Is there a secret friendship blooming between machine learning and hackers?

Is there a secret friendship blooming between machine learning and hackers?

With benefits come potential risks too. Who would have ever thought that hackers could use ML for hacking too? Well, looks like they can, and here’s how.

Due to its path-breaking innovation, ML has become one of the hottest buzzwords in the last few years. The ability to make machines learn from past experiences without being explicitly programmed helps ML gain everyone’s attention. ML has disrupted various industries, including healthcare, retail, and manufacturing, with its incredible features. However, every technology comes with its own set of drawbacks that experts should identify and resolve at the earliest. One of the significant applications of ML is in the field of cybersecurity. While on one handm, ML is helping overcome various security related vulnerabilities, on the other hand it is assisting hackers too. Read on to know how ML can defeat cyber threats and at the the same time how hackers can use ML for hacking.

How can ML overcome cyber frauds?

ML’s ability to learn in real-time helps companies to analyze any suspicious activity in their security network and resolve it proactively. With its self-learning feature, ML can learn from its past mistakes or past data breaches and predict similar vulnerabilities for future, helping companies to reduce the time they invest in remediation. Furthermore, ML can process large swarms of datasets - structured or unstructured - and detect anomalies in real-time, if any. Thanks to ML for making systems and software self-learn and for assisting humans in crucial decision-making. So, its certainly rue that ML overcomes cyber frauds, but that it helps hackers as well, is a fact that cannot be denied too.

How do hackers ML for hacking?

It is quite ironical how hackers benefit themselves with ML, whereas the technology was aimed at detecting and protecting businesses from such threats. So, is there a secret friendship flourishing between ML and hackers that we are unaware of? Yes, there is.

  • Malware creation - Hackers invest a lot of their time to create the malware that is then pushed into organizational systems. They have to write long and complex codes to develop malware, such as adware, rootkit, bug, spyware, before injecting them into a system. ML can help hackers to create malware. One of the examples of ML helping create malware was presented in a report named “Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN,” which states how algorithms were built to develop malware that could easily find another path to security systems.
  • Phishing emails - ML has incredible applications, such as NLP, voice recognition, and text-to-speech, that help companies offer sophisticated ways to run their business. Hackers can use ML and its applications for writing a believable mail by training the ML system with legitimate mails and creating similar mails that could be sent to targets.
  • Destroying the ML system - ML gathers large masses of datasets and works on it. But what if the input data is poisoned? Will the ML system still work fine? No, it won't. Hackers can destroy the input datasets on which the ML systems work to make the system corrupted.
Bartholom?us Rohard Warszawski

?? Professional child at heart | ?? Test Architect | ??? AI Explorer

6 年

Great reflection. Exploits are easier to implement, than an algorithm for a business process. So?I can imagine a new dark-web economy in ML exploits. The hijacking of Microsoft AI chat bot Tay, can be categorized as rude trolling.? But hijacking of "customer support chat bots" for phishing attempt will bring interesting times.

Ved Prakash Singh

Business Strategist and Entrepreneur

6 年

Good information. Well , the possibilities of such happenings does exist . With the evolution of innovative approaches in times to come the task of hackers can be made much more tough. Need to keep innovating for the good cause.

Deepa Mudiyappanavar

Senior Software Engineer at Dell Technologies

6 年

Nice article:)very informative

回复

要查看或添加评论,请登录

Naveen Joshi的更多文章

社区洞察

其他会员也浏览了