Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:55 AM
Rutrell Yasin
Rutrell Yasin
Connect Directly

5 Things Security Pros Need To Know About Machine Learning

Experts share best practices for data integrity, pattern recognition and computing power to help enterprises get the most out of machine learning-based technology for cybersecurity.
2 of 6

#1 Garbage In, Garbage Out

There is an old saying in machine learning called garbage in, garbage out, says Cylances Matt Wolff. Situations where machine learning would not be effective are places where not enough data is generated to provide insight into what is going on in the IT network, he says.

As long as data is present and useful, then machine learning can also be useful. If the data isnt informative, then machine learning isnt going to work, Wolff says.

I am bullish on the machine learning opportunity, but nothing as far as I know has been vetted out to demonstrate that this technology is going to definitively be better than any other techniques we are using to try to detect attacks, says Pete Lindstrom, research vice president for security strategies with IDC.

Inputs and Outputs
Presumably, organizations want to use machine learning to quickly react to attacks. Yet, a whole plethora of diverse types of information feed into the security ecosystem - for example, network packet activity, system calls on endpoints, and user behavior data at a meta level on the network. So, first people need to figure out what information is feeding the system, Lindstrom says.

You still must understand the inputs and outputs. What is the nature and type of data feeding the system? What process and techniques do they use to identify the algorithms? What is the action they might take?

The challenge is that he nature of these techniques is so dynamic, cybersecurity analysts cant take for granted that their output is going to be the same as someone elses output, explains Lindstrom: You cant rely on efficacies without doing your own testing on the solution. If it is looking for anomalous activity on the network, the only way to determine what is anomalous is to learn your network. It cant take someone elses network and apply it. Otherwise we are almost back to signature-based defense.

Added complexity
If security professionals are not careful they can wind up increasing complexity with less understanding of the processes and the output is going to be the same as security tools are delivering today. It is not horrible, by the way, because the solutions we have today block a lot of attacks, Lindstrom says.

Image Source: Rawpixel.com via Shutterstock

2 of 6
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
User Rank: Author
12/15/2016 | 3:02:27 PM
Insightful, thank you for sharing.
User Rank: Apprentice
12/14/2016 | 10:11:16 AM
Machine Learning - Useful points
First of all, a big thanks for the article. The informations (5 security pros) mentioned in this article very useful. As AI and ML is going to rule future world, we need to consider these security pros.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-24
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
PUBLISHED: 2020-09-24
PrestaShop from version and before version is vulnerable to a blind SQL Injection attack in the Catalog Product edition page with location parameter. The problem is fixed in
PUBLISHED: 2020-09-24
In PrestaShop from version and before version, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version
PUBLISHED: 2020-09-24
ActFax Version 7.10 Build 0335 (2020-05-25) is susceptible to a privilege escalation vulnerability due to insecure folder permissions on %PROGRAMFILES%\ActiveFax\Client\, %PROGRAMFILES%\ActiveFax\Install\ and %PROGRAMFILES%\ActiveFax\Terminal\. The folder permissions allow "Full Control" t...
PUBLISHED: 2020-09-24
Improper directory permissions in the Hotspot Shield VPN client software for Windows 10.3.0 and earlier may allow an authorized user to potentially enable escalation of privilege via local access. The vulnerability allows a local user to corrupt system files: a local user can create a specially craf...