Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

read, and submit a review. The review should be about 300 words (a full page doc

ID: 3905752 • Letter: R

Question

read, and submit a review.

The review should be about 300 words (a full page document). Please organize and elaborate your points. If you feel you need more than 300 words - you are free to do so (but make sure your points are not off-tangent). You will not get extra points for writing a mini-novel. Your grade is based on how well you synthesize the points in the article (including how you express your opinion, thoughts or understanding).

This dropbox utilizes an originality checker that will detect copied text. In your review, briefly summarize the article, provide things that you learned from the article, and then explain how the article might help you in your cyber security career. Since quality written communication skills are required in all cyber-related vocations, spelling and grammar will be graded in this assignment. Please insure that your review is written according to the highest grammatical standards.

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

Beginning in the 1950s, artificial intelligence (AI) was used as an umbrella term for all methods and disciples that result in any form of intelligence exhibited by machines. Today, nearly all software in every industry – especially in security – use at least some form of AI, even if it is limited to basic manually coded procedures. ESG research found that 12 percent of enterprise organizations have already deployed AI-based security analytics extensively, and 27 percent have deployed AI-based security analytics on a limited basis. It is expected that these implementation trends will only gain momentum in 2018.

During the past few years, the major subsets of AI – machine learning and deep learning – have progressed, transforming nearly every field they touch. Nowadays the terms “artificial intelligence, “machine learning,” and “deep learning” are used widely, however differentiating between the three, and knowing which is best for your business goals, can be confusing. To fully understand each term and what they mean, it’s worth taking a look at each subfield’s advantages and limitations.

The Challenges of Machine Learning

For the last 25 years, machine learning was the leading sub-field within AI. The technology allows computers to learn without being explicitly programmed and in the 2000s, machine learning methods completely dominated AI by outperforming all non-machine, learning based results.

Despite its success, the technology comes with obstacles, especially when applied to security. One of the major limitations of traditional machine learning is its reliance on feature extraction, a process through which human experts dictate what the important features (i.e., properties) of each problem are. This means that in order for a machine learning solution to recognize a malware, experts need to manually program the various features that are associated with a malware. For the cybersecurity field in particular, this means that solutions are limited in detecting unknown attacks. Due to the need for humans to define specific features, the features of attacks that haven’t been revealed yet still need to be analyzed, leaving them unable to be detected.

However, this reliance on human involvement introduces one of the biggest challenges of machine learning – the potential for human error. Given feature engineering requires a human domain expert to define features – features can often be overlooked. In thinking about the example of the malware given above, if during programming certain characteristics are omitted, the system breaks down. In order for a machine learning system to be accurate, human domain experts must be methodological in defining features, and continuing to define them. This is because machine learning is a linear based model, meaning the features selected by a human domain expert can only lean on simple linear properties. Given these confines, companies have been shifting to deep neural networks (DNN) to better secure their infrastructures and prepare for impending attacks.

Deep Learning Evolves

Deep Learning, also known as deep neural network, is a sub-field of machine learning, and takes inspiration from how our brains work.The big conceptual difference between deep learning and traditional machine learning is that deep learning is capable of training directly on raw data without the need for feature extraction. For example, when applying machine learning to face recognition, the raw pixels in the image cannot be fed into the machine learning module, but instead they must first be converted into features such as distance between pupils, proportions of the face, texture, color, etc. On the other hand, deep learning is capable of training directly on the raw data without any need for feature extraction.Additionally, deep learning scales to hundreds of millions of training samples, and continuously improves as the training dataset becomes larger and larger.

Over the past few years, deep learning has reached a 20-30 percent improvement in most benchmarks of computer vision, speech recognition, and text understanding – the greatest leap in performance in the history of AI and computer science. This is in part due to deep learning’s ability to detect non-linear correlations between data that are too complex for humans to define. Unlike traditional machine learning, deep learning supports any and new file types and has the ability to detect unknown attacks, a huge benefit to cybersecurity.

While these advantages surpass those of machine learning based solutions, deep learning does face some challenges. Researchers work with a very large data sample of millions of files to train the neural network and are dealing with highly complex algorithms. In many cases, deep learning is an “art” that relies on scientist’sexperience and knowhow, and unfortunately there is a scarcity of experts available.

The Impact of Deep Learning on Security

Deep learning has been implemented across a variety of industries making a big impact, especially in cybersecurity. The biggest malware attacks of 2017 – think WannaCry, NotPetya, DDoS incidents – made companies rethink their security strategies and reactive approach to future attacks. Throughout the cybersecurity industry, there is an ongoing need to respond to cyberattacks in real-time with minimal human interaction. As a result, organizations are turning to deep learning-based solutions due to the fact that eliminates human interaction.

Deep Learning’s ability to prevent new, never before seen malware in real-time without any human involvement, all while maintaining low false positive alerts, is a huge benefit to securing enpoint, mobile devices, data and infrastructures. After the malware is prevented, deep learning technology helps companies understand what kind of malware it is i.e. ransomware, backdoor or spyware to take further security actions needed. In most cases this takes experts to properly analyze the information, however deep learning software identifies and analyzes the data automatically, without any need for human involvement.

Similarly, the technology can be leveraged to determine where a specific attack originated from. In the past, this has been a difficult task for IT and Security teams to do for a variety of reasons. For example, each nation-state has usually more than one cyber unit that develops such advanced malware, rendering traditional authorship attribution algorithms useless. In addition, APT’s use state-of-the-art evasion techniques. However, DNN has the ability to learn high level feature abstractions of the APTs itself.

It will be exciting to observe deep learning’s continued success in security throughout 2018, and it won’t stop there. Beyond security, deep learning is revolutionizing many other industries, from climate mapping to combatting aging and disease – the implications of the technology are far reaching.

Explanation / Answer

Review:

Here the author clearly explains about the concepts involving inside the Artificial intelligence. This AI includes machine learning techniques and deep learning process. These are the two big pillars that are supporting the Artificial intelligence at a greater height.

The aim of the artificial intelligence is making no human involvement in the work they are like to do. So they are teaching the machine to learn as the MNC’s trying to teach the fresher’s in the starting stage. By large set of algorithms and training data set using patterns the machine learning is carried out.

In machine learning the one barrier which is challenging the people is the feature extraction of the issue reported. This is nothing but the properties of the issue for example considering it in the security department it is tougher to recognize by the machine, what actually the attack is?;

So, it needs some human interaction to identify the cause and then precede it with the machine learning.

Nowadays there is numerous antivirus attacks happening in the technological world. So the industries are planning to do artificial intelligence in building barrier for the external attacks. This is nowadays a big challenge for the software engineers.

The Deep learning concept is very much helpful in preventing the unknown malwares from attacking our base source. It largely helps the experts in analysing what type of malware actually it is .So that makes easier for people to get the solution in very less time and can able to build barrier accordingly. Any how the deep learning is trying to limit the human interaction in defect identification.

As this field is rapidly growing in a higher pace it finds application in many areas like medical especially.

It is very clear the matter that is going to rule the tech world is none other than artificial intelligence together with the machine learning and deep learning.

If the above solution is helpful to you in any way please rate it Or if you have any concerns please comment it, I will help you through