With advances in artificial intelligence, security doesn’t have to come at the cost of privacy. Credit: Thinkstock According to Google, over seventy-five percent of requests to its servers are encrypted and Mozilla reports that over 55 percent of the web pages loaded by its browser are encrypted. Either way you slice it, the majority of internet traffic is encrypted.Internet traffic encryption has consistently been increasing, especially as video streaming providers turned on encryption. Data breaches are at an all-time high, internet eavesdropping by governments and criminals is widespread, and failure to protect sensitive information can cause irreparable damage.Cybersecurity leaders have worked hard to secure mobile devices and cloud access. Now enter wearables, environmental sensors, surveillance cameras, location beacons and the rest of the internet-of-things (IoT). From the very start of IoT, security researchers have sounded the alarm, but the parade of embarrassing security events marches on, including the Mirai botnet last October.To decrypt or not to decrypt, that is the questionAs websites and applications encrypt more traffic to preserve data privacy, the reaction of some part of the infosec community is to attempt to decrypt internet-bound traffic in order to inspect it for inbound malware, outbound command & control or data leakage. But the increased proliferation of different kinds of encryption protocols is making pervasive decryption more and more difficult. Many organizations do still attempt to terminate and decrypt internet-bound HTTPS traffic by using forward proxies to “man-in-the-middle” the connections. But the use of strong encryption – including longer keys, hardware-based crypto and biometrics – compounds the challenge of decrypting traffic in a manner that does not impact user experience by adding delays or requiring large investment in decryption capacity.Meanwhile, several major online services and many mobile applications use certificate pinning to prevent man-in-the-middle attacks. Certificate pinning encodes specific root certificates into the application instead of trusting the device’s built-in (and extensible) list of trusted root certificates. Attackers’ attempts to insert themselves between the client and server are thwarted, but so are organizations’ forward proxies. Separately, there has been a longstanding argument by members of law enforcement communities that the “good guys” should be given some form of an encryption backdoor which would allow them to break the crypto through the use of a master key. However, adding master key capability to a crypto algorithm inherently weakens it and makes it easier to find and crack keys. And given the historical failure of governments to protect data – including important keys – there is great skepticism about how long any government-level master key would remain secret.Meanwhile, attackers use the presence of lots of benign encrypted traffic to blend in and obfuscate their communications to the internet.Artificial intelligence can read between the linesAdvances in artificial intelligence (AI) are fueling the next generation of threat detection products. Using underlying AI technologies like machine learning, data science and deep learning to identify and stop threats automatically reduces the need for increasingly ineffective measures like deep packet inspection, sandboxing and content analysis to identify hidden threats.Different applications and processes have unique communication patterns, and attacker traffic often looks very different from user traffic regardless of whether it is encrypted or not. The timing and duration of communications, packet sizes and gaps between packets are telling. Instead of prying off the lid and looking inside the encrypted stream, sophisticated math is used to find signals that indicate a threat.While signatures can only key off the setup of the encrypted exchange, deep learning can be used to train up a neural network based on the time series of the communication and can then calculate the likelihood of any communication being a command and control channel.Artificial intelligence also gives a threat detection system the brains to learn and put its discoveries in context, so it can pinpoint threats that pose the greatest risk to individual organizations. Time to learnReaching this level of artificial intelligence requires both supervised and unsupervised machine learning.With supervised machine learning, data scientists analyze massive volumes of previously categorized network traffic samples to identify distinguishing features that are common to attacker behaviors.A threat detection platform can, for example, recognize command-and-control communications that are pulling instructions from command and control infrastructure it’s never seen before – even if the IP address and domain are trusted and have a high reputation. Unsupervised machine learning focuses on finding outliers in unlabeled data and can also derive a baseline against which to judge future traffic. Given its noisy nature – it will show you what’s different rather than what’s bad – it should be used judiciously in areas judged to be of high value to attackers.Threat detection with a brainWith data science and machine learning at the core of next-generation threat detection, organizations can detect and stop threats that have never been seen before – even if the traffic is encrypted.Organizations no longer have to choose between keeping their data private with encryption and weakening their defenses by allowing attackers to hide amid their benign traffic. Related content opinion Data science in service of detection vs. investigation Cybersecurity firms often tout the use of data science, machine learning and artificial intelligence in their products. But there are consequential distinctions when you apply these techniques to specific cybersecurity use cases. By Oliver Tavakoli Jul 19, 2018 5 mins Technology Industry Data Science Data and Information Security opinion 6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference The most effective way for divining the current state of enterprise cybersecurity practices is to talk to a number of CISOs representing different industries and to distill those conversations into an overall model. By Oliver Tavakoli May 08, 2018 5 mins Technology Industry IT Governance Data and Information Security opinion Sometimes encryption can actually make you less secure In an age where advanced analytics to detect a sophisticated attack is often the only chance of heading off substantial harm, encrypting SMB is akin to taking one step forward and 50 steps back. By Oliver Tavakoli Mar 05, 2018 5 mins Technology Industry Encryption Data and Information Security opinion Anatomy of a well-run red-team exercise Red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack. By Oliver Tavakoli Jan 22, 2018 4 mins Data and Information Security Network Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe