Deception technologies, AI and Robo Hunters to displace legacy cybersecurity solutions

IoT is rapidly expanding the attack surface of the digital enterprise and exposing it to enhanced risk levels not seen before. Deception technologies, artificial intelligence, Robo-hunters, are solutions for tomorrow's enterprise, Mechelle Buys Du Plessis, MD – UAE, Dimension Data.
The inherent deficiency of large-scale object-based networks in the future, is going to drive the creation of deception technologies, says Mechelle Buys Du Plessis.
The inherent deficiency of large-scale object-based networks in the future, is going to drive the creation of deception technologies, says Mechelle Buys Du Plessis.

Share

The convergence between operational and digital technologies is well underway, being driven by the use cases around Internet of Things. Digitally enabling both new and old machines, devices, sensors, and other objects with connectivity, provides benefits not realised before. Real-life and real-time data is much more accessible on the edge of the network and can be rapidly processed to give business insights and business benefit. This results in increased productivity, reduced operational costs, higher levels of safety, and overall better decision making, amongst others.

While the gains are widespread and adoption is increasing in an exponential fashion, there is a downside to this rapidly snowballing trend. The fact is many sensor manufacturers are just not doing enough to secure their products by not including encryption in the product development stage. Since sensors are light weight objects with a low footprint, adding on additional security at a later stage may not be feasible.

This inherent deficiency of large-scale object-based networks in the future, is going to drive the creation of deception technologies, to confuse intrusive malware through the presence of real and fake user identities.

Transformative scale-out converged networks, including supervisory control and data acquisition control system architectures or SCADA, operational technologies, and wider IoT infrastructure, will see huge security gains through the presence of deception technologies.

Deception technologies create thousands of fake, user credential in conjunction with real user-identities. Once a threat actor is inside an organisations' network, they are unable to distinguish between real and fake user identity credentials. Since there are many more fake user identity credentials distributed, the probability of engaging with a fake user identity credential and triggering an intrusion alert is much higher. Afterwards an incident response alert and action are then initiated. The large number of fake credentials generated through deception technologies also facilitate pattern tracking. This allows internal teams to recreate the pattern of attack and point of entry.

To further strengthen their cyber security defences, digitally transformative organisations will begin to tap the power of artificial intelligence and machine learning, to secure their networks. While these buzzwords are already in place, they have been defined by programmer-built algorithms, limiting the amount of self-learning. Machine learning applied to cybersecurity has traditionally been driven by algorithms that give instructions on the types of malware and their associated behaviour inside internal networks.

Now machine learning will be replaced by deep learning applied to cyber security.

With deep learning techniques, cyber security applications are aided by self-learning technologies. User behaviour is monitored over a period of time using deep learning technologies, and a user behaviour profile is established. This profile is a dynamic one and deep learning technologies continue to add usage patterns, till the profile becomes intrinsic to a particular user. Deep learning applications develop highly granular patterns and analysis of end user activities.

The presence of a threat actor inside a network using an assumed credential, will have a deviant user pattern. This divergent pattern of accessing the network, monitored by behavioural analytics, will trigger a security remediation alert without delay. Examples of such proactive and rapid approach to securing convergent and transformative networks, will take behavioural analytics applied to cyber security to a new level. With these intuitive gains around the corner, cyber security vendors will continue to integrate deep learning technologies into their products in the year ahead.

Artificial intelligence technologies will also create a new generation of proactive and defensive cyber security products called Robo-hunters.

Enabled by artificial intelligence, Robo-hunters are automated threat-seekers that scan an organisation's environment for potential threats. Since they are built on predictive behavioural analytics, they have available a baseline of normal network activity behaviour.

Robo-hunters scan an organisation's environment for any changes that might indicate a potential threat. As they scan the environment, they learn from what they discover, and take remediation action as required. Hence, they are built to make decisions on behalf of humans. Robo-hunters also help deliver a long-standing expectation of the cyber security department, which is to access threat intelligence and to track the enemy within.

The cyber security stage is set. The threat landscape is too fast moving, too complex, and with enormously high stakes, to rely on present day technologies alone. Artificial intelligence coupled with predictive analytics and high degree of compute, as well as a trusted security partner, will provide a welcome relief in the not so distant future.

About the author

Mechelle Buys Du Plessis is managing director – UAE at Dimension Data. 

Editor's Choice

Deception technologies, AI and Robo Hunters to  displace legacy cybersecurity solutions
IoT is rapidly expanding the attack surface of the digital enterprise and exposing it to enhanced risk levels not seen before. Deception technologies, artificial intelligence, Robo-hunters, are solutions for tomorrow's enterprise, Mechelle Buys Du Plessis, MD – UAE, Dimension Data.
The robots are coming: Impact of AI on executive search
As the technology industry’s elite struggle to agree on the potential impact of AI and a raft of people queuing up to advise on the potential disruption it will cause, this article by John Curtis-Oliver, Partner at Boyden studies the potential impact on the executive hiring and the executive search industry.
#MWC2018: Spotlight shines on 5G, IoT and AR
Hard to predict what will ‘turn around the fate’ of telecom operators, but there is potential for those who can play the role of enabling platform for new digital services and players, as well as for new features and capabilities across traditional industries, says Luis Cirne, partner, communications, media and technology (CMT) practice at Oliver Wyman

Most popular

Don't Miss a Story

You may also like

Can AI give wings to the MVNO business model?
In the MVNO business, an ordinary performance is not enough to succeed. It requires speed, lean operation and efficient monetisation capabilities.
Internet of Broken Things? 10 key facts about IoT
It’s crazy to think that devices with the potential to enable so much damage to homes, businesses and even entire cities often lack basic security design, implementation and testing.
The Why, the What and the How of a digital transformation
For business-driven organisations, expected revenue-generation/benefits supported by a bold vision of the digital services/roadmap, help a lot in re-adapting mentalities of the decision-makers in place, stabilising the focus, and optimising the magnitude of the innovation.
Availability: Why it must be a vital tool for cloud service providers in the Middle East
As it becomes more important to differentiate in the cloud provision market, one of the primary areas a CSP can sell itself is in making assurances about service availability, data protection and backup. In other words, removing the risk of things that let customers down and make the news in the process (as much as possible).