Homepage / Technology / How artificial intelligence is taking on ransomware
“gerçek Parayla En Iyi Slot Makineleri Ve Spor Bahisler test Users535352253 Due Diligence Blog Digital Data Rooms for the Netherlands Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review

Technology

How artificial intelligence is taking on ransomware

Twice in the space of six weeks, the world has suffered major attacks of ransomware — malicious software that locks up photos and other files stored on your computer, then demands money to release them.

It’s clear that the world needs better defenses, and fortunately those are starting to emerge, if slowly and in patchwork fashion. When they arrive, we may have artificial intelligence to thank.

Ransomware isn’t necessary trickier or more dangerous than other malware that sneaks onto your computer, but it can be much more aggravating, and at times devastating. Most such infections don’t get in your face about taking your digital stuff away from you the way ransomware does, nor do they shake you down for hundreds of dollars or more.

Despite those risks, many people just aren’t good at keeping up with security software updates. Both recent ransomware attacks walloped those who failed to install a Windows update released a few months earlier.

Watchdog security software has its problems, too. With this week’s ransomware attack , only two of about 60 security services tested caught it at first, according to security researchers.

“A lot of normal applications, especially on Windows, behalf like malware, and it’s hard to tell them apart,” said Ryan Kalember, an expert at the California security vendor Proofpoint.

In the early days, identifying malicious programs such as viruses involved matching their code against a database of known malware. But this technique was only as good as the database; new malware variants could easily slip through.

So security companies started characterizing malware by its behavior. In the case of ransomware, software could look for repeated attempts to lock files by encrypting them. But that can flag ordinary computer behavior such as file compression.

Newer techniques involve looking for combinations of behaviors. For instance, a program that starts encrypting files without showing a progress bar on the screen could be flagged for surreptitious activity, said Fabian Wosar, chief technology officer at the New Zealand security company Emsisoft. But that also risks identifying harmful software too late, after some files have already been locked up.

An even better approach identifies malware using observable characteristics usually associated with malicious intent — for instance, by quarantining a program disguised with a PDF icon to hide its true nature.

This sort of malware profiling wouldn’t rely on exact code matches, so it couldn’t be easily evaded. And such checks could be made well before potentially dangerous programs start running.

Still, two or three characteristics might not properly distinguish malware from legitimate software. But how about dozens? Or hundreds? Or even thousands?

For that, security researchers turn to machine learning, a form of artificial intelligence. The security system analyzes samples of good and bad software and figures out what combination of factors is likely to be present in malware.

As it encounters new software, the system calculates the probability that it’s malware, and rejects those that score above a certain threshold. When something gets through, it’s a matter of tweaking the calculations or adjusting the threshold. Now and then, researchers see a new behavior to teach the machine.

On the flip side, malware writers can obtain these security tools and tweak their code to see if they can evade detection. Some websites already offer to test software against leading security systems. Eventually, malware authors may start creating their own machine-learning models to defeat security-focused artificial intelligence.

Dmitri Alperovitch, co-founder and chief technology officer at the California vendor CrowdStrike, said that even if a particular system offers 99 percent protection, “it’s just a math problem of how many times you have to deviate your attack to get that 1 percent.”

Still, security companies employing machine learning have claimed success in blocking most malware, not just ransomware. SentinelOne even offers a $1 million guarantee against ransomware; it hasn’t had to pay it yet.

So why was ransomware still able to spread in recent weeks?

Garden-variety anti-virus software — even some of the free versions — can help block new forms of malware, as many are also incorporating behavioral-detection and machine-learning techniques. But such software still relies on malware databases that users aren’t typically good at keeping up to date.

Next-generation services such as CrowdStrike, SentinelOne and Cylance tend to ditch databases completely in favor of machine learning.

But these services focus on corporate customers, charging $40 to $50 a year per computer. Smaller businesses often don’t have the budget — or the focus on security — for that kind of protection.

And forget consumers; these security companies aren’t selling to them yet. Though Cylance plans to release a consumer version in July, it says it’ll be a tough sell — at least until someone gets attacked personally or knows a friend or family member who has.

As Cylance CEO Stuart McClure puts it: “When you haven’t been hit with a tornado, why would you get tornado insurance?”

Source: Tech CNBC
How artificial intelligence is taking on ransomware

Comments are closed.