Home >Technology peripherals >AI >Huayunan and other units jointly initiated the establishment of the 'AI Security Working Group' to strengthen cooperation and research in the field of AI security.

Huayunan and other units jointly initiated the establishment of the 'AI Security Working Group' to strengthen cooperation and research in the field of AI security.

王林
王林forward
2023-09-18 11:53:03723browse

On the afternoon of September 7, at the "Exploring the Next Generation of Security Intelligence" forum held at the 2023 Inclusion Bund Conference, the Cloud Security Alliance (CSA), the world's authoritative international industry organization, Greater China announced the establishment of an "AI Security Working Group". Yun'an and more than 30 institutions including China Telecommunications Research Institute, Ant Group, Huawei, Xi'an University of Electronic Science and Technology, and Shenzhen National Financial Technology Evaluation Center became the first batch of sponsors. The "AI Security Working Group" is committed to jointly solving the security problems caused by the rapid development of AI technology.

Huayunan and other units jointly initiated the establishment of the AI Security Working Group to strengthen cooperation and research in the field of AI security.

The Cloud Security Alliance Greater China AI Security Working Group will be co-led by China Telecom Research Institute and Ant Group. The working group will convene enterprises, schools, research institutions and companies involved in the upstream and downstream of the artificial intelligence industry chain within the alliance. User units, etc., jointly research cutting-edge technologies for artificial intelligence security. The establishment of the AI ​​Security Working Group will also serve as an international bridge so that my country's research results in the field of artificial intelligence security can have a global impact

The AI ​​Security Working Group will focus on the prominent security risk issues of artificial intelligence, and output white papers, industry knowledge maps, group standards, system frameworks, solutions, etc. in the fields of artificial intelligence endogenous security, derived security, and assisted security, etc., to provide a basis for the entire The industry provides a clear and systematic AI security research framework. According to the plan, the working group will initially output research results such as the "AI Security White Paper", "Large Model Security Research Report", and "AI Data Security Assessment Specifications".

From a security perspective, artificial intelligence technology can be said to be a "double-edged sword." It not only poses a threat to data, business and systems, but also provides impetus for the development of security technology. In recent years, the research and application of artificial intelligence in the field of network security have gradually begun. Huayunan Company actively explores the application of artificial intelligence technology in the field of network security, especially in deep learning-based security analysis and attack surface intelligence management, and has achieved quite mature applications

In terms of artificial intelligence applications for network asset detection and identification, Huayunan introduces machine learning, deep learning and other methods for operating system fingerprint identification, which can achieve passive identification of operating systems based on protocol stack fingerprints in a short time, greatly improving The recognition rate of fingerprints that are not accurately matched is used to compensate for and improve the speed and accuracy of operating system fingerprint recognition based on the rule base.

The application of artificial intelligence in path decision-making, intelligent decision-making technology mainly includes intelligent path decision-making and intelligent attack decision-making. Lingblade Intelligent Penetration and Attack Simulation System Ai.Bot is an intelligent penetration and attack simulation system independently developed by Huayunan based on artificial intelligence technology. During the attack, Ai.Bot will make decisions based on target selection within the intranet, giving priority to more targeted tactics and correspondingly adapted weapons. Not only that, Ai.Bot’s intelligence The engine also makes judgments on target selection, giving priority to targets with a greater chance of being captured.

In addition, at the 2023 Cybersecurity Operations Technology Summit (SecOps 2023) held in May, Hua Yunan further shared his technical understanding and practice of large models. Huayun'an's security big language model focuses on the fields of intelligence analysis and intelligent attack and defense. In terms of expanding threat intelligence, through the analysis of 1-day vulnerability intelligence and sensitive data leakage intelligence, it helps enterprises quickly perceive the value of intelligence, make decisive responses and repairs; in terms of intelligent attack and defense, , based on the semantic understanding and generation of large models, it summarizes obscure offensive and defensive technical achievements in legible text, and generates scenario-based verification scripts and ideas, which further improves security operation efficiency and narrows the gap between offensive and defensive information.

As one of the first initiators, Huayunan actively participated in the AI ​​Security Working Group’s research, exploration and practice of the application of artificial intelligence technology in the field of network security. Huayunan will cooperate with the AI ​​security working group to provide support for the development of security protection technology in AI scenarios and the application of AI technology in the field of network security, so as to provide more efficient network security protection and build a stronger network security guarantee

The above is the detailed content of Huayunan and other units jointly initiated the establishment of the 'AI Security Working Group' to strengthen cooperation and research in the field of AI security.. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:sohu.com. If there is any infringement, please contact admin@php.cn delete