Page 124 - Cyber Defense eMagazine January 2024
P. 124

Privileged  Access  Analytics  (PAA)  is now  one of  the most  valued  capabilities  in our entire  portfolio—
            because we started with a more precise problem statement.



            Collect the right data

            No AI model can be better than the data it's trained and operates on. The PAA models referenced could
            not  operate  without  knowledge  of every  Kerberos  transaction  and/or  Azure  AD  action  in  the relevant
            domain.  That  data  trains  its  view  of  privilege  and  relationships,  as  well  as  gives  the  right  insight  to
            evaluate  account  usage in real-time  for detection.  Similarly,  reliably  identifying  network  command  and
            control requires  very granular time-series  data on packet flow, along  with a massive  corpus of labeled
            data for both bad and good traffic.

            It may be tempting to use the data that’s most readily available. For networks, that may be flow or firewall
            logs rather than detailed network metadata. But if you take shortcuts like that, it will dramatically  impact
            the value delivered.



            Choose the best AI approach for each problem

            You have the right problem statement and the right data; now it’s time to select an AI approach tailored
            to  the  problem  you’re  trying  to  solve.  There  are  a  plethora  of  machine  learning  (ML)  techniques
            available—from  neural networks  and deep learning,  to K-means  clustering,  novelties,  and (the current
            rage) transformer and large language models

            As the “No free lunch” theorem dictates, just as with the data, there are no shortcuts to success when it
            comes  to working with  AI algorithms.  Data scientists  and machine  learning  engineers  (MLEs)  need to
            understand  the  data  they’re  working  with  and  the  problem  at  hand  in  order  to  select  a  specialized
            algorithm  that  will  achieve  the  desired  results—and  general-purpose  algorithms  won’t  cut  it.  In  fact,
            choosing the wrong algorithm may give results that aren’t just suboptimal, but flat-out wrong.

            Oh, and if you think that LLMs/transformers make this theorem obsolete, you’d be wrong: we’ve evaluated
            state of the art for detection use cases and found that they underperform specialized models today. LLMs
            are good at predicting what’s next (e.g. how many bytes will be in the next packet), but not so good at
            categorizing things (e.g. is this connection malicious or benign).



            Run at speed and scale (and cost-effectively!)

            Cyberattacks happen fast. This is especially true in the cloud, but even in-network, ransomware  attacks
            can occur seemingly in the blink of an eye. Every minute counts for defenders.  According to one study,
            the vast majority of organizations—90  percent—can’t detect, contain, and resolve cyber threats within an
            hour.








            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          124
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   119   120   121   122   123   124   125   126   127   128   129