Professional Documents
Culture Documents
Techniques, Solutions and Models Machine Learning Applied To Cybersecurity - Version 1
Techniques, Solutions and Models Machine Learning Applied To Cybersecurity - Version 1
Techniques, Solutions and Models Machine Learning Applied To Cybersecurity - Version 1
cybersecurity
By César Barreto
Business sectors of all kinds continue to raise alerts about false security
perceptions; of the rise in cybercrime; that not enough prevention policies or
guidelines are being generated; and the ability to react to cyberattacks.
However, the manufacturers that promote the introduction of Artificial
Intelligence in cybersecurity talk about the appearance of a new paradigm,
which could effectively reduce vulnerabilities in the EndPoint; In other words,
the exposure area is reduced.
Today, many companies are using tools to analyze the security of their
products; Within this large cluster of tools, among the most prominent are those
known as Generative Adversarial Networks (GANS), which allow detecting
failures in a Machine Learning model. Additionally, they can be used to train
certain models and make them more robust. GANS refer to Artificial Intelligence
algorithms designed to carry out unsupervised machine learning, and are made
up of a system of competing neural networks. We present 3 Frameworks, to
train Machine Learning models:
• The Gan Zoo: It is a reference page where you can find a large number of
gans with which it is possible to train and evaluate Machine Learning models.
The GAN Zoo has a large community of developers behind it, who add new
pappers to its GitHub repository every week (The Gan Zoo, 2018). In short,
Machine Learning has become a highly valuable tool for researchers and
developers in the field of cybersecurity, since it implies the possibility of carrying
out or executing numerous tests that, in terms of security and penetration, allow
a considerable saving of time and effort (Flores Sinani, 2020).
• Deep Instinct: company with the specific idea of creating a Deep Learning
platform for the prevention of attacks on end user devices. Its main purpose is
to reduce the reaction time to below 20 ms, in the event of a cyberthreat in the
final device, among other things, highlighting the potential scope of Deep
Learning technology. Deep Instinct has put its 5 year effort into training its
neural network and producing a deployable agent on devices of all kinds.
Machine Learning applications to improve cybersecurity in business
environments
Conclusion
The role that artificial intelligence has been acquiring, and especially Machine
and Deep Learning, in the field of personal and business cybersecurity is
undeniable. It is, therefore, a technological landscape in constant evolution,
which goes hand in hand with the increase in cybercrimes and cyberattacks;
whose innovations lead us to cybersecurity challenges, increasingly complex
and intricate. That is why, currently, companies have already begun to explore
how Machine Learning, applied to cybersecurity, can help mitigate these risks. It
has been seen, lately, that the adoption rates of Artificial Intelligence in
cybersecurity are constantly increasing. At the same time, it is clear that
organizations must identify where to implement it, in order to contribute greater
value and, subsequently, establish goals that are more in line with their
performance or expectations. Although, as we have seen, there are many
techniques, solutions and models that make use of Machine and Deep Learning
for data analysis, there is still a long way to go, considering that cybercriminals
are constantly changing.