via University of Oxford
A new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second has been created by researchers at Cardiff University.
Using artificial intelligence in a completely novel way, the method has been shown to successfully prevent up to 92 per cent of files on a computer from being corrupted, with it taking just 0.3 seconds on average for a piece of malware to be wiped out.
Publishing their findings in the journal Security and Communications Networks, the team say this is the first demonstration of a method that can both detect and kill malicious software in real-time, which could transform approaches to modern cybersecurity and avoid instances such as the recent WannaCry cyberattack that hit the NHS in 2017.
Using advances in artificial intelligence and machine learning, the new approach, developed in collaboration with Airbus, is based on monitoring and predicting the behaviour of malware as opposed to more traditional antivirus approaches that analyse what a piece of malware looks like.
“Traditional antivirus software will look at the code structure of a piece of malware and say ‘yeah, that looks familiar’,” co-author of the study Professor Pete Burnap explains.
“But the problem is malware authors will just chop and change the code, so the next day the code looks different and is not detected by the antivirus software. We want to know how a piece of malware behaves so once it starts attacking a system, like opening a port, creating a process or downloading some data in a particular order, it will leave a fingerprint behind which we can then use to build up a behavioural profile.”
By training computers to run simulations on specific pieces of malware, it is possible to make a very quick prediction in less than a second of how the malware will behave further down the line.
Once a piece of software is flagged as malicious the next stage is to wipe it out, which is where the new research comes into play.
“Once a threat is detected, due to the fast-acting nature of some destructive malware, it is vital to have automated actions to support these detections,” continued Professor Burnap.
“We were motivated to undertake this work as there was nothing available that could do this kind of automated detecting and killing on a user’s machine in real-time.”
Existing products, known as endpoint detection and response (EDR), are used to protect end-user devices such as desktops, laptops, and mobile devices and are designed to quickly detect, analyse, block, and contain attacks that are in progress.
The main problem with these products is that the collected data needs to be sent to administrators in order for a response to be implemented, by which time a piece of malware may already have caused damage.
To test the new detection method, the team set up a virtual computing environment to represent a group of commonly used laptops, each running up to 35 applications at the same time to simulate normal behaviour.
The AI-based detection method was then tested using thousands of samples of malware.
Lead author of the study Matilda Rhode, now Head of Innovation and Scouting at Airbus, said: “While we still have some way to go in terms of improving the accuracy of this system before it could be implemented, this is an important step towards an automated real-time detection system that would not only benefit our laptops and computers, but also our smart speakers, thermostats, cars and refrigerators as the ‘Internet of Things’ becomes more prevalent.”
Original Article: Scientists create new method to kill cyberattacks in less than a second
More from: Cardiff University
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Real-time cyberattack detection system
- 8 Ways Corporate Banking Technology is Changing the Financial Ecosystem
Corporate banking technology is revolutionizing the way businesses and institutions handle their financial transactions, making it faster, more convenient, and secure than ever before. In this blog ...
- Threat actors increasingly exploit zero-day vulnerabilities to evade threat detection
April 25, 2024 - Threat actors are increasingly targeting edge devices, exploiting zero-day vulnerabilities, and engaging in living off the land attacks to evade threat detection tools, Mandiant ...
- Over 60% of public systems vulnerable to cyber attacks
The Director-General of the National Information Technology Agency (NITA), Richard Okyere-Fosu, has disclosed a concerning statistic: 60 percent of government systems lack sufficient antivirus ...
- The Need For AI-Powered Cybersecurity to Tackle AI-Driven Cyberattacks
Artificial intelligence can help security professionals counter the threats from cyberattacks that also are increasingly boosted by AI.
- AI Cyber Threats Pose Serious Concerns for Business
Artificial intelligence (AI) technology has revolutionised various industries, including cybersecurity. While AI provides great opportunities for innovation and efficiency, it also poses significant ...
Go deeper with Google Headlines on:
Real-time cyberattack detection system
[google_news title=”” keyword=”real-time cyberattack detection system” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
Cyberattacks
- Cyberattacks are on the rise, planning for retirement and Chicago loses its 'rat hole' | Hot off the Wire podcast
Get a recap of recent financial, health and general interest stories through this special edition of our Hot off the Wire daily news podcast.
- Cyberattacks are on the rise, planning for retirement and Chicago loses its 'rat hole'
On the version of Hot off the Wire posted April 20 at 6 a.m. CT: Each Saturday Hot off the Wire looks at a variety of stories in business, science, ...
- Cyberattacks on Poland surged after election of pro-Ukraine government, NetScout says
DDoS attacks on Ukraine surged after last year's change of government. NetScout tied the surge in cyberattacks to support for Ukraine ...
- Philippines Pummeled by Assortment of Cyberattacks & Misinformation Tied to China
The cyberattacks consist of a combination of hack and leak (55%), distributed denial-of-service (10%), and misinformation and influence campaigns (35%), according to researchers at Resecurity who have ...
- How Iowa State University hopes to keep renewable energy secure from cyberattacks
The U.S. Department of Energy is awarding researchers a $2.5 million grant to establish a cybersecurity center based at Iowa State.
Go deeper with Google Headlines on:
Cyberattacks
[google_news title=”” keyword=”cyberattacks” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]