search
HomeTechnology peripheralsAIIs machine learning for security a beautiful lie?

Translator | Bugatti

Reviewer | Sun Shujuan

Machine learning (ML) is not a magical technology. Generally speaking, ML is suitable for solving narrow problems with large data sets, and the patterns of interest are highly repeatable or predictable. Most security problems do not require or benefit from ML. Many experts, including those at Google, recommend that when solving complex problems, you should only try ML after exhausting all other methods.

ML combines a wide range of statistical techniques: ML allows us to train computers to estimate answers to problems, even if we are not programmed with the correct answers in advance. If a well-designed ML system is used to tackle the right type of problem, it can uncover insights that would otherwise be unavailable.

Every organization’s IT environment has different purposes, architecture, priorities and risk tolerances. It is impossible to create algorithms, ML or other products that broadly support security use cases in all scenarios. This is why most successful applications of ML in security combine multiple approaches to solve a very specific problem. Typical examples include spam filters, DDoS or bot mitigation, and malware detection.

1. Garbage in Garbage out

The biggest challenge with ML is having relevant and usable data to solve real problems. For supervised ML, you need a large, properly labeled dataset. For example, to build a model that recognizes cat photos, you need to train the model with many cat photos labeled "cat" and many non-cat photos labeled "non-cat." If you don't have enough photos or they're not labeled accurately, the model won't turn out well.

In security, a well-known supervised ML use case is signatureless malware detection. Many endpoint protection platform (EPP) vendors use ML to label large numbers of malicious and benign samples to train models on "what malware looks like." These models can correctly identify evasive mutant malware and other subterfuges (files that have been tampered with so that they can evade signature detection methods, but are still malicious). Instead of matching features, ML uses another set of features to predict malicious content, often catching malware that feature-based methods miss.

Since ML models are probabilistic, trade-offs are required. ML can catch malware that signature methods miss, but it can also miss malware that signature methods miss. That’s why modern EPP tools use a hybrid approach, combining ML and feature-based techniques to achieve maximum protection coverage.

2. False positive problem

Even if the model is carefully designed, ML will bring some additional challenges when interpreting the output, including:

  • The result is a probability . ML models output possibilities. If your model was designed to identify cats, you would get something like "There's an 80% chance that this thing is a cat." This uncertainty is inherent to ML systems and can make results difficult to interpret. Is 80% probability a cat accurate enough?
  • The model cannot be adjusted, at least not by the end user. To handle probabilistic results, tools may process them into binary results using thresholds set by the vendor. For example, a cat recognition model might report that any "cat" has a >90% probability of being a cat. Your organization's tolerance in this area may be higher or lower than the tolerance set by the supplier.
  • False Negatives (FN), the failure to detect truly malicious content, is a major drawback of ML models, especially poorly tuned models. We don't like false positives (FP) because they waste time. But there is an inherent trade-off between PF rate and FN rate. ML models are tuned to optimize this trade-off, prioritizing the "best" balance of FP rate-FN rate. However, the “right” balance will vary from organization to organization, depending on their individual threat and risk assessments. When using ML-based products, you must trust the vendor to choose appropriate thresholds for you.
  • Insufficient context for alert classification. Part of the magic of ML is extracting salient predictive yet arbitrary “features” from a data set. Imagine that identifying a cat happens to be highly correlated with the weather. No one would reason this way. But that’s the whole point of ML – finding patterns we wouldn’t otherwise find, and doing so at scale. Even if the predicted cause can be exposed to the user, it is often unhelpful in alert triage or incident response situations. This is due to the optimization of predictive capabilities by the “features” that ultimately define the ML system’s decisions.

3. Does any other name for the "statistical" method

sound beautiful?

In addition to the pros and cons of ML, there is another thing to note: not all "ML" is true ML. Statistical methods can provide you with some conclusions about your data. ML makes predictions based on data you have on data you don’t have. Marketers are keen to ride on the popularity of "ML" and "artificial intelligence", claiming that these are some kind of modern, innovative and advanced technological products. However, people often give little thought to whether this technology uses ML, let alone whether ML is the right approach.

4.Can ML detect malicious content?

