Modern field guide to security and privacy

Machines v. hackers: Cybersecurity's artificial intelligence future

The US is short hundreds of thousands of information security professionals. But that gap is driving investments in artificial intelligence that may make armies of cybersecurity workers unnecessary.

|
Dado Ruvic/Reuters

It's a common refrain after any recent high-profile breach into federal computers and corporate networks: There aren't enough skilled cybersecurity professionals to outwit criminal hackers.

That message from officials, executives, and industry experts isn't just grousing, either. According to industry estimates, the US needs about 200,000 more workers to fill current cybersecurity roles. Globally, the gap is five times higher – an estimated 1 million workers.

The issue has become such a priority that President Obama made increasing the number of cybersecurity workers a key component of his multibillion-dollar Cybersecurity National Action Plan, which was introduced earlier this year. The White House said earlier this month it plans on boosting the federal cybersecurity workforce by 3,500 new hires by year's end.

But as businesses compete for scarce cybersecurity talent and policymakers weigh remedies for the digital security worker shortage, the ground underneath the profession is shifting.

Now, computers equipped with sophisticated learning algorithms are performing jobs that until recently required highly trained humans. Over time, experts say, the complexity of cybersecurity jobs performed by machines will increase, further reducing the demand for workers and changing the entire nature of cybersecurity work.

"If we fast forward … I think we will see a diminished role for humans," says Amir Husain, an authority on artificial intelligence and chief executive officer of SparkCognition, a startup focused artificial intelligence. 

In fact, Mr. Husain and others note, the use of artificial intelligence to do information security work is already happening. For example, antivirus companies have long relied on algorithms – not humans – to determine whether a given file is malicious or not, based on patterns identified in previous malicious files. 

"Except in very rare cases, where you have an unknown threat, humans are not doing file analysis," he says.

Much of the investment that's going into the cybersecurity space to fuel the development of automation is directed at responding to cybersecurity incidents. Currently, humans are the ones who figure out how to respond to cyberattacks on networks, working to quickly block suspicious communications and analyze malicious behavior and software. But computers could perform the same functions -- and do it much more quickly than people behind the keyboard.

But computers could perform the same functions -- and do it much more quickly than people behind the keyboard. 

In fact, the allure of machines quickly fixing vulnerabilities has led the Defense Advanced Research Projects Agency (DARPA), the Defense Department's technology lab, to organize the first-ever hacking competition that pits automated supercomputers against each other at next month's Black Hat cybersecurity conference in Las Vegas.

With the contest, DARPA is aiming to find new ways to quickly identify and eliminate software flaws that can be exploited by hackers, says DARPA program manager Mike Walker.

“We want to build autonomous systems that can arrive at their own insights, do their own analysis, make their own risk equity decisions of when to patch and how to manage that process,” said Walker. 

Technology firms large and small are already moving toward that goal. In May, IBM announced plans to train a new, cloud-based version of its Watson cognitive technology to detect cyberattacks and computer crimes. As part of its training, IBM fed Watson a dictionary of information security-specific terms such as "exploit" and "dropper" and programmed it how to identify and respond to cybersecurity incidents.

Of course, cybersecurity isn’t the only work that will be affected by artificial intelligence and automation. A recent analysis by the consulting firm McKinsey concluded that automation will "affect portions of almost all jobs to a greater or lesser degree, depending on the type of work they entail."

That study analyzed more 2,000 work activities across 800 different occupations and concluded that automation of work is already going beyond routine manufacturing activities and has the potential to transform sectors that "involve a substantial share of knowledge work."

Though the McKinsey study did not look at the field of information security specifically, aspects of it work would seem to make it an industry ripe for automation.

Much information security work boils down to picking needles of useful or important information out of a haystack of unimportant data – from network traffic to log messages generated by different products.

"It’s hunting," said John Pescatore, director of emerging security trends at the SANS Institute, a leading training organization for the information security sector. "You’re looking around your infrastructure and studying [network traffic] for machines that are talking to some [Internet] address or region that your network hasn’t talked to before."

Today, that work is inefficient and time consuming. IBM has reported that the average organization is presented with more than 200,000 “pieces of security event data” each day. Responding to “false positives” in that data is a huge and costly problem for organizations of all types.

The best security analysts are able to cancel out some of that noise and isolate unusual patterns that are suggestive. And, as Passcode recently reported, startups like PatternEx are already working on ways to use artificial intelligence to stem the flow of alerts to human operators, giving them the ability to do deeper analysis of a smaller number of suspicious incidents.

But data collection and data processing are two tasks that McKinsey’s study identified as the most susceptible to being automated. And refinements in artificial intelligence sometimes referred to as "deep learning" increasingly give machines the ability to mimic human intuition – a "sixth sense" that sees patterns others miss, said Husain of SparkCognition.

"Insofar as machines can sense and monitor the world in ways that go beyond our biological abilities, they will have greater insight – higher quality insight with more depth," he said.

But even though automation may play a more crucial role in improving digital defenses, humans will remain part of the picture – at least for the foreseeable future.

"There’s a huge need right now in the workforce and I don’t see that diminishing,” says Richard Forno, assistant director at the University of Maryland’s Center for Cybersecurity. "We have 10,000 or 12,000 open [positions] for security folks – and that’s just one state."

Jack Detsch contributed reporting.

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Machines v. hackers: Cybersecurity's artificial intelligence future
Read this article in
https://www.csmonitor.com/World/Passcode/Security-culture/2016/0725/Machines-v.-hackers-Cybersecurity-s-artificial-intelligence-future
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe