Bayesian networks, machine learning and rules-based systems individually don't work well. They don’t produce good results, don’t scale or are too hard to work with. Credit: Thinkstock Digital technologies have changed the face of business and government, and they will continue to do so at an even faster pace. They drive innovation, boost productivity, improve communications and generate competitive advantage, among other benefits.The dark side of this digital revolution has now come clearly into focus as well: McKinsey estimates that cyber attacks will cost the global economy $3 trillion in lost productivity and growth by 2020, while theft, sabotage and other damage inflicted by trusted insider personnel continue to cost organizations in lost revenues, revealed secrets and damaged reputations.+ Read Part 2: How to combine security analytics approaches to create a solution that works +We read in articles and white papers that “security analytics” is the solution, the Next Big Thing that will spare beleaguered organizations the reputational, financial and physical costs of all kinds of threats. But the reality is today’s security products are broken. The threats continue to morph and multiply. The attackers continue to outmaneuver or overwhelm the defenders. And the underlying doctrines and policies are far behind the times.3 security analytics approaches that aren’t as good as you thinkThree widely deployed analytical approaches are often held up as shining exemplars in the brave new world of security analytics: Bayesian networks, machine learning and rules-based systems. Unfortunately, I see plenty of implementations where they simply don’t produce good results, don’t scale or are too hard to work with. Here’s a quick summary of the approaches. 1. Bayesian networksBayesian probability theory states that it’s possible to predict with surprising accuracy the likelihood of something happening (or not happening) in a transparent and analytically defensible way. A Bayesian inference network, or model, captures every element of a problem and calculates possible outcomes mathematically. The harder the problem, the better it works—at least in theory.In reality, a typical approach is to gather a roomful of PhDs and spend a lot of time and money building a Bayesian network. Then, with even greater effort and more man-hours, the Bayesian network is turned into software by a roomful of coders. The resulting product is something the user struggles even to understand, let alone use. Not surprisingly, there’s an emerging camp that claims Bayesian networks are old fashioned and not suited to solving today’s security challenges—especially now that machine learning is available.2. Machine learningIn Arthur Samuel’s classic definition, machine learning “gives computers the ability to learn without being explicitly programmed.” It can, for example, be used to uncover hidden insights from historical relationships and trends found in data.While that may have excited early adherents, we’ve had over 50 years to discover some of its limitations:There are no real, generalizable approaches to machine learning.Correlation isn’t all it’s cracked up to be in a world of black-swan scenarios and asymmetric threats.Machine learning is dependent on data and thus is unable to offer solutions in cases where data is scarce or non-existent.Most machine-learning solutions come “black boxed,” and users who have to make and defend their critical decisions hate that.Hasn’t science taught us to start with a hypothesis? There’s no such luxury with machine learning.3. Rules-based systemsRules-based systems use “if-then” rules to derive actions. For example, if the fact that “Sally is 22 and unemployed” is matched to the rule “If a person is between 18 and 65 and is unemployed, they can claim unemployment,” the system would conclude that “Sally can claim unemployment.”While much simpler (and more common) than Bayesian networks and machine learning, rules-based systems nevertheless have their own inherent drawbacks. Because they’re typically binary, the outputs tend to be too coarse-grained for the often subtle threats they’re trying to detect and identify.This leads to a proliferation of red flags (many of them false positives), which then leads to a proliferation of pricey analysts. Try instead to create rules for special cases, and you get a proliferation of rules. Paralysis reigns, and the world is still not safer. A better way forwardBayesian networks, machine learning and rules-based systems are applied successfully in many software systems across many domains. Google, for example, uses machine learning to recognize objects within an image and automatically create captions for them. So, clearly the techniques themselves are sound.But they don’t typically work for security analytics, and that’s primarily because each technique’s weaknesses have yet to be resolved appropriately for that kind of application. Despite the limitations I describe above, each of these techniques offers unique strengths that would need to be present in an ideal security analytics solution:Bayesian networks: Domain conceptual alignment and ability to reason on incomplete dataMachine learning: Sheer power and ability to cope with massive quantities of dataRules-based systems: Intuitive simplicity and ease of getting started quicklyWhat’s needed is a solution that exploits the combined strengths of these approaches while also compensating for or eliminating their individual drawbacks. In part 2 of this series, I will outline how these systems could—and should—be thoughtfully built, combined and applied to serve those who defend our security. Related content opinion Is the 'right to explanation' in Europe’s GDPR a game-changer for security analytics? Making major adjustments in the types of software solutions they use to analyze personal data in the wake of the General Data Protection Regulation (GDPR). By Bryan Ware Jan 29, 2018 5 mins Regulation Privacy Analytics opinion Why Bayesian models excel at finding rogue insiders One case often looks very different from the next, and it is precisely this complexity and behavioral variability that makes finding insider threats so tricky. By Bryan Ware Nov 20, 2017 5 mins Technology Industry Cybercrime Data and Information Security opinion User behavior analytics: separating hype from reality UBA has already produced successes against some of the security community’s toughest challenges, and will continue to evolve as time goes by. By Bryan Ware Sep 26, 2017 5 mins DLP Software Big Data Data and Information Security opinion Why we need more shades of gray Security challenges we face now and in the future will rely on actionable intelligence that is to be found mostly in the gray areas. By Bryan Ware May 24, 2017 5 mins Big Data Network Security Analytics Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe