How Artificial Intelligence Transforms Cybersecurity
How Artificial Intelligence Transforms Cybersecurity
HOW ARTIFICIAL
INTELLIGENCE
TRANSFORMS
CYBERSECURITY
by Lina Yao, Scientia Associate Professor at UNSW
As cyberattacks grow in volume and complexity, Governments and businesses are making every
artificial intelligence (AI) is helping under-resourced effort to protect themselves, but the volume of
security operations analysts stay ahead of threats. attacks can be overwhelming for security analysts
and professionals. And there will always be new
By curating threat intelligence from millions of
and unforeseen attacks and threats, such as the
research papers, blogs and news stories, AI can
notorious ransomware attacks of the past two years
provide instant insights to help cut through the noise
that paralysed countless computers and even IoT
of thousands of daily alerts, drastically reducing
devices.
response times and mis/dis information on the
internet, etc. The latest advancements in AI can A security paradigm that is purely responsive will fail
take cybersecurity to a new level, and boost relevant to provide adequate protection. It can resolve issues
research and application development. only after they have been discovered, by which time,
damage is likely to have already been done.[1] Without
According to the Australian Cyber Security Centre’s
long-term vision, only identified and confirmed threats
(ACSC) Annual Cyber Threat Report July 2019 to June
can be dealt with. New ones will not be addressed.
2020, in Australia alone there are, on average, more
than six cyberattack incidents every single day, and
most of them have moderate or substantial impacts.
MACHINE LEARNING IS HOT
Machine learning is a hot topic in artificial
ACSC says it received 59,806 cybercrime reports
intelligence, and is capable of extracting valuable
in the 12 months to June 2020, almost one every
insights from existing knowledge, such as recordings
10 minutes. It says the true figure is probably
of experiences, and identified threats or attacks.
much larger, because cybercrime in Australia is
underreported. Notably, the attacks were mostly Machine learning has proved to be very effective in
targeted at large organisations. detecting variants of existing malware, attacks and
threats, no matter how deep the malicious code or only collected externally. Furthermore, there are
attack patterns are hidden. also applications to make fine-grain predictions that
identify the risk associated with specific business
Data-driven machine learning powered by deep neural
information. This would enable a business to adjust
networks can learn the activity patterns or tendencies
resource allocation and prioritise protection so as to
of individuals in an organisation. Given sufficient time
minimise the impact of an attack.
or sufficient data it can develop an understanding of
patterns and tendencies that may be too complicated However, many solutions assume the input data
or subtle for human cognition. fed into their algorithms are clean with no noise
References
[1] B. Morel, “ Artificial intelligence and the future of cybersecurity,” in The 4th ACM workshop on Security and artificial intelligence (AISec ‘11), Chicago, Illinois, USA,
2011.
[2] Sun, Nan, Jun Zhang, Paul Rimba, Shang Gao, Leo Yu Zhang, and Yang Xiang, “Data-driven cybersecurity incident prediction: A survey.,” IEEE communications
surveys & tutorials, vol. 2, no. 21, pp. 1744-1772, 2018.
[3] B. J. Kwon, J. Mondal, J. Jang, L. Bilge, and T. Dumitras, “The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics,” in The 22nd ACM
Conference on Computer and Communications Security (CCS’15), Denver, Colorado, USA., 2015.
[4] Yang Liu, Armin Sarabi, Jing Zhang, and Parinaz Naghizadeh, Manish Karir, Michael Bailey, Mingyan Liu, “Cloudy with a Chance of Breach: Forecasting Cyber Security
Incidents,” in The 24th USENIX Security Symposium (USENIX Security ‘15), Washington, D.C., USA, 2015.
[5] Abraham, Tamas, Olivier de Vel, and Paul Montague, “Adversarial Machine Learning for Cyber-Security: NGTF Project Scoping Study,” Defence Science and Technolo-
gy Group, Australia, 2018.
[6] Xianzhi Wang, Quan Z. Sheng, Lina Yao, Xue Li, Xiu Susie Fang, Xiaofei Xu and Boualem Benatallah, “Truth Discovery via Exploiting Implications from Multi-Source
Data,” in The 25th ACM Conference on Information and Knowledge Management ( CIKM 2016), Indianapolis, USA, 2016.
[7] Dong, Manqing, Lina Yao, Xianzhi Wang, Boualem Benatallah, Chaoran Huang, and Xiaodong Ning, “Opinion fraud detection via neural autoencoder decision forest,”
Pattern Recognition Letters, no. 132 , pp. 21-29, 2020.
[8] Yuanjiang Cao, Xiaocong Chen, Lina Yao, Xianzhi Wang and Wei Emma Zhang. Adversarial Attack and Detection on Reinforcement Learning based Recommenda-
tion System. The 43rd Annual ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2020). Xi’an, China, July 25-30, 2020.
[9] Zhe Liu, Lina Yao, Lei Bai, Xianzhi Wang and Can Wang. Spectrum-Guided Adversarial Disparity Learning. The 26th ACM SIGKDD Conference on Knowledge Discov-
ery and Data Mining (KDD 2020). Research Track. (KDD 2020), San Diego, CA, USA, August 23 - 27, 2020.
[10] Zhe Liu, Lina Yao, Xianzhi Wang, Lei Bai and Jake An. Are You a Risk Taker? Adversarial Learning of Asymmetric Cross-Domain Alignment for Risk Tolerance Predic-
tion. International Joint Conference on Neural Networks (IJCNN 2020), Glasgow, UK, July 19 - 24, 2020
[11] Bin Guo, Yasan Ding, Lina Yao, Yunji Liang and Zhiwen Yu, The Future of Misinformation Detection: New Perspectives and Trends ACM Computing Surveys (CUSR) ,
2020
[12] Shuai Zhang, Lina Yao, Aixin Sun, and Yi Tay. . Deep Learning based Recommender System: A Survey and New Perspectives ACM Computing Surveys (CUSR) ,
2019