Cybersecurity

The AI arms race: striking a balance between innovation and cybersecurity


Applying AI to automate vulnerability and penetration testing of online applications is not new. Tools have been available and working with varying levels of success for several years. They have proven to be more capable than the current generation of GPT in developing new malicious payloads or finding vulnerabilities in web applications and APIs.

DeepExploit, for example, which was presented at Black Hat in 2018, leverages reinforcement learning, while DeepGenerator leverages Genetic Algorithms and a Generative Adversarial Network (GAN) to generate new payloads that can breach online applications.

These tools have been effective in automated pen testing, provided they have unabridged access to the application and the application generates rich enough error messages, so the model has the information needed to progress its search. The issue for malicious actors is that these tools are very noisy. They generate a lot of random activity before they become even remotely effective and will be discovered as soon as web application and API protections detect their stochastic behavior.

While generative AI, in its present state, has limited use for threat actors besides increasing their productivity, other AI technologies might get a renewed boost from all the attention on recent advancements in the field of AI.

SIW: What cyber technologies or techniques can the cybersecurity community use to remain a step ahead of state-backed AI threats?

PG: We are in an AI arms race. You can think about it as the modern version of the nuclear arms race during the Cold War era. Military research and development have access to deep budgets in addition to the means and knowledge to advance new technology at a pace that could outstrip the cybersecurity community.

Even if governments keep to their promise of being ethical in developing new applications and technologies, there is always that rogue player who goes one step too far, forcing the other players to keep up. The importance of a global AI watchdog promoting ethical use of the technology cannot be overstated.

Despite the race to innovate, there are security basics that should be on every company’s radar. Companies can control their threat surface by continuously identifying, assessing, and mitigating vulnerabilities across their digital and physical assets, networks, and human elements.

While it might not be possible to catch every zero-day in the first layer of defense, adequate logging and behavioral detection across the infrastructure should be able to find and alert on suspicious or anomalous activity. AI can be leveraged to get a grip on the vast amounts of event logs and identify only what matters.

SIW: How does the balance between AI-driven innovation and cybersecurity defense impact the competitiveness of companies and the overall state of technology?

PG: Companies could refrain from investing in certain technologies, but that would only make them less competitive than military research organizations and state-backed research facilities. In the end, it would create an imbalance in knowledge and technology, which would not be beneficial for the cybersecurity community and only cause it to fall behind.

Security has always been a technology race. It’s a race to keep up with and secure the innovations needed to drive the business. At the same time, you need to keep up with new tactics and techniques leveraged by cybercriminals. This technological challenge that the cybersecurity community is facing today is not much different than it was in the past, though on a different level and scale. I’m confident the security community will continue to push forward with innovations in detection and mitigation as new technologies and new problems emerge. Honestly, I don’t think there is another option.

SIW: Do you believe restricting AI innovation is important in building a safer and more secure cyber ecosystem?

PG: I do not believe in achieving security by hampering technological innovations. Organizations must be able to defend themselves against threats from foreign and adversarial nations.

In cyber, there are no borders that can be protected, unless the world-wide internet evolves into a splinternet, but that is a different topic. The strength of a nation to withstand cyberattacks will in part be determined by the strength of its organizations to effectively defend against those attacks.



Source

Related Articles

Back to top button