JUNE 21, 2024 by Bernice Chan & Julia Cohen, University of Southern California

Collected at; https://techxplore.com/news/2024-06-ai-cybersecurity-analysts-sea.html

As organizations increasingly rely on networks, online platforms, data and technology, the risks associated with data breaches and privacy violations are more severe than ever. Couple this with the escalating frequency and sophistication of cyber threats and it becomes clear that fortifying cybersecurity defenses has never been more important.

Cybersecurity analysts are on the front lines of this battle, working around the clock in security operations centers (SOCs)—the units that safeguard organizations from cyber threats—to sift through a massive volume of data as they monitor potential security incidents.

They are faced with vast streams of information from disparate sources, ranging from network logs to threat intelligence feeds, trying to prevent the next attack. In short, they are overwhelmed. But too much data has never been a problem for artificial intelligence, so many experts are looking to AI to bolster cybersecurity strategies and ease the strain on analysts.

Stephen Schwab, director of Strategy for USC’s Information Sciences Institute’s (ISI) Networking and Cybersecurity Division, envisions symbiotic teams of humans and AIs collaborating to improve security, so that AI can assist analysts and improve their overall performance in these high-stakes environments. Schwab and his team have developed testbeds and models to research AI-assisted cybersecurity strategies in smaller systems, such as protecting a social network.

“We’re trying to ensure that machine learning processes can ease, but not add to, these worries and lighten the human analyst’s workload,” he said.

David Balenson, associate director of ISI’s Networking and Cybersecurity division, emphasizes the critical role of automation in alleviating the burden on cybersecurity analysts. “SOCs are flooded with alerts that analysts have to analyze rapidly in real time, and decide which are symptoms of a real incident. That’s where AI and automation come into play, spotting trends or patterns of alerts that could be potential incidents,” says Balenson.

Looking for transparency and explainability

However, the integration of AI into cybersecurity operations is not without its challenges. One of the primary concerns is the lack of transparency and explainability inherent in many AI-driven systems. “Machine learning (ML) is useful for monitoring networks and end-systems where human analysts are fatigued,” Schwab explains. “Yet they are a black box—they can throw off alerts that may seem inexplicable. This is where explainability comes in, as the human analyst has to trust that the ML system is operating within reason.”

A solution that Schwab proposes is building explainers that present the ML system’s actions in computerized English, similar to natural language, that the analyst can understand. Marjorie Freedman, a Principal Scientist at ISI is researching this. “I’ve been looking at what it means to generate explanations, and what you want from the explanation. We are also exploring how an explanation can help a person verify a model’s generation,” she said.

The art of flagging

One example of an explanation for an AI decision in cybersecurity is the process of online authentication. When authenticating to a system, users type in a password or PIN code. However, different people punch in the data in different patterns, which the AI might flag even if the code was correctly entered.

These “potentially suspicious” patterns might not actually be security breaches, but the AI still factors them into consideration. If, along with flagging them, an explainer is provided to the human analyst listing the input pattern as one of the reasons for the flagging, the analyst will better understand the reasoning behind the AI’s decision-making. And armed with that additional information, the analyst can make more informed decisions and take appropriate action (i.e., validate or override the AI’s determination). Freedman believes that cybersecurity operations should run their best ML model to predict, identify, and address threats in parallel with approaches that effectively explain the decision to experts.

“If somebody is shutting down a system that will cost the company a lot of money, it’s a high-stakes situation where we must confirm it’s the right decision,” said Freedman. “The explainer may not exactly be the AI’s derivation of how it got there, but it might be what the human analyst needs to know to determine whether it’s correct or not.”

Leave a Reply

Your email address will not be published. Required fields are marked *

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments