Seeing a Phish
Ed Amoroso summarizes a recent conversation with Chris Cleveland of Pixm about the use of computer vision to detect phishing.

Seeing a Phish

Let’s start with CNN – and no, not that CNN, but rather convolutional neural networks. This class of deep neural networks is the workhorse for computer vision, and is one of the underlying forces behind recent advances in artificial intelligence. Their design is inspired by the image processing done in the visual cortex of the animal brain. When you see one of those cat recognition demos by an AI system, a CNN is likely doing most of the work.

Many cyber security researchers have tried to apply the tenets of AI – and computer vision – to the common problems addressed in cyber security: Detecting malware variants, identifying zero-day attacks, and the like. And while some companies have seen reasonable commercial success with their AI tools, a roadblock to faster progress is the unavailability of sufficient volumes of learning data about real vulnerabilities and attacks for training.

In contrast, the ImageNet project initiated a decade ago by Stanford’s Fei-Fei Li, has published 200,000 categories (including cats) of over 14 million images for AI researchers. Nothing of this scale exists for cyber security, because businesses won’t report their embarrassing security boo-boos. (Warning to America: China pays no mind to this middling privacy issue, and will soon develop AI recognition for security that will outpace everyone.)

What we have, therefore, in AI for cyber security is a plethora of siloed efforts, most by tech start-ups who find an acceptable, but never optimal, collection source to train their product models. This helps us get by, but let’s face it: Cyber security is behind in AI. And as object recognition evolves to situational interpretation, security AI (except perhaps in the Chinese military) will have trouble keeping up. We need inspired leaders with new ideas.

When computer vision is applied surgically, however, to cyber security problems, the results can be encouraging. I spent a wonderful afternoon chatting with the principals of security start-up Pixm recently, to learn how they are applying computer vision technology to cyber security and, specifically, phish detection. I can report that their work is creative, and suggests a new angle for the use of computer vision in security. Here is what I learned:

“We use artificial intelligence to visually recognize fake websites,” explained Chris Cleveland, Founder and CEO. “The solution is endpoint-oriented, rather than purely cloud-based, because we’ve learned that detection of phishing requires an end-user vantage point. Many of the phishing use-cases we’ve examined cannot be identified by a man-in-the-middle techniques performed in the cloud.”

Cleveland had the inspiration to apply computer vision to phishing while studying as a graduate student at Columbia University several years ago. With his interests in machine learning, his timing was good, because advances in deep, distributed neural network algorithms, as well as leaps in processing capability, created many new opportunities for researchers. And thus the spark was lit for Pixm.

“Our first prototype was designed for the cloud,” he explained to me. “And it validated our views on detecting phishing, which we knew was the majority of breaches. But computer vision technology was becoming more real-time, and our instinct was that we could develop an endpoint agent that could peruse and recognize attacks visually via screenshot after the phishing page has been served to the user. You cannot do this with a cloud system.”

Pixm technology is best understood in the context of browsing web pages: If a user opens an authentic website, the Pixm agent provides evidence using visual scanning that the page is fine. If that user opens a fake website, however, then the Pixm agent recognizes this using its computer vision technology and quickly shuts down the site. This approach is different than traditional blacklists and promises a more dynamic solution for zero-day attacks.

The Pixm agent includes browser extensions for Chrome and Firefox which are installed by the user (the company offers personal and enterprise editions). Users then go about their normal activity, and if Pixm “sees” something amiss in a served pages, using the verified page as a guide, then it provides a warning to the user. If things look bad, however, then the Pixm software blocks the page and disables the ability for users to click on links or add text.

As with many creative innovations such as Pixm, the technology will inevitably evolve to produce increasingly good results. I did not test the software per se on my own browsers, but my instinct, having looked at solutions such as this for decades, is that it will provide an excellent additional tool in the complement of security used to protect users. Blacklists, for example, do add value, and could easily be integrated with this new capability.

I love the idea of using computer vision to identify phishing, and I will keep an eye on Pixm as it evolves and improves its product through usage. Back in the early days of intrusion detection – and I was there – many emerging algorithmic techniques that we take for granted today, could be viewed as either glass-half-empty or glass-half-full in terms of their early performance on live data. With Pixm, I prefer to see this as glass-half-full.

Make sure to spend time with this creative team. Ask to see their solution demo and ask Chris Cleveland to take you through the story of his fine company. I’m betting that this visual detection technique will evolve into something that we will assume to be present in our ever-growing arsenal against phishing. And, as always, please be sure to share with us what you’ve learned.

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    11 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了