Search Results

This article was written by Mike Fumai from CSO Magazine and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to

While artificial intelligence sounds like it will be the superhero of our future, it’s still dependent on humans to determine the good from the bad. In essence, another detection-based solution that will always be challenged by the obfuscation techniques of rogue nation states and well-funded criminal organizations.

Artificial intelligence (AI) and its sidekick, machine learning (ML), are depicted as comic book superhero characters in cybersecurity. Unfortunately, not everyone realizes that the ripped muscles beneath the spandex are special effects. Machine learning, the sidekick, is having far more impact on cybersecurity today than AI. AI and ML are not synonyms; Batman is not Robin.

It’s not that ML and AI aren’t doing meaningful things today. They are, however, the hype from the vendors with the super-sized marketing budgets and their co-dependents in the trade rags (hype raises ratings) are making it difficult for non-experts with real-world problems to decide what to spend and what to expect.

Machine learning depends on “likeness” between the environment that created the model and that of the real world where it tries to tell good from bad or normal from abnormal. The greater the “unlikeness” between the environments of where the ML model was developed and where it’s deployed, the greater the prediction errors and false positives. Even if the model were trained and deployed in the same place, the second “likeness” challenge means that privacy and other concerns might exclude informative data, resulting in "unlikeness." And time accounts for the third “likeness” challenge, which collides with an inescapable truth that with time comes change. This not only means that our ML models may not be ready for what may come but also that as time goes by, the cumulative differences between past and present degrades ML over time.

Cybersecurity vendors undoubtedly considered “likeness” challenges when they first started applying ML. They started with a relatively simple problem with little dependence on deployment environment: telling good from bad (malware) files.

So, how well has machine learning detected malware?

In Gartner’s report, “The Evolving Effectiveness of Endpoint Protection Solutions,” it states that they “ not show an effectiveness consistently above EPP vendors nor the ability to maintain that in the long term.” ML fares little better than Windows Defender (free).In another Gartner report, “Comparing Endpoint Technologies for Malware Protection,” they observed that other types of security controls are supplementing ML to protect endpoints, which “…can have a high FPR [false positive rate]. Models have to be tight enough to detect most malware, but loose enough to avoid false positives and operational inefficiencies.” As for effectiveness, “... works well for executables... but less so for weaponized PDFs and other office files.” They also go on to say that ML tech is just as susceptible to obfuscation tactics (encrypted files & transmissions) as traditional tech. So, ML features no x-ray vision or telepathy.

Another similarity with traditional AV, researchers showed several ML enhanced tools were susceptible to sample mutations whereby simple tools alter the characteristics of known malware to evade detection. Yet worse, they observed that several ML tools were not learning from test activities from the previous month. While we may be amused that ML tools did not learn, we should not be shocked. The vendors must in some way “supervise” what their ML models learn. If not, then the “unlikeness” of field data might devastate the model. We can expect improvement. For now, don’t expect machine learning in the field to exponentially accelerate detection of new or mutated malware.

With ML alone not magically improving malware detection and the products requiring additional security controls to attain greater endpoint protection and rapid reaction to incidents, vendors are under pressure to more aggressively challenge the “likeness” dilemma. To squeeze out more detection, they are increasingly factoring in more “unlikeness” for each deployment. Anecdotes talk of deployments requiring rarified expertise to fine-tune and maintain, myriads of environment anomalies (heterogeneous endpoint and application configurations) that must be smoothed out, and some deployment phases lasting 18 months. And, the “likeness” dilemma dictates that subsequent changes to the environment require re-tuning the ML model. Your average Windows administrator cannot do such a thing.

So what is an enterprise with cyber problems to do regarding machine learning-enhanced cyber tools?

First, continue to build on your understanding of the ML “likeness” challenges. Second, seek out first-hand accounts of those that actually deployed them. Third, test the assertions of the vendors in your own environment. If doing so alone is too daunting, team up with one or more organizations where one or more VLANs of test endpoints represent yours and the others represent theirs. Yes, this might invoke the “likeness” dilemma.

Lastly, keep an eye on the adversary. Data gurus say ML has blind spots and one researcher showed how he identified and exploited them to evade detection. Analysts say that once adoption of ML enhanced cyber tools reaches 10 percent, adversaries will undoubtedly routinely outsmart the ML models in the wild. Stay tuned!

Cyber security is a key concern for organisations of all sizes. Protecting devices, networks, data and apps is an essential component of doing business. Vodafone provides security products and services to businesses of all sizes, helping you secure your business anywhere because we are everywhere. We are trusted by organisations globally, including utilities, financial institutions and government agencies. For more cyber security insights, you can find us on Twitter and LinkedIn.

main_icn_24_7_support24-delivery 360-view4gmain_icn_Accessoriesmain_icn_Appsapple market_icn_Batterybroadband-devicecalendarmarket_icn_Minutesmain_icn_Cameramain_icn_Chatmain_icn_Chevron_downmain_icn_Chevron_leftmain_icn_Chevron_rightmain_icn_Chevron_upmain_icn_Tick_simpleClose_thick_0.1main_icn_Closecommunity-thin main_icn_Community_or_Foundationdashboard-hidashboard-thin main_icn_Dashboardmarket_icn_Data_Sharingmarket_icn_Dealsmain_icn_Deletemain_icn_Deliverymain_icn_Dislikemain_icn_Downloadmain_icn_Editerror-circlefacebook-thin main_icn_Social_Facebookmain_icn_Filtermain_icn_Filtergogoogle-plus-thin social-google-plushelp-hi_1helpmain_icn_Likemarket_icn_LinkedInlocation-hilocation-regular location-thin main_icn_Locationmail-newmarket_icn_Screen_sizemain_icn_Menumarket_icn_SMSmobile-broadbandmain_icn_Mobilemain_icn_My_Vodafonenetwork-signal-hinetwork-thin main_icn_Network_signalmain_icn_Pausemain_icn_PAYGsocial-paypalmain_icn_Photospin_alertpin_manpin_warningplay-circle main_icn_Play_circlemain_icn_Play_arrowmain_icn_Add_or_Plus0_rating5_ratingrating-filled ratingmain_icn_Ratingsrefresh main_icn_Bill_or_Reportmain_icn_Reportsmain_icn_Roamingmain_icn_Searchmain_icn_Securityshareshoppingmarket_icn_SIM_Swapmain_icn_Social_Twitterspeech-bubble main_icn_Studenttail [Converted]technology test_app main_icn_Texttick-bordered tick-simple main_icn_Tick_simplemain_icn_Top_upmain_icn_TVtwitter-thin main_icn_Social_Twitterusersmain_icn_Viewedmarket_icn_Vodafone_storeWarning_0.1warningweightwindow market_icn_Multinationalyoutube-thin social-youtube