Scaling Security with GPUs/DPUs for AI and Machine Learning

Scaling Security with GPUs/DPUs for AI and Machine Learning

On March 25, before the full impact of coronavirus hit home and the world was still full of hope, Google News showed an eye-wateringly appealing headline: Cybercrime Gangs Promise to Stop Attacks on Healthcare Organizations During the COVID-19 Crisis.

Apparently, some ransomware operators, such as DoppelPaymer, were also promising free decryption services for healthcare organizations mistakenly encrypted. Some hope!

As the article went on to explain, even if the gangs did as promised, the supply chain for healthcare is so complex that an attack on any other organization might end up affecting it. And now, half a year later, the bitter reality is that cybercriminals have – like hyenas stalking the weakest in a herd – taken every advantage of businesses and individuals already crippled by lockdown.

Sending staff to work from home means extending the business network edge to homeworkers who, even if diligent about securing their laptops, are likely to be sharing a Wi-Fi network with other family members. In fact everyone has been spending more time online and criminals rapidly adapted their methods to the new social environment. Anxious and less tech-savvy consumers, desperately seeking the latest Covid-19 news and advice, are especially vulnerable to phishing scams – including e-mails designed to look like they are from official government authorities or financial institutions. There have also been bogus requests for charitable donations.

So why promise to halt all cyber-attack activities? The article suggested that, in this emergency climate, any cybercrime against health organization would be so offensive that it would challenge the federal government’s full security powers to throw every capability it had against the gangs. They were just waving a white flag to save their skins.

If anything, we can expect to emerge from this pandemic with businesses – weakened by the security challenges and economic setbacks – even more vulnerable to attack. Meanwhile the criminal gangs will be fortified with a surge in revenue and a massive harvest of compromised addresses and other data to mine for future attacks.

It is hard to defend against so many unknowns and so many types of attack. Something must be done – something radical and not just more of the same. What might artificial intelligence (AI) and machine learning (ML) have to offer, especially when it is designed to be orchestrated and act along with the network?

The promise of AI and ML
Watch a martial arts demonstration and see that we humans have evolved a brilliant capacity for recognizing and responding at high speed to threats from any direction. With two hands, we can even do quite well against threats from two directions at once. But attack us from three or more directions at once, and our ability to survive falls off dramatically as the number of threats increases.

Cybercrime can attack from any number of directions: phishing e-mails, deepfake personalized messages and campaigns, malware in the network, fake accounts, denial of service attacks, infected websites and more. What’s even more, these attacks are rapid-fire: a University of Maryland study noted an average of 2,224 attacks per day on their Internet-connected computers – a near-constant rate of an attack every 39 seconds.

But speeds like that are nothing to an AI system that can react at thousands or millions of times per second. No AI can yet match the subtlety and perception of the finest human intuition, but machine learning is steadily narrowing even that gap. A massive historic ML database can mine information about every malware that's been detected until this date. Legacy malware can be immediately detected and, when presented with a new type of malware – whether a tweaked variant of old malware, or an entirely new variety – the AI can check it against the database, examine the code and block the attack in a fraction of a second. Because of the AI’s scanning speed, this can even happen when the malicious code has been concealed amongst a mass of benign or useless code – another common trick.

Another problem is a thief’s ability to learn the victim’s patterns of behavior in order to pick a weak point or time in the defense. ML too can track users’ activities daily and create a model of typical behavior. By analyzing this information, AI can not only warn of potential weakness but also note anomalous activity and react accordingly. AI learns to assess the relevance and consequences of a change of behavior, and to develop a proportionate response in real time without needing to over-react by closing down the whole network.

How to support sophisticated AI
AI has been under development for decades, so why are these capabilities not already widely deployed?

The answer is that ML needs massive volumes of data in order to detect relevant patterns, and even the most advanced Computer Processing Units (CPUs) were not up to such tasks. In recent years, however, Graphics Processing Units (GPUs) have been added to the data center to greatly accelerate the learning process. GPUs – originally created to manage sophisticated 3-D graphics for video games – turn out to be far superior at addressing complex problems.

Even more significant has been the very recent addition of Data Processing Units (DPUs) to the network. These lift from the CPUs most of the burden of managing an increasingly complex network, freeing up the ability to compute. They also greatly increase the efficiency and responsiveness of the data center to enable the sort of power needed to support sufficiently sophisticated AI and ML This works, and is already being used to provide upgraded cyber defense for the world’s most sophisticated secure systems.

How relevant are these sophisticated solutions to the average medium to large enterprise currently threatened from cyberattacks? The news is good. Whereas these techniques have been developed and proven in the most sophisticated hyperscale data centers, the components needed – GPUs and DPUs – are relatively inexpensive and can even to be added to enhance existing networks. They have deliberately been designed as “open systems” in the sense that they are compatible with the most prevalent networking hardware and operating systems – without locking the network into any one supplier.

Conclusion
The combination of AI and ML offers business and public services a powerful new weapon in the war against cybercrime. Although we can be sure that criminals are already looking for ways to circumvent it, this time they are up against an intelligent, learning, and very fast-acting opponent.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3