Non-traditional machine learning models can capture hackers before they cause consequences
In 2013, a group of British security experts found that digital infrastructures were secured by trying to prevent bad guys from breaking in, while preventing them from revealing information was nearly abandoned. by. Therefore, a network security company called Darktrace was born.
Darktrace teamed up with Cambridge University mathematicians to develop a Machine learning tool to detect internal disclosures. Researchers have used unsupervised learning - an unsupervised learning machine, a technology based on rare machine learning algorithms that do not need humans, to help the tool identify new ways of behavior. anomaly. This method is completely different from the traditional way, teaching algorithms based on attack history.
(Source: Internet).
Currently, most machine learning applications are supervised learning, which means they receive a huge amount of data that has been carefully arranged and trained to recognize a schedule. Samples are carefully defined.
For example, to have a machine that can identify a breed of dog, researchers must provide it with hundreds, thousands of photos of dogs and other objects. After teaching the computer about right / wrong in those photos, the machine will recognize a separate breed quite well.
(Source: Internet).
Supervised learning is quite effective in security. The machine is taught about the risks that the system has encountered before. But this method has two main problems. One is to only monitor known risks, and unknown risks will be ignored. The second is to work best only in terms of balanced data, meaning that the number of examples is equal between expressions that need not be processed or need to be processed. Meanwhile, security data often has very few examples of threatening behavior between countless normal expressions.
(Source: Internet).
In this case, unsupervised learning brings unexpected results. It can detect the risks that the system has never experienced by its ability to find non-patterned pieces that are inherent in the amount of unordered data.
Darktrace's software has an active map based on real and virtual sensors located around the customer's network. 60 unsupervised learning algorithms will follow up to find unusual behavior from that data. The mainstream algorithm will use different statistical methods to analyze and evaluate whether to listen or ignore any of those 60 results.
Operators can rely on the final model in the complex process to identify and act in a timely manner before being attacked. During that time, the attack point will also be disconnected from the device.
Although Darktrace's machine learning model can give warnings before intruders cause consequences, attackers also become more sophisticated and cunning than fooling machines. Therefore, there is still a lot of work to do to limit the network attacks.
See more:
- Entertainment on Neural Networks, Artificial Intelligence and Machine Learning
- The difference between AI, machine learning and deep learning
You should read it
- [Infographic] Things to know about a hacker
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- The way Hacker uses to remain anonymous
- World hackers in China
- It's time to change the definition of hackers
- How is Computer Vision used to detect phishing attacks?
- Stubborn Malware Removal with SuperAntiSpyware
- Detects two serious vulnerabilities on uTorrent that can help hackers execute malicious code or view download history on your computer
May be interested
- Free online learning about AI and Machine learning on Google websiteto make ai and machine learning (ml) more accessible to everyone, google will offer free online courses on its website called learn with google ai.
- Google released the TensorFlow machine learning framework specifically for graphical datagoogle has recently officially introduced neural structured learning (nsl), an open source machine learning (artificial intelligence) framework ...
- 3.5 million WSL users can now use GPU Compute from Linux right on Windowsgpu compute is often used in machine learning tasks, on wsl 2.
- What is welding machine? Classification of welding machinesyou are looking to buy a dedicated welding machine, but with a variety of models from many different welding lines are making you uneasy about choosing which machine to reasonably match. so what is the welding machine article? classifying welding machines will give you a better understanding of the basics of each type of welding machine. hopefully this will help you choose the best welding machine.
- Deep Learning - new cybersecurity tool?artificial intelligence (ai) is increasingly contributing to every area of human life. among the sub-domains of artificial intelligence in general and machine learning in particular, it can be said that deep learning is a truly outstanding technological breakthrough.
- Capture One - Download Capture One herecapture one is an image post-processing solution that you can use on both mac and windows desktop devices.
- Entertainment on Neural Networks, Artificial Intelligence and Machine Learningthe article will tell you the meaning of the terms artificial intelligence (ai), machine learning and neural networks in applications.
- DeepScribe: AI can translate ancient texts thousands of years oldscientists at the university of chicago have recently developed an artificial intelligence system, based on machine learning technology that can analyze and translate ancient texts, found on clay tablets. thousands of years old into modern languages.
- What is a capture?capture has many different meanings and is used in many fields, including in the field of technology.
- AI models use aerial and ground data to navigate areas that are difficult to observecan artificial intelligence models help navigate through areas (streets) that they have not previously trained, or have not been provided with enough training data?