ai人工智能的本质和未来_是人工智能手中网络安全的未来AI 3

ai人工智能的本质和未来

The Use of Artificial Intelligence for Cyber Defense

人工智能在网络防御中的应用

The possible cyber defense system should provide at least three levels of cybersecurity. The first level includes traditional static cyber defense mechanisms such as identity and authentication, cryptographic protection, access control, and network filtering, etc. The second level includes proactive cyber defense mechanisms such as information gathering, security assessment, network status monitoring, and attack. The third level corresponds to cyber defense management, which performs a holistic assessment of network status, the choice of appropriate or optimal defense mechanisms, and their adaptation [33].

可能的网络防御系统应至少提供三个级别的网络安全。 第一层包括传统的静态网络防御机制,例如身份和身份验证,密码保护,访问控制和网络过滤等。第二层包括主动的网络防御机制,例如信息收集,安全评估,网络状态监视和攻击。 第三级对应于网络防御管理,它对网络状态进行全面评估,选择适当或最佳的防御机制,并对其进行适应性调整[33]。

Early warning, intrusion detection, and prevention systems, including artificial intelligence technologies, play an important role in ensuring these cybersecurity levels.

预警,入侵检测和预防系统(包括人工智能技术)在确保这些网络安全级别中起着重要作用。

Early Warning Systems (EWS) are used to protect against cyber-attacks and respond as soon as possible. However, due to the new level of cyber threat evolving with new technologies, unlike traditional and pure packet inspection, the new EWS architecture needs to collect, analyze, correlate data, and at the same time detect, analyze and respond to threat models in near real-time. It is heard. This need includes the development of virtual sensors, sophisticated correlation of data, new logic models for network behavior analysis, learning algorithms, and the development of concepts and new approaches that can provide scalability, reliability, and flexibility, especially in IPv6 networks [34].

预警系统(EWS)用于防御网络攻击并尽快做出响应。 但是,由于新技术带来的新级别网络威胁,与传统的和纯粹的数据包检查不同,新的EWS体系结构需要收集,分析,关联数据,同时需要在附近检测,分析和响应威胁模型即时的。 听到了。 这种需求包括虚拟传感器的开发,数据的复杂关联,用于网络行为分析的新逻辑模型,学习算法,以及可提供可伸缩性,可靠性和灵活性的概念和新方法的开发,尤其是在IPv6网络中[34] 。

The aim of using Artificial Intelligence in early warning and intrusion detection is to develop an advanced, intelligent help system for detecting attacks from the internet as early as possible in both local area networks and wide area networks. Within this framework, widely used internet protocols such as FTP, SMTP, and HTTP should also be considered, as well as newer protocols such as SOAP.

在预警和入侵检测中使用人工智能的目的是开发一种先进的智能帮助系统,以尽可能早地检测局域网和广域网中来自Internet的攻击。 在此框架内,还应考虑广泛使用的Internet协议(例如FTP,SMTP和HTTP)以及更新的协议(例如SOAP)。

The main problem that needs to be addressed with the use of Artificial Intelligence in the field of cyber defense is that the available technologies are not at the desired level and what Artificial Intelligence methodologies should be developed and adapted in order to minimize the human factor, which is considered as the weakest link in cyber defense.

在网络防御领域中使用人工智能需要解决的主要问题是,可用的技术还没有达到预期的水平,应该开发和修改哪种人工智能方法以最小化人为因素,被认为是网络防御中最薄弱的环节。

The Use of Artificial Intelligence for Cyber Offense

人工智能在网络犯罪中的应用

Misuse of AI can threaten security in several ways;

滥用AI可以通过多种方式威胁安全性。

  • Threats to digital security,

    对数字安全的威胁
  • Threats to physical security,

    对人身安全的威胁,
  • Threats to social /economic/political security,

    对社会/经济/政治安全的威胁,
Image for post

Automation of Social Engineering Attacks: NLP (natural language processing) tools are able to mimic the victim’s writing style, so Artificial Intelligence systems collect online information to create personalized malicious websites/emails/links that are likely to be clicked automatically.

