Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:55 AM
Rutrell Yasin
Rutrell Yasin
Connect Directly

5 Things Security Pros Need To Know About Machine Learning

Experts share best practices for data integrity, pattern recognition and computing power to help enterprises get the most out of machine learning-based technology for cybersecurity.
2 of 6

#1 Garbage In, Garbage Out

There is an old saying in machine learning called garbage in, garbage out, says Cylances Matt Wolff. Situations where machine learning would not be effective are places where not enough data is generated to provide insight into what is going on in the IT network, he says.

As long as data is present and useful, then machine learning can also be useful. If the data isnt informative, then machine learning isnt going to work, Wolff says.

I am bullish on the machine learning opportunity, but nothing as far as I know has been vetted out to demonstrate that this technology is going to definitively be better than any other techniques we are using to try to detect attacks, says Pete Lindstrom, research vice president for security strategies with IDC.

Inputs and Outputs
Presumably, organizations want to use machine learning to quickly react to attacks. Yet, a whole plethora of diverse types of information feed into the security ecosystem - for example, network packet activity, system calls on endpoints, and user behavior data at a meta level on the network. So, first people need to figure out what information is feeding the system, Lindstrom says.

You still must understand the inputs and outputs. What is the nature and type of data feeding the system? What process and techniques do they use to identify the algorithms? What is the action they might take?

The challenge is that he nature of these techniques is so dynamic, cybersecurity analysts cant take for granted that their output is going to be the same as someone elses output, explains Lindstrom: You cant rely on efficacies without doing your own testing on the solution. If it is looking for anomalous activity on the network, the only way to determine what is anomalous is to learn your network. It cant take someone elses network and apply it. Otherwise we are almost back to signature-based defense.

Added complexity
If security professionals are not careful they can wind up increasing complexity with less understanding of the processes and the output is going to be the same as security tools are delivering today. It is not horrible, by the way, because the solutions we have today block a lot of attacks, Lindstrom says.

Image Source: Rawpixel.com via Shutterstock

2 of 6
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
User Rank: Author
12/15/2016 | 3:02:27 PM
Insightful, thank you for sharing.
User Rank: Apprentice
12/14/2016 | 10:11:16 AM
Machine Learning - Useful points
First of all, a big thanks for the article. The informations (5 security pros) mentioned in this article very useful. As AI and ML is going to rule future world, we need to consider these security pros.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: It's a technique known as breaking out of the sandbox kids.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-13
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
PUBLISHED: 2020-08-13
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).
PUBLISHED: 2020-08-13
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.
PUBLISHED: 2020-08-13
In C2 flame devices, there is a possible bypass of seccomp due to a missing configuration file. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-14605...
PUBLISHED: 2020-08-13
In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.