How Machine Learning is Reshaping Cybersecurity?

Machine Learning Cybersecurity

The growth of machine learning as a discipline is embarrassing. There’s no doubt that machine learning has shown its potential to enhance search recommendations – by effective analysis of patterns. Day by day, applications of this field are increasing- including text processing, video analysis, voice recognition, email spam filtering, search recommendations, and more.  But, a question is quite relevant here. Can machine learning make an impact on cyber security discussions?

Starting with an online retail portal. Search recommendations are mandatory for an online business. The base of all these search predictions is determined by some data points. All of a customer’s previous data- including recent searches, shopping history, etc. All these collected data sets are targeted to answer only one question; which item the customer might buy?

Many of today’s industry experts are optimistic on machine learning’s power to revolutionize cyber security aspects.

Stephen Newman, CTO at Damballa is one of those persons. He’s sure about ML’s potential to solve advanced threat problems like infected machine identification in a corporate network. In a Dark Reading article, he quotes like this

“A system can watch the traffic going to and from connected devices. While some of the outbound traffic goes to potentially malicious websites, this one piece of evidence doesn’t prove that the user device is infected. This data must be viewed and weighed in context with other evidence”

There are exceptions also.

See what Simon Crosby (CEO of Bromium inc.) has to tell. In an article published in Dark Reading, he argues “Machine Learning Is Cybersecurity’s Latest Pipe Dream”. He concludes that article like this.

“Post-hoc analysis of monitoring data cannot prevent a vulnerable system from being compromised in the first place”

In the coming years, hope we can see more interesting developments in machine learning sector. Algorithms used in machine learning should be superior- enabling us to easily take decisions on data, not from personal intuitions, and to develop a transparent cyber security policy for the firms.

Leave a Reply

Your email address will not be published. Required fields are marked *