Use of Artificial Intelligence For Improve Cybersecurity Automation Processes For Tasks - Version 1
Use of Artificial Intelligence For Improve Cybersecurity Automation Processes For Tasks - Version 1
By César Barreto
Currently, a lot is heard about Artificial Intelligence and, especially, about one of
its most prominent branches, such as “Machine Learning”. However, Artificial
Intelligence is not new; It has been with us since the end of the 50s, when a
group of scientists met in Darthmoud and coined the term, in 1956. Today, its
influence has reached multiple sectors and areas, among others: the
automotive sector, energy, industry, the banking sector, health, cyber defense
and cyber security.
Another sector that has benefited from the development and massification of
the Internet has undoubtedly been electronic commerce. Currently, companies
have been immersed in the need to create new media and communication
strategies with their clients, which allow them to obtain the necessary sales
volume to improve profits; For reasons like this, e-commerce is an invaluable
tool for the sales department of companies. But, on the other hand, just as the
benefits and advantages of using the Internet have increased, in multiple tools,
platforms, consultation sites, financial and banking portals, etc., it is also true
that the risks, threats and possibilities have increased. of intrusions, by
unscrupulous and ill-intentioned people.
On the other hand, attacks and intrusions into computer systems, Web sites
and applications continue to increase more frequently, making it essential to
use autonomous mechanisms to prevent damage or loss of information. The
security of business data, personal data and mission-critical applications are
aspects that organizations must avoid at all costs that are compromised. This is
where the constant evolution and improvement in machine learning techniques
come into the picture, since they take historical or current data into
consideration, with the aim of making predictions or projections of a certain
range of data, or in certain periods of time, to be able to establish similarities, in
relation to patterns or characteristics of behavior. It must be taken into account
that, thanks to machine learning, a computer system has the ability to locate
strange behaviors and anomalous situations in large amounts of data, which are
known as patterns. Machine Learning is used to detect unusual situations that
want to infiltrate a system network. For this, we can find 2 possible solutions:
Heuristic IDS and rule-based IDS.
Heuristic IDS
The IDS is the intrusion detection system, which is responsible for monitoring
the incoming and featured traffic of a website and recording its behavior, allows
supervision that detects suspicious activities and generates alerts upon
detection. Based on these alerts, a security operations center (SOC) analyst or
incident responder can investigate the problem and take appropriate action to
correct the threat. IDS are designed to be deployed in different environments.
And like many cybersecurity solutions, an IDS can be host-based or network-
based. Now, let's learn a little more about the different types of IDS.
IDS systems and Firewalls are cybersecurity solutions that can be implemented
to protect an Endpoint or a network. However, they differ significantly in their
purposes. An IDS is a passive monitoring device that detects potential cyber
threats and generates alerts, allowing analysts in an incident response SOC to
investigate and respond to the potential incident. However it does not provide
real protection for the endpoint or the network. On the other hand, a Firewall is
designed to act as a protection system that analyzes the metadata of network
packets and allows or blocks traffic based on predefined rules, which creates a
limit that certain types of traffic or protocols cannot pass.
Rule-based IDS
It is the solution that starts from a match with patterns, so that the system is
capable of detecting them automatically and launching a warning. Some
examples are Snort, Suricata, Ossec, Samhain, Bro, or Kismet. All these
systems are based on rules that need to be pre-configured in them, so that they
can work automatically and without supervision. It is also important to bear in
mind that they will be as effective as their databases on known threats are
updated.
Conclusion
While both systems monitor and analyze the network and devices for
anomalous cyberthreats, the main difference between an IDS and an IPS is that
the latter can block attacks, since it has a preventive and proactive role.
Regarding the firewall, what it does is block all traffic, filtering only that traffic or
data packets allowed in its configuration. An IDS does the opposite, that is, it
lets all traffic through, scanning it for malicious data or activity. Therefore, the
IDS and the firewall must work together, with the second filtering allowed traffic
and the first analyzing it for threats or anomalies.