Topics In Demand
Notification
New

No notification found.

AI vs AI - AI Antidote Counters AI-assisted Ransomware Attacks
AI vs AI - AI Antidote Counters AI-assisted Ransomware Attacks

October 19, 2021

103

0

It is a battle of wits between the rogue AI and AI-powered security system. Data scientists will launch the counter-stealth as cybercriminals resort to stealth and secrecy in deceiving security systems. If the rogue AI assisted Ransomware can trick the AI-powered security system, it can push an organization to face the diabolical plot called ransom note.

If an organization wants to guard against the looming threat of AI-powered malware and ransomware, it has to use counter-intuitive AI with advanced detection capabilities. Like the artificial intelligence that learns continuously, cybercriminals learn and adapt to camouflage. AI-powered Deepfake Ransomware is one example of how cybercriminals learn to deceive and how extortion-based ransomware is evolving.

To destroy the devious plots of rogue-AI driven ransomware, it becomes critical to build the AI antidote – An antidote that grows in intelligence to thwart new and evolving ransomware attacks.

AI in Cybercriminal’s Hands

Research conducted by experts offer foresight into attacks spearheaded by a stealthy malware. For instance, a malware camouflaging as video conferencing software allows cybercriminals to find the right victim via voice or face recognition and roll out the attack.

The rogue AI powering the ransomware attack can create programs that facilitate the wait-and-watch game. In turn, it helps glean significant details about preferred communication protocols, patch update lifecycle, least protected times of systems – to get to grips with the computation environment. Cyber criminals also leverage AI to roll out ransomware attacks that excel in self-propagation over networks and systems. AI can also turn into a magic wand for cybercriminals to solve CAPTCHAs and hoodwink authentication. It can also be used to scan social media landscape to identify targets for spear phishing campaigns.

Stealth of the rogue AI is furthered via pre-determined features, as that of an Identity Management feature or an authentication feature using visual recognition or voice. This will be set as an AI trigger to deceive the security system and wage cyber-attacks.

Attack by Deceiving & Evading

For the Rogue AI to outsmart AI-powered security system, it must carry out attacks under the security radar. One way to deceive the AI security system is by finding a way through ‘data’. Data poisoning is an attempt to poison the training dataset of the AI security model and impair the functioning of the model. For instance, the rogue AI will aim to pollute the training data used for the Intrusion Detection System and trick the AI-powered security system into believing that a rogue attempt is a benign one.

Beyond tricking the AI security system, rogue model also evades detection. If a deep learning (DL) system augments the security system, the cybercriminal attempts to add disturbances to the original valid sample. The adversarial examples thus created can greatly tamper the output of DL models. Using this evasion attack, cybercriminals get closer to sidestepping the AI-assisted defense mechanisms.

What if the rogue AI fails to acquire those AI model parameters, which in some cases is a challenging one?

The hacker would query this AI model many times, use the results for training a substitute model. Once the substitute model is developed, it is used to create adversarial examples to trick the original AI model and roll out a black box attack.

Sabotage using Backdoor Entry

Subverting the original AI model happens via backdoors, or by creating and manipulating backdoors embedded to the original model. Say, a neural network model makes up for the original AI model; when an explicit neuron is added to this neural network model, backdoors are created to control responses when there is a specific input and to hoodwink its detection.

Cybercriminals can also resort to model extraction, that is to steal original AI models. Leveraging AIaaS APIs, the hacker initiates the attack to steal the model, use the training data to unearth parameters, and roll out the black box evasion attack.

It takes reassuring defences to provide protection against ransomware attacks, against evolving threats – Robust AI security system with resounding counter-measures, and that turns into a counter-intuitive system to mitigate potential ransomware attacks. In this case of building AI antidote, you need to use robust defense strategies to counter the rogue AI.

This blog was originally posted in saksoft.com


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


We enhance customer experience through digital transformation solutions. We help clients across the globe with Enterprise Applications with omni channel access and provide data driven insights with Augmented Analytics. We improve Speed, accuracy and predictability of the clients IT systems with Intelligent Automation. We help the customers access their information anywhere, any device with Enterprise Cloud Solutions. We are present in US,UK, Europe,India and Singapore with offices in 14 locations.

© Copyright nasscom. All Rights Reserved.