record-Data-Type (1).pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
history of c programming in notes for students .pptx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
2025 Textile ERP Trends: SAP, Odoo & Oracle
Transform Your Business with a Software ERP System
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Which alternative to Crystal Reports is best for small or large businesses.pdf
Complete React Javascript Course Syllabus.pdf
JAVA ppt tutorial basics to learn java programming
Design an Analysis of Algorithms I-SECS-1021-03
Essential Infomation Tech presentation.pptx

Cyber security with ai

  • 3. Artificial Intelligence ARTIFICIAL INTELLIGENCE OR AI IS THE INTELLIGENCE SHOWN BY MACHINES. WHEN ANY MACHINE BECOMES AWARE OF ITS SURROUNDINGS AND DOES SOMETHING KEEPING THAT IN MIND IN ORDER TO ACHIEVE SOMETHING. USUALLY THE TERM ARTIFICIAL INTELLIGENCE IS USED WHEN A MACHINE BEHAVES LIKE A HUMAN IN ACTIVITIES SUCH AS PROBLEM SOLVING OR LEARNING, WHICH IS ALSO KNOWN AS MACHINE LEARNING. AI IS A SCIENCE AND TECHNOLOGY BASED ON DISCIPLINES SUCH AS: COMPUTER SCIENCE, ENGINEERING, PSYCHOLOGY ETC. THE MAIN GOAL OF ARTIFICIAL INTELLIGENCE IS TO CREATE A TECHNOLO GY THAT ALLOWS COMPUTERS AND MACHINES TO FUNCTION IN AN INTELLIGENT MANNER. THE ENTIRE PROBLEM HAS BEEN BROKEN DOWN INTO THE FOLLOWING SUB-PROBLEMS · LEARNING · NATURAL LANGUAGE PROCESSING · REASONING AND PROBLEM SOLVING · PLANNING · CREATIVITY
  • 4. Cyber Security CYBER-SECURITY IS THE PRACTICE OF DEFENDING COMPUTERS, SERVERS, MOBILE DEVICES, ELECTRONIC SYSTEMS, NETWORKS, AND DATA FROM MALICIOUS ATTACKS. IT'S ALSO KNOWN AS INFORMATION TECHNOLOGY SECURITY OR ELECTRONIC INFORMATION SECURITY. THE TERM APPLIES IN A VARIETY OF CONTEXTS, FROM BUSINESS TO MOBILE COMPUTING, AND CAN BE DIVIDED INTO A FEW COMMON CATEGORIES. • NETWORK SECURITY IS THE PRACTICE OF SECURING A COMPUTER NETWORK FROM INTRUDERS, WHETHER TARGETED ATTACKERS OR OPPORTUNISTIC MALWARE. • INFORMATION SECURITY PROTECTS THE INTEGRITY AND PRIVACY OF DATA, BOTH IN STORAGE AND IN TRANSIT. • DISASTER RECOVERY AND BUSINESS CONTINUITY DEFINE HOW AN ORGANIZATION RESPONDS TO A CYBER-SECURITY INCIDENT OR ANY OTHER EVENT THAT CAUSES THE LOSS OF OPERATIONS OR DATA. DISASTER RECOVERY POLICIES DICTATE HOW THE ORGANIZATION RESTORES ITS OPERATIONS AND INFORMATION TO RETURN TO THE SAME OPERATING CAPACITY AS BEFORE THE EVENT. BUSINESS CONTINUITY IS THE PLAN THE ORGANIZATION FALLS BACK ON WHILE TRYING TO OPERATE WITHOUT CERTAIN RESOURCES.
  • 5. The scale of the cyber threat The U.S. government spends $19 billion per year on cyber-security but warns that cyber-attacks continue to evolve at a rapid pace.To combat the proliferation of malicious code and aid in early detection, the National Institute of Standards and Technology (NIST)recommends continuous, real-time monitoring of all electronic resources. • The threats countered by cyber-security are three-fold: • 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. • 2. Cyber attack often involves politically motivated information gathering. • 3. Cyber terror is intended to undermine electronic systems to cause panic or fear.
  • 6. Common methods attackers use to control computers or networks include viruses, worms, spyware,Trojans, and Ransom ware.Viruses and worms can self-replicate and damage files or systems, while spyware andTrojans are often used for surreptitious data collection. Ransom ware waits for an opportunity to encrypt all the user’s information and demands payment to return access to the user. Malicious code often spreads via an unsolicited email attachment or a legitimate- looking download that actually carries a malware payload. Cyber-security threats affect all industries, regardless of size.The industries that reported the most cyber attacks in recent years are healthcare, manufacturing, finance, and government. Some of these sectors are more appealing to cybercriminals because they collect financial and medical data, but all businesses that use networks can be targeted for customer data, corporate espionage, or customer attacks.
  • 7. Artificial Intelligence for Cyber security • The next generation of cyber security products are increasingly incorporating Artificial Intelligence (AI) and Machine Learning (ML) technologies. By training AI software on large datasets of cyber security, network, and even physical information, cyber security solutions providers aim to detect and block abnormal behavior. • There are different approaches to using AI for cyber security, and it is important first to determine which is appropriate for the organization. Some software applications analyze raw network data to spot an irregularity, while others focus on user/asset/entity behavior to detect patterns that deviate from normal.The types of data streams, how they are collected, and the level of effort needed by analysts all vary by approach.
