This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Symbolic image of artificial intelligence
  • Technical contribution
  • Artificial intelligence (AI)

The key to AI-supported cyber data resilience

Advances in artificial intelligence (AI) are causing many companies to change their business models. For example, they want to use real-time data to gain predictive insights and facilitate decision-making. However, companies need a modern strategy for managing and protecting their data that addresses the complexity of IT environments and enables efficient processes. The security and availability of data must be taken into account as well as the increasing threats posed by AI-supported cyber attacks.

Artificial intelligence (AI) is undoubtedly the most important trend in IT at the moment, and it has also long been used in IT security in many areas. Unfortunately, it is also being used by cyber criminals.As is so often the case, they are the pioneers of new technologies and immediately began using the newly available LLMs (Large Language Models), such as ChatGPT, for their own purposes last year.Thanks to these, cyber criminals can now generate even more attacks, which are becoming even more sophisticated and targeted thanks to AI. The criminals' AI-controlled tools can write complex code for malware and exploits very quickly and efficiently.

As always a little later, AI is now also being used on the defence side to keep pace with the new threats. Numerous defence solutions already rely on AI-supported behavioural analyses or anomaly detection. Considering the high number and quality of new AI-supported attacks, security managers clearly have no choice but to counter them with AI tools.These include solutions for model monitoring, data and content anomaly detection and AI data analysis.

The majority of companies are not yet ready for AI

Although there is already a strong focus on AI on end devices, 92 per cent of PCs have insufficient RAM capacity to support enterprise and commercial applications. Companies that want to utilise the benefits of AI would therefore actually have to renew their entire device fleet. This realisation is reflected, for example, by market research institutes such as IDC, which forecast an increase from 50 million to 167 million new PCs by 2027. This presents companies with the additional challenge of protecting the new computers against cyber threats and bringing them into line with internal and external security guidelines - also against the backdrop of software installations becoming more complex and cyber threats with artificial intelligence becoming more dangerous.

How does AI work in cyber security?

AI systems in cyber security use machine learning and data analysis to identify suspicious activity. These systems are trained to analyse behavioural patterns within large amounts of data and detect anomalies that could indicate potential cyber threats. A key element of this is an anomaly detection model that distinguishes normal network activity from potentially malicious activity.

By continuously analysing data traffic and user behaviour, AI systems can identify unusual patterns that indicate a cyberattack. For example, a sudden increase in traffic to a particular server resource could be an indicator of a DDoS (Distributed Denial of Service) attack. Similarly, recognising unusual login attempts from geographically distant regions could indicate brute force attacks or credential stuffing.

Another important aspect is the machine learning method, which enables AI systems to learn from new data and interactions. This allows them to continuously adapt to the ever-changing strategies of cybercriminals. For example, by analysing new types of malware, you can learn to better recognise future variations.

In addition, many AI systems in cybersecurity use deep learning to recognise complex patterns in data that may not be obvious to human analysts. This includes analysing network logs, system logs and endpoint activity to detect cyberattacks.

After all, the ability to self-improve is a decisive advantage of AI in cyber security. With every recognised attack and every interaction, these systems become smarter and more effective. They develop a deeper understanding of the changing methods of cybercriminals and can therefore react proactively to threats before they cause serious damage.

Guest article by our content partner "Der Marktplatz IT-Sicherheit"

Written by Dunja Koelwel

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.