<>
| |May 20179CIOReviewAxis Bank, HDFC Bank and ICICI Bank too admitted being hit by similar cyber attacks -- forcing banks to either replace or request users to change the security codes of as many as 3.2 million debit cards. The quantum of financial loss is still unknown in this case.In all cases of cyber attacks, the hackers usually test out the system over a period of time before they strike; it is always a well-planned strategic action. While this is why they succeed it is also quite a give away that which an Artificial Intelligence based malware protecting system can detect and foil even before the attack takes place by spotting the unusualness in the patterns of transactions or `probes' on the security systems being sent in by would-be hackers to install malware that will eventually give them the break-in codes. Experts have employed machine-learning techniques, drawing on data insight to identify patterns and apply machine-readable context to events. For example, Amazon has deployed a machine learning solution, based on a unique algorithm that can predict customer-spending habits. In the security world, similar machine-learning systems are used for anomaly detection. This means that a model is defined and positioned as normal. If an outlier is detected that differs from this model, it is considered to be an anomaly. Importantly, the `normal' model is not static. As more data is added, the definition of `normal behavior' continues to evolve and reflect the environment to ensure it remains accurate and up-to-date.This also means that if unknown threats are assessed against the model, they are more likely to be identified because they do not fit the expected behavioral pattern.Security researchers at MIT have developed a new Artificial Intelligence-based cyber security platform, called 'AI2,' which has the ability to predict, detect, and stop 85 percent of Cyber Attacks with high accuracy. AI-powered anti-malware cyber security solutions are different from anti-virus which reactively detects viruses or malware. Artificial Intelligence security solutions proactively finds out the possibilities of an attack happening even before it has taken place by applying machine learning techniques to analyze the behavioral patterns of the would-be hackers. In the Bangladesh instance, this would be the payment requests not having the names of the correspondent banks or that the same requests had earlier come in an unformatted manner but were later corrected. Whatever method cyber criminals use, they are bound to create some kind of a pattern that will be creating a digital ripple which only the ultra-sensitive radars of Artificial Intelligence which has been used to train the computers can detect. But the same technologies that improve corporate defenses could also be used to attack them. Take phishing; it's the simplest method of cyber attack available and there are schemes on the dark web which put all the tools required to go phishing into anyone's hands. Like in the physical world of law enforcers and criminals, in the cyberspace too it will be a race of who stays a step ahead in the game. Experts have employed machine-learning techniques, drawing on data insight to identify patterns and apply machine-readable context to eventsAmitabh Ray
< Page 8 | Page 10 >