sb-as logo
Story image

AI in cybersecurity stamping out menacing fileless attacks

30 Jan 2019

Article by Ziften vice president of Products Logan Gilbert

With the storm of recent information and commentary regarding artificial intelligence (AI), specifically as it applies to cybersecurity, it can be difficult to understand how AI – or more specifically, machine learning (ML) and algorithms – are actually augmenting endpoint protection (devices ranging from servers to phones and IoT devices) for individuals and organisations.

Fundamentally, the difference between traditional and AI-based cybersecurity systems is a matter of “teaching” versus “learning”.

Older antivirus software has been programmed to recognise specific security threats – phishing emails or ransomware, for instance – based on heuristics and specific digital signatures.

Software has been instructed on exactly what to look for as it scans through files. Of course, this means it’s powerless against new threats that it doesn’t recognise, which is why the system’s maintainers are constantly adding new instructions to reflect the latest cyber threats.

You know those notifications you constantly get reminding you to update your antivirus software? That means programmers have updated the system to protect a newly discovered vulnerability (which is why it’s important to keep your antivirus up to date).

Simple enough. At least it was for most of the internet’s history. The problem with the traditional approach is that in recent years cyber threats have become too numerous and too sophisticated for legacy antivirus to keep up.

For example, in 2017 experts discovered over 7.4 million new malware specimens, leading some to call it the “Nightmare Year” for cybersecurity. To put that figure in perspective, it represents a 5,600 percent increase over the past decade.

Thankfully, recent advancements in machine learning – the building of algorithms that use statistical techniques to improve their own code – are enabling a more effective approach for endpoint security.

Rather than trying to “teach” software all of the individual threats to look for, engineers can instead feed machine learning algorithms millions and millions of examples of cyber threats, allowing the systems to “learn” for themselves how to distinguish friend from foe.

Thus, when hackers produce new variants of viruses and malware to avoid the signature-detection of traditional antivirus, machine-learning based endpoint security, understanding the patterns and anomalies that characterise malware, is rarely fooled.

One recent study found that an AI-powered system identified zero-day threats correctly 98.88 percent of the time, compared to the 71.16 percent success rate of traditional AVs.

So, does this mean machine learning is the silver bullet of endpoint protection? Not quite. The technology has limitations, most notably that it takes enormous amounts of data and computing power to make it work properly.

But machine learning is so effective that even hackers are using the technology, training their programs to evade even the most sophisticated defenses. Increasingly, cybersecurity is becoming a matter of AI versus AI.

As HBR recently put it, “AI is the future of cybersecurity, for better or for worse.”

One area in which AI security models are proving to be particularly effective is in defending endpoints against so-called “fileless” attacks.

These attacks were first identified as early as 2001, but they’ve only come to the forefront of cybersecurity recently. In fact, last year according to “The 2017 State of Endpoint Security Risk” report by the Ponemon Institute, fileless attacks where included in an estimated 77 percent of successful data breaches worldwide. In that same report, Ponemon reports that 35 percent of all cyber-attacks are fileless exploits.

So, what are fileless attacks and what makes them so successful at infiltrating endpoints? Most often, traditional malware infiltrates digital endpoints by stowing away in long term storage, trying to trick users into executing malicious files so that it can take control.

Fileless malware, on the other hand, circumvents the stowaway step by infiltrating an endpoint’s memory directly. It does this by manipulating a system’s registry – the database where the system’s low-level settings are kept – acting as a kind of deviant administrator to steal information or disable key features.

Often, this means that no action is required by the user for the “non-malware” to take hold. Even more important, this property makes it extremely difficult for traditional antivirus software to detect.

Signature-based scans typically don’t interact with an endpoint’s registry at all. And even if the AV does come into contact with the malicious code, its built-in heuristics will only rarely identify the fileless threat.

The beauty of machine learning-powered systems is that they don’t rely on signatures, heuristics, or traditional scans at all.

Instead, they apply sophisticated algorithms to vast amounts of information, continuously updating themselves to recognize threats, new or old, based on patterns in the data.

This makes them extremely effective at identifying and protecting against fileless attacks. In the era of fileless attacks, AI is by far the best approach for cybersecurity.

Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.More
Story image
Entrust acquires HyTrust, with aim to improve data encryption solutions
Entrust says the acquisition will bolster its effort to deliver data protection and compliance solutions to its customers, while accelerating their digital transformations.More
Story image
SMEs treading water against 'endless volley' of cyber-attacks — report
According to a new report from Cynet, these SMEs are resorting to outsourcing some aspects of their threat mitigation in order to safeguard IT assets, as a result of the heightened risk of serious breaches.More
Story image
Swann home security kit recognised for innovation
The new 4K NVR Enforcer Kit was named a 2021 CES Innovation Award Honouree.More
Story image
Trend Micro adds cloud-native container security to Cloud One Services Platform
Designed to ease the security of container builds, deployments and runtime workflows, the new service helps developers accelerate innovation and minimise application downtime across Kubernetes environments.More