You must Register or Sign in to your Cyware account to perform this action
×Once you are logged in, you will be able to:
Customize your feeds by selecting categories you like
Comment on or Like an article
Receive the latest security stories, trends, and insights in your inbox
Build your profile and login across multiple devices
Bookmark a story and read it later
- Home
- Hacker News
- Innovation and Research
- Researchers Working on New Cybersecurity Method Inspired by the Human Body

Researchers Working on New Cybersecurity Method Inspired by the Human Body
Researchers Working on New Cybersecurity Method Inspired by the Human Body- October 7, 2019
- |
- Innovation and Research
/https://cystory-images.s3.amazonaws.com/shutterstock_439385911.jpg)
- Researchers are developing a new cybersecurity method that draws inspiration from the human body.
- Using machine learning, the system would be taught to recognize various cyber threats and trigger appropriate responses.
The big picture
Researchers at the University of Arizona are working on a new cybersecurity method that can detect threats in the early stages.
- Inspired by the human body, the cybersecurity method would respond to dangerous threats similar to the immune system that pulls the hand away on touching a hot object.
- The researchers plan on using machine-learning techniques to teach computers to recognize cyber threats faster.
“Once you put your hand down on that stove, you know not to touch it again, because it’s hot. But how can you be prepared to recognize other dangers, like putting your hand in a toaster? This is where machine learning comes in,” said Gregory Ditzler, co-investigator and assistant professor of electrical and computer engineering.
Going into the details
Machine learning is a form of artificial intelligence that makes the computers capable of learning and recognizing patterns.
- The research team will expose the computer to a number of cybersecurity threats to enable the computer to recognize them.
- Creating a playbook of defense measures is also on the researchers’ agenda. This will help the system respond appropriately to various threats.
- Traditional cyberdefense measures involve reaction strategies after the damage has been done.
- With bad actors constantly polishing their methods, this is a step to train computers to predict an attack before it happens by detecting changes in the environment.
“An attacker can reach hundreds of thousands of devices in a fraction of a second, so we need our ability to detect threats and protect a system to work just as quickly,’’ said Salim Hariri, UA electrical and computer engineering professor and the principal investigator of the project.
- + Aware
Get such articles in your inbox
News
-
Previous News APT Groups Are Exploiting Vulnerabilities in Enterprise VPN Products, the UK NCSC Warns
- October 7, 2019
- |
- Malware and Vulnerabilities
-
Next News New DNS Transport Protocols will Complicate DNS Monitoring, Dutch NCSC Says
- October 7, 2019
- |
- New Cyber Technologies
Popular News
Related News
-
The State of cybersecurity in the pharmaceutical industry
- November 25, 2019
- |
- Threat Intel & Info Sharing
Categories
Get such articles in your inbox
News
-
Previous News APT Groups Are Exploiting Vulnerabilities in Enterprise VPN Products, the UK NCSC Warns
- October 7, 2019
- |
- Malware and Vulnerabilities
-
Next News New DNS Transport Protocols will Complicate DNS Monitoring, Dutch NCSC Says
- October 7, 2019
- |
- New Cyber Technologies
Popular News
Related News
-
The State of cybersecurity in the pharmaceutical industry
- November 25, 2019
- |
- Threat Intel & Info Sharing
Categories
