">
TechMoran
  • Advertise
  • Deals
  • Jobs
  • TV
  • Pitch Your Startup
Wednesday, December 11, 2019
  • Startups
  • Reviews
  • Insider
  • Business
  • Women
  • Blockchain
  • MENA
  • Obituaries
  • Guest Posts
No Result
View All Result
TechMoran
">
Home Tech

How hackers are Leveraging Machine Learning

Milcah Lukhanyu by Milcah Lukhanyu
1 year ago
in Tech
8 min read
0
">

Cybercriminals are continuously looking for new hacking strategies. One of the best ways to avoid the rising tide of cyber threats relies on the awareness and deep understanding of the trending technologies. The advancement in technology brings the revolutionary changes with the introduction of machine learning, artificial intelligence and other analytical approaches in enhancing malicious activities of hackers. Few ML enabled suspicious activities involves:

Malware Creation:

Hackers write thousands of line of scripts manually to develop a trojan, scrapers or viruses for their distribution and execution over the network. The only question arises is that what will happen if they pace up malware creation process with the leverage of automation with machine learning. In the year 2015, a total of 230,000 new malware script samples were collected daily, which is a huge figure. What if machine learning filled the gap between development and execution of such scripts, the picture will rise exponentially. In the year 2017,  research published from Cornell University revealed the algorithm to bypass machine learning based detection systems. The method uses the generative adversarial network (GAN) implemented programs to generate the adversarial malware samples for the attack.

Hackers are focused towards staying as long as they can hide in the victim’s system. Machine learning provides a path to flew away without getting identified under the radar. Security professional suggests that machine learning holds the capability to modify the malware samples codes by detecting flaws from previous codes. This way the newly modified malware will not fall under the security surveillance of the victims.

Smart Botnets:

READ  healthymagination Programme Welcomes 2nd Cohort of Social Entrepreneurs

It’s believed that soon machines will be capable of talking to each other for performing actions. These expert systems will take decisions smartly without following any instructional command from the botnet header. In the past few years, the development of predictive analytics based software system with advanced tools using swarm technology analyses billions of data to present accurate outcomes. Recent studies conducted by Fortinet cyber threat researcher shows that the smart botnets are used to perform repeated attacks on the vulnerability found in Apache Struts framework causing the Equifax hack. Hackers picked automated and intelligent decisions to break the vulnerabilities in a system.

">

As concluded from the above explanations, hivenets are growing drastically, expanding their ability to attack various users and hinder response. Swarm technology enables hivenets with self-learning capability from past behaviour.

Related posts

Instagram Announces New Safety Updates for A safer Online Community

December 10, 2019
0

Build Better Customer Relationships with Personalized Sales Proposals

December 10, 2019
0

The Fundamentals of Inbound Marketing for Startups

December 10, 2019
0

Social Challenges Posed by Autonomous Robotics

December 10, 2019
0

Strengthening Brute Force Technique:

The brute force technique used by hackers guesses for the victim’s password. Machine learning can also be used to enhance the brute force algorithm. The neural network’s ability to generate texts from trained texts can widely applicable in such scenarios. Researchers from MIT followed the same approach for generating a password and collected satisfying results. Apart from academics, this idea is promising for the cyber attackers too, as a recent report collected by 4IQ suggested for the existence of around 1.4 billion passwords database on the dark web from all cyber attacks.

Voice Falsification:

READ  Nokia Refuses to Die | Set to Launch New Device Today

Use of AI can be widely seen in voice or face recognition, assistance etc., these days few companies are creating fake voice samples and videos which can mimic the voice of any person. As we know most of the companies are working hard on the technology to achieve the maximised security with biometric authentication techniques, but at the same time, intruders are also busy in generating fake audios to penetrate the security systems.

Machine learning avails various platforms to create automated applications such as voice recognition, assistance, chat-bots etc., over the internet. One can enrol in Machine Learning Course to build their career in trending AI technology and walk with the knowledge of its practical implementation in various fields for simplifying the process.

 

 

 

 

 

 

 

 

 

 

Reads 1,448

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)
Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Tech

Instagram Announces New Safety Updates for A safer Online Community

December 10, 2019
0
Tech

Build Better Customer Relationships with Personalized Sales Proposals

December 10, 2019
0
Tech

The Fundamentals of Inbound Marketing for Startups

December 10, 2019
0
Tech

Social Challenges Posed by Autonomous Robotics

December 10, 2019
0
Tech

An optimal approach to WAN latency: Cloud-based SD-WAN

December 10, 2019
0
Tech

How Just One Click Recovers Millions with VATBox Direct

December 10, 2019
0

Free Coupon Codes

Recent Posts

Instagram Announces New Safety Updates for A safer Online Community

December 10, 2019

GetMyBoat, an Uber for Boats Expands To Kenya Targeting The Growing Marine Based Tourism

December 10, 2019

Snatch Cybercriminals are rebooting PCs into Safe Mode to bypass behavioral protections

December 10, 2019

Build Better Customer Relationships with Personalized Sales Proposals

December 10, 2019

The Fundamentals of Inbound Marketing for Startups

December 10, 2019
">

Hours & Info

Bishop Magua Plaza, Opposite Uchumi Hyper, Ngong Road, Nairobi, Kenya
+254-722-156-552
[email protected]
Lunch: 11am - 2pm
Dinner: M-Th 5pm - 11pm, Fri-Sat:5pm - 1am
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
No Result
View All Result
  • Startups
  • Reviews
  • Insider
  • Business
  • Women
  • Blockchain
  • MENA
  • Obituaries
  • Guest Posts

© 2019 Moran Media Group - All rights reserved Techmoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.