  • 8. Artificial Intelligence for Cyber security • Cyber security solutions utilizing AI and ML can greatly reduce the amount of time needed for threat detection and incident response, often being able to alert IT staff of anomalous behavior in real time.These technologies also help reduce and prioritize traditional security alerts, increasing the efficacy of existing investments and human analysts. • Attackers are also using AI and ML to better understand their targets and launch attacks. AI increases the ability of defenders to identify attacks, but it may also help hackers learn about a target’s vulnerabilities.
  • 9. Which types of artificial intelligence applications are being used in cyber security solutions? It is up to human imagination. For the sake of clarity, following application categories can be examined: • Spam Filter Applications (spam assassin) • Network Intrusion Detection and Prevention • Fraud detection • Credit scoring and next-best offers • Botnet Detection • Secure User Authentication • Cyber security Ratings • Hacking Incident Forecasting
  • 10. How can an artificial intelligence application that does malware analysis be used? It’s possible to detect a software whether is a Malware or a normal software with artificial intelligence. In order to develop an artificial intelligence application that does malware detection the first thing to do is to determine some distinctive features. In addition of some harmless software and some malware to those features, the system is trained. Here are some features to use in analyzation of a software: • Accessed APIs. • Accessed fields on the disk. • Accessed environmental products (camera, keyboard etc.)
  • 11. How can an artificial intelligence application that does malware analysis be used? • Consumed processor power. • Consumed bandwidth. • Amount of data transmitted over the internet. By using the distinguished features, the system is built. Once you give a test software to the system, it tries to detect whether the software is a malware or not by analyzing these distinguished features.
  • 12. Is artificial intelligence(AI) used to detect cyber attacks, how is its success rate? Of courseAI can be used to detect cyber attacks.There are plenty of academic researches about detecting cyber attacks using artificial intelligence. The success rate of those researches varies between 85% and 99%. In the last few years, in addition to academic researches, some products have been improved to detect cyber attacks with the help of artificial intelligence like DarkTrace. DarkTrace claims to have more than 99% of success rate and it also has a very low rate of false positives.
  • 13. Are there any companies that develop cyber security applications using artificial intelligence? There are lots of companies that develop cyber security applications by using artificial intelligence. The companies that started early focusing on this domain started worthing more in a very short time. Here are the example. Dark trace, the company that was founded in 2013, developed a product that does anomaly detection on a network with machine learning.The company is now worth 825 million$. CYLANCE, the company that was founded in 2012, developed a product to prevent advanced level of cyber threats.The company is worth 1 billion $ now.
  • 14. Examples of the machine learning algorithms which are being used to develop cyber security applications Spam assassin, for instance, is a project that is an open source code and it does spam mail filtering. Spam assassin makes a feature list in order to control if an email is a spam mail or not. Extracted features from an analyzed email is processed with Naive Bayes algorithm.The most common algorithms in cyber attack systems are, Random Forest, DecisionTree, SupportVector Machines etc. In the last few years, the most commonly used machine learning algorithm is without a doubt, Deep Learning algorithm. Deep learning is a machine learning algorithm that uses artificial neural networks. Nowadays, most of the companies that do artificial intelligence researchers use this method.
  • 15. Is it possible to detect cyber attacks before they happen? In order for a cyber attack to be successful, there are some steps to follow successfully.These steps are called “Cyber Kill Chain”. Attackers might leave some traces in some of these steps or they can access information about the targeted company that was leaked before, while they’re in information acquisition phase. We can see similar situations like this one. Preventing these kind of situations is only possible if you observe your company constantly with the eyes of an attacker. In addition to that, knowing what the attackers can find when they do their research about your company beforehand, and as a result, taking precautions prevents these situations.
  • 16. Norm shield Cyber Risk Scorecard, scans most of the information about your company, that can be accessed via internet. Some of the information that can be accessed about your company are: • Posts that target your company in dark forums or social media. • Leaked information about your company’s customers and employees. (e-mail, passwords, credit card information etc.) • Phish website, mobile and desktop applications about your company. If you know your virtual existence well and can manage it, you can reduce the risk of being affected from a cyber attack. Cyber Risk Scorecard, gives you the possibility to access information about your company from various sources and lets you manage that data which results to taking precautions.
  • 17. Advantages of Artificial Intelligence • Organizations face millions of threats each day making is impossible for security researcher to analyze and categorize them.This task can be done by using Machine Learning in an efficient way. • By finding a way to work towards unsupervised and supervised machine learning will enable us to fully utilize our current knowledge of threats and vectors. Once those are combined with the ability to detect new attacks and discover new vulnerabilities, our systems will be able to protect us from threats is a much better and efficient way. • Another benefit of using AI based machines is that, in theory, these systems would work in a more calculated approach and in a more accurate way resulting in eliminating human error. Additionally, these systems could work simultaneously on various tasks, monitoring and protecting a vast number of devices and systems.They can therefore mitigate large scale attacks
  • 18. Disadvantages of Artificial Intelligence • The biggest disadvantage of any AI based system is that we cannot predict what it’ll do. If fallen into the wrong hands, the result could be fatal and a whole different level can could do more damage than good. • A super-intelligent AI will be really good at completing goals, but, if those goals aren’t aligned with ours, we’ll have a problem. AI in security systems had foregone the utilization of valuable analyst skills and therefore didn’t benefit from human feedback. • Even though the initial concerns about the development on AI in cyber security may revolve around concerns about eliminating the much needed human expertise, intuition and judgment, the real disadvantage of artificial intelligence is its unpredictability.