This MIT-designed AI can predict up to 85% of cyber attacks

Machine learning and a human helper are behind this hacker detection system

An AI created by scientists at the Massachusetts Institute of Technology (MIT) uses machine learning to detect suspicious activity - getting it right 85 per cent of the time.

The system uses an algorithm called "AI2", that detects anomalies, in conjunction with a human expert, because AI2 on its own can lead to false positives, according to MIT News.

"The more attacks the system detects, the more analyst feedback it receives, which, in turn, improves the accuracy of future predictions," said one of the researchers behind the project, Kalyan Veeramachaneni. "That human-machine interaction creates a beautiful, cascading effect."

The merging of artificial intelligence and what researchers call "analyst intuition" has allowed for this new system to be successful in its early development, Veeramachaneni and fellow scientist Ignacio Arnaldo said. They are working on the project alongside a chief data scientist at PatternEx.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The researchers processed three billion pieces of data known as log lines through the system over three months, with the sheer volume of information training the system to the point where it could predict and detect 85 per cent of cyber attacks.

The AI2 algorithm combs through data and presents its findings to a human analyst, who tells it which are real cyber attacks and which are not. It then uses this feedback to refine its analysis of the next set of data.

"You can think about the system as a virtual analyst," Veeramachaneni said. "It continuously generates new models that it can refine in as little as a few hours, meaning it can improve its detection rates significantly and rapidly."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/business-strategy/careers-training/354419/the-uk-should-follow-finlands-lead-with-it-comes-to-ai
Careers & training

The UK should follow Finland's lead with it comes to AI training

19 Dec 2019
Visit/strategy/28071/what-is-machine-learning
Business strategy

What is machine learning?

27 Sep 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020