自动化的社会工程学攻击: NLP(自然语言处理)工具能够模仿受害者的写作风格,因此人工智能系统收集在线信息以创建可能会被自动单击的个性化恶意网站/电子邮件/链接。

Automation of Vulnerability Discovery: Past models of code vulnerabilities help speed up the discovery of new vulnerabilities.

漏洞发现的自动化:过去的代码漏洞模型有助于加快发现新漏洞的速度。

Advanced Hacking: Artificial Intelligence can be used in many ways in hacking. For example, Artificial Intelligence provides automated tools to improve target selection and prioritization, avoid detection, and respond creatively to changes in the target’s behavior. It can also mimic human-like behavior that directs the target system to a less secure state.

高级黑客:人工智能可以在黑客中以多种方式使用。 例如,人工智能提供了自动工具来改善目标的选择和优先级,避免检测以及对目标行为的变化做出创造性的React。 它还可以模仿类似于人的行为,将目标系统定向到不太安全的状态。

Automation of Ransomware Tasks: Artificial intelligence techniques can automate various tasks such as dialogue and payment processes with victims of ransomware attackers.

勒索软件任务的自动化:人工智能技术可以自动执行各种任务,例如与勒索软件攻击者的受害者进行对话和付款过程。

Utilization of Artificial Intelligence in Applications: Artificial intelligence is used to create data poisoning attacks, or backdoor (backdoor).

应用程序中人工智能的利用:人工智能用于创建数据中毒攻击或后门(后门)。

Flock Attacks: Distributed autonomous robotic system networks allow monitoring of large areas and execution of fast, coordinated attacks.

群攻击:分布式自主机器人系统网络允许监视大区域并执行快速,协调的攻击。

Attacks on Autonomous Drones and Vehicles: The control of artificial intelligence-based autonomous drones and vehicles as a result of cyber-attacks poses significant threats.

无人驾驶无人机和车辆的攻击:由于网络攻击,对基于人工智能的无人驾驶无人机和车辆的控制构成了重大威胁。

Fake News: When the latest developments in image processing are combined with natural language creation techniques, the public tries to be misled by producing highly realistic videos of state leaders who seem to be making speeches and comments that they have never actually done.

假新闻:将图像处理的最新进展与自然语言创建技术结合在一起时,公众会试图制作高逼真的国家领导人录像带,从而误导公众,这些国家领导人似乎从未发表过演讲和评论。

Personalized Disinformation and Impact Campaigns: AI-powered social network analysis can identify key factors to be approached with (malicious) offers or targeted by disinformation.

个性化的虚假信息和影响力运动:基于AI的社交网络分析可以识别(恶意)要约或虚假信息所针对的关键因素。

Source

资源

[32] X. Ou, “A Logic-programming Approach to Network Security Analysis”, PhD Thesis, Princeton University, 2005.

[32] X. Ou,“网络安全分析的逻辑编程方法”,博士学位论文,普林斯顿大学,2005年。

[33] I. Kotenko, “Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security”, IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2007.

[33] I. Kotenko,“针对国土安全的网络攻击和网络防御的多主体建模和仿真”,IEEE智能数据采集和高级计算系统国际研讨会:技术与应用,2007年。

[34] M. Golling, B. Stelte, “Requirements for a Future EWS — Cyber Defence in the Internet of the Future”, 3rd International Conference on Cyber Conflict, CCD COE, 2011.

[34] M. Golling,B。Stelte,“对未来EWS的要求-未来互联网中的网络防御”,第三届网络冲突国际会议,CCD COE,2011年。

翻译自: https://towardsdatascience.com/is-the-future-of-cyber-security-in-the-hands-of-artificial-intelligence-ai-3-60a148334245

ai人工智能的本质和未来

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值