Machine Learning Vs. Cybercrime: 4 Ways ML is Fighting Back

Claudio Butticé Claudio Butticé
August 28, 2020 Big Data, Cloud & DevOps

Takeaway: AI and ML are powerful forces in disrupting cybercrime, protecting enterprises, and safeguarding against data breaches.

Cybercrime is constantly finding new ways to wreak havoc, steal your private information, and commit all kinds of mischief. New technologies such as artificial intelligence (AI) and machine learning (ML) have already been leveraged by hackers and cyber criminals for their malicious intents.

As one of the founders and CEO of Intel, Andy Grove once said:

“At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that’s a very valuable asset, and people will be tempted to trade and do commerce with that asset.”

However, AI and ML are also powerful forces in disrupting cybercrime, protecting enterprises, and safeguarding data against breaches and exploits. What are some recent developments in adopting ML for cybercrime defence?

Protecting Credit Card Security and Privacy

Today, protecting the privacy and security of shoppers’ credit cards is mandatory – lots of people shop online, plus even in retail stores, credit cards are used routinely. Every single transaction that occurs must be examined in real-time for signs of fraud.

A truly titanic feat if we think about the fact that a global payment processor, such as Mastercard, can process nearly 165 million transactions per hour.

Only ML algorithms powered by high-performance computing (HPC) are able to establish this much-needed layer of protection by applying 1.9 million rules to each transaction in less than one second.

Teaching Users How to Protect Themselves

The most effective way to prevent some forms of cybercrime such as phishing is to simply teach people how to avoid falling for them. Most phishing crimes are quite transparent, while others are sneakier and harder to detect. For this reason, many companies teach their employees how to protect themselves against phishing with simulation campaigns.

Some workers in an organization are inherently more vulnerable than others – but those who aren’t, still keep getting the same annoying messages over and over no matter what.

Hoxhunt is a company that employs ML to take the effectiveness of phishing simulations to the next level. Instead of teaching the same lessons to everyone regardless of their abilities, roles and email use patterns, the system is able to draw information from the individual responses of each employee.

The AI then “personalizes” the learning experience accordingly, sending fake phishing emails over time with increasing sophistication to test people’s vigilance. The more frequently a worker falls for the phishing simulation, the more training he or she will receive. Similarly, if a user demonstrates a higher level of awareness, the platform will reduce the frequency of the simulations.

As Hoxhunt CEO Mika Aalto explained:

“One of the multiple challenges faced by organizations today is the severe shortage of talented security professionals in the market. With the support of ML, it’s possible to tailor individual training to each employee based on their role and progression, without adding extra constraint to the current team.”

Fighting Fire with Fire

Although the use of new ML algorithms is helping cybercriminals automate their massive attacks and exploits, AI can be used to automate and streamline data analysis for cybercrime defence as well. AI programs can examine incoming and outgoing business traffic at an amazing speed to detect any anomaly or abnormality in data patterns.

They can be used to spot a breach as it occurs, effectively preventing it, or at least mitigating it. Supervised learning can help the AI become more efficient in detecting advanced malware over time.

For example, DeepArmor is an ML-based tool that leverages Google Cloud Machine Learning Engine to prevent endpoint attacks by detecting threats early with 99.5% accuracy.

 

The scalability of AI is also critical to reduce the overwhelming workload of IT security departments that are in dire need of more streamlined processes to parse through all the data and root out threats.

Especially in the case of smaller businesses, nearly one-quarter of enterprises lack the resources to achieve effective in-house cybersecurity such as having a fully-dedicated team to monitor performance and spot signs of a threat.

AI can classify risk autonomously, suggest a course of action, and, when coupled with human efforts, enable egregious threat-based decision-making that goes beyond merely relying on pre-defined risk management strategies.

Skipping Dangerous Hijack Networks

An increasingly popular cybercrime is to hijack IP addresses for malicious purposes such as stealing cryptocurrencies or sending malware and spam. The Border Gateway Protocol (BGP) is a routing mechanism used to send data packets to their correct destination and exchange data between networks.

Back in the late 1990s, a critical shortcoming leading to a serious exploit was found by a team of hackers. More than 20 years later, no security procedures are available to validate messages, and IP hijackers can easily redirect data packets to specific “bad” networks.

Even companies like Google and Amazon have been damaged by IP hijacking attempts, that are used for global espionage as well. A new machine learning system has been developed by researchers at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL).

They identified some of the characteristics of IP hijackers such as high volatility and the presence of foreign IP addresses, and flagged over 800 suspicious networks – some of which have been used for malicious purposes for years. This system could be used to block fraudulent routing incidents and complement the existing solutions to prevent these crimes.

Conclusion

AI and ML are among the key drivers of the Fourth Industrial Revolution. As the risk and threat landscape continues to change and evolve, these technologies are the fundamental instruments that we need to prepare an adequate response.

  • Experfy Insights

    Top articles, research, podcasts, webinars and more delivered to you monthly.

  • Claudio Butticé

    Tags
    AICybersecurityML
    © 2021, Experfy Inc. All rights reserved.
    Leave a Comment
    Next Post
    Cyber Security: Beyond a Mere Operational Approach

    Cyber Security: Beyond a Mere Operational Approach

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    More in Big Data, Cloud & DevOps
    Big Data, Cloud & DevOps
    Cognitive Load Of Being On Call: 6 Tips To Address It

    If you’ve ever been on call, you’ve probably experienced the pain of being woken up at 4 a.m., unactionable alerts, alerts going to the wrong team, and other unfortunate events. But, there’s an aspect of being on call that is less talked about, but even more ubiquitous – the cognitive load. “Cognitive load” has perhaps

    5 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    How To Refine 360 Customer View With Next Generation Data Matching

    Knowing your customer in the digital age Want to know more about your customers? About their demographics, personal choices, and preferable buying journey? Who do you think is the best source for such insights? You’re right. The customer. But, in a fast-paced world, it is almost impossible to extract all relevant information about a customer

    4 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    3 Ways Businesses Can Use Cloud Computing To The Fullest

    Cloud computing is the anytime, anywhere delivery of IT services like compute, storage, networking, and application software over the internet to end-users. The underlying physical resources, as well as processes, are masked to the end-user, who accesses only the files and apps they want. Companies (usually) pay for only the cloud computing services they use,

    7 MINUTES READ Continue Reading »

    About Us

    Incubated in Harvard Innovation Lab, Experfy specializes in pipelining and deploying the world's best AI and engineering talent at breakneck speed, with exceptional focus on quality and compliance. Enterprises and governments also leverage our award-winning SaaS platform to build their own customized future of work solutions such as talent clouds.

    Join Us At

    Contact Us

    1700 West Park Drive, Suite 190
    Westborough, MA 01581

    Email: support@experfy.com

    Toll Free: (844) EXPERFY or
    (844) 397-3739

    © 2025, Experfy Inc. All rights reserved.