I write columns on news related to bots, specially in the categories of Artificial Intelligence, bot startup, bot funding.I am also interested in recent developments in the fields of data science, machine learning and natural language processing ...

Full Bio 
Follow on

I write columns on news related to bots, specially in the categories of Artificial Intelligence, bot startup, bot funding.I am also interested in recent developments in the fields of data science, machine learning and natural language processing

This asset class turned Rs 1 lakh into Rs 625 crore in 7 years; make a wild guess!
1183 days ago

Artificial intelligence is not our friend: Hillary Clinton is worried about the future of technology
1187 days ago

More than 1 lakh scholarship on offer by Google, Know how to apply
1188 days ago

Humans have some learning to do in an A.I. led world
1188 days ago

Human Pilot Beats Artificial Intelligence In NASA's Drone Race
1189 days ago

Google AI can create better machine-learning code than the researchers who made it

More than 1 lakh scholarship on offer by Google, Know how to apply

Rise of the sex robots: Life-like doll goes on sale for 15,000 pound

13-year-old Indian AI developer vows to train 100,000 coders

What is Deep Learning and Neural Network

How Machine Learning Stopped a Brute Force Attack

By Rajendra |Email | Sep 25, 2017 | 10890 Views

For years, security technologies and hackers have been stuck in an arm's race, with each trying to outsmart the other. As both security solutions and cyber attack strategies become increasingly sophisticated, more advanced technologies need to be used. Recently, this cyber security arms race was put to test as hackers employed a novel "slow and low" strategy to try to break into high-value Office 365 accounts of 48 companies. This technique would have likely gone undetected if not for machine learning algorithms and user behavior analytics (UBA).

Slow and low strategy

Traditionally, cyber attackers would cast a very wide net, targeting as many users as possible, with hopes of breaking into a small fraction of the user accounts. Most cloud service providers have since developed defenses that can detect this type of attack. This time around, the hackers used several key tactics to avoid existing modes of detection.

First, they staggered their login attempts over the course of 6 months. Over such a long period of time, it would be difficult to manually link the hackers' anomalous logins together, especially since it's distributed across different companies. Second, they closed in on just a few important accounts because the high-value users had the greatest chance to hold access to sensitive information, while also limiting detection. Lastly, the attacks originated from 67 different IP addresses and 12 different networks, making it difficult to detect a pattern.

How was the attack detected?

The hackers' plan was evidently well thought-out and organized, so how was the attack discovered in the first place? The answer lies in the Cloud Access Security Broker threat protection capabilities, powered by a pairing of machine learning and user behavior analytics (UBA).

In this case, these systems were observed for a certain amount of time to create a baseline for what would be considered normal behavior. Once the baseline was established, any activity that was outside of the pattern seen during the initial observation period triggered an anomaly alert. As alerts were resolved and a human provided the feedback, the algorithm adapted to the slightly altered baseline behavior. In this way, patterns of behavior that deviate, even in subtle ways, could be detected.

While a cyber attacker might be able to steal a user's login credentials, he cannot mimic the user's behavioral patterns. It turns out that the way people navigate and use applications is distinctive, a kind of digital body language.

Observing the 48 companies' employee interactions with cloud applications in isolation would likely have caused this brute-force attack to go undetected. But once that data was combined across companies, over time, a pattern of anomalous events emerged. Upon further investigation, it became clear that the failed login attempts were all linked together..

Using machine learning and UEBA, the threat protection engine ultimately discovered 100,000 failed logins spanning several months. Luckily, all of the targeted companies were notified and the attack was prevented.

Other Applications of Machine Learning

Machine learning has been widely covered over the past few years precisely because it has made life much easier in the age of big data. The following examples are just a few of many machine learning applications, as more varieties are developed every year.

Credit Card Security: Another machine learning use case where machine learning is combined with UBA is credit card security. Credit card companies use machine learning to detect fraud. This form of fraud detection works by comparing a user's behavior to his or her transactions. When a transaction, even if it is only for a few dollars, is unusual based on the user's past actions, it is flagged and reported. A similar mechanism is used by PayPal to detect whether or not a transaction between a buyer and a seller is legitimate or fraudulent.

Financial Trading: Machine learning might have more applications in the stock market than anywhere else, based on the abundance of historical information and the volume of trades involved. At the moment, financial trading machine learning is limited to portfolio management, algorithmic trading, and fraud detection, although as the technology becomes more sophisticated it could easily be applied to almost every facet of the industry.

Natural Language Processing: Another interesting application of machine learning is natural language processing (NLP). Although machine learning has been applied to NLP since the 1980s, only over the past few years has the technology become more widely implemented. This ranges from customer service agents to commercially available apps, such as Siri. With machine learning, the algorithm can learn from its mistakes and scour billions of data points to come up with the ideal response to a query or statement.
Clearly, machine learning is still in its infancy. We have seen a lot of potential with machine learning, with its applications in artificial intelligence showing the greatest promise.

Source: insidebigdata