ML can detect when “malicious content” is well defined and narrow in scope. It can also detect deviations from expected behavior in highly predictable systems. The more stable the environment, the more likely ML is to correctly identify anomalies. But not every exception is malicious, and operators don't always have enough context to respond.

The power of ML lies in augmenting, rather than replacing, existing methods, systems and teams to achieve optimal coverage and efficiency.

Original link: https://www.darkreading.com/vulnerabilities-threats/the-beautiful-lies-of-machine-learning-in-security

The above is the detailed content of Is machine learning for security a beautiful lie?. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:51CTO.COM. If there is any infringement, please contact admin@php.cn delete
Exploring the Capabilities of Google's Gemma 2 ModelsExploring the Capabilities of Google's Gemma 2 ModelsApr 22, 2025 am 11:26 AM

Google's Gemma 2: A Powerful, Efficient Language Model Google's Gemma family of language models, celebrated for efficiency and performance, has expanded with the arrival of Gemma 2. This latest release comprises two models: a 27-billion parameter ver

The Next Wave of GenAI: Perspectives with Dr. Kirk Borne - Analytics VidhyaThe Next Wave of GenAI: Perspectives with Dr. Kirk Borne - Analytics VidhyaApr 22, 2025 am 11:21 AM

This Leading with Data episode features Dr. Kirk Borne, a leading data scientist, astrophysicist, and TEDx speaker. A renowned expert in big data, AI, and machine learning, Dr. Borne offers invaluable insights into the current state and future traje

AI For Runners And Athletes: We're Making Excellent ProgressAI For Runners And Athletes: We're Making Excellent ProgressApr 22, 2025 am 11:12 AM

There were some very insightful perspectives in this speech—background information about engineering that showed us why artificial intelligence is so good at supporting people’s physical exercise. I will outline a core idea from each contributor’s perspective to demonstrate three design aspects that are an important part of our exploration of the application of artificial intelligence in sports. Edge devices and raw personal data This idea about artificial intelligence actually contains two components—one related to where we place large language models and the other is related to the differences between our human language and the language that our vital signs “express” when measured in real time. Alexander Amini knows a lot about running and tennis, but he still

Jamie Engstrom On Technology, Talent And Transformation At CaterpillarJamie Engstrom On Technology, Talent And Transformation At CaterpillarApr 22, 2025 am 11:10 AM

Caterpillar's Chief Information Officer and Senior Vice President of IT, Jamie Engstrom, leads a global team of over 2,200 IT professionals across 28 countries. With 26 years at Caterpillar, including four and a half years in her current role, Engst

New Google Photos Update Makes Any Photo Pop With Ultra HDR QualityNew Google Photos Update Makes Any Photo Pop With Ultra HDR QualityApr 22, 2025 am 11:09 AM

Google Photos' New Ultra HDR Tool: A Quick Guide Enhance your photos with Google Photos' new Ultra HDR tool, transforming standard images into vibrant, high-dynamic-range masterpieces. Ideal for social media, this tool boosts the impact of any photo,

What are the TCL Commands in SQL? - Analytics VidhyaWhat are the TCL Commands in SQL? - Analytics VidhyaApr 22, 2025 am 11:07 AM

Introduction Transaction Control Language (TCL) commands are essential in SQL for managing changes made by Data Manipulation Language (DML) statements. These commands allow database administrators and users to control transaction processes, thereby

How to Make Custom ChatGPT? - Analytics VidhyaHow to Make Custom ChatGPT? - Analytics VidhyaApr 22, 2025 am 11:06 AM

Harness the power of ChatGPT to create personalized AI assistants! This tutorial shows you how to build your own custom GPTs in five simple steps, even without coding skills. Key Features of Custom GPTs: Create personalized AI models for specific t

Difference Between Method Overloading and OverridingDifference Between Method Overloading and OverridingApr 22, 2025 am 10:55 AM

Introduction Method overloading and overriding are core object-oriented programming (OOP) concepts crucial for writing flexible and efficient code, particularly in data-intensive fields like data science and AI. While similar in name, their mechanis

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Atom editor mac version download

Atom editor mac version download

The most popular open source editor