{"id":14203,"date":"2024-07-02T14:45:10","date_gmt":"2024-07-02T14:45:10","guid":{"rendered":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/?page_id=14203"},"modified":"2024-07-02T14:45:10","modified_gmt":"2024-07-02T14:45:10","slug":"ai-fighting-fire-with-fire","status":"publish","type":"page","link":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/ai-fighting-fire-with-fire\/","title":{"rendered":"Fighting Fire with Fire"},"content":{"rendered":"<div id=\"pl-14203\"  class=\"panel-layout\" ><div id=\"pg-14203-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-14203-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-14203-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-14204 size-medium\" src=\"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-content\/uploads\/2024\/07\/AI-inside6-294x300.jpg\" alt=\"\" width=\"294\" height=\"300\" srcset=\"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-content\/uploads\/2024\/07\/AI-inside6-294x300.jpg 294w, https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-content\/uploads\/2024\/07\/AI-inside6.jpg 600w\" sizes=\"auto, (max-width: 294px) 100vw, 294px\" \/>Xudong Zhang, assistant professor of computer science, has explored how to apply AI models to cybersecurity. Typically a company or organization uses firewalls or intrusion detection systems that rely on a predefined pattern \u2013 a signature \u2013 that alerts them to potential criminal activity. But as attack techniques evolve to include AI, those systems may not be as effective.<\/p>\n<p>For instance, AI could be used to automate aspects of an attack, such as creating phishing emails, developing malware or spam that can evade traditional defenses, or finding and quickly exploiting weaknesses in a system, Zhang says.<\/p>\n<p>But AI can also be deployed to fight these more sophisticated attacks.\u00a0 By training AI models to know what normal behavior looks like, cybersecurity experts can use AI algorithms to monitor network traffic, user behavior and system activity to detect any anomalies. The more the models learn about what an AI-generated attack looks like, and the patterns associated with it, the better security systems will be at responding to threats in real time, Zhang says.<\/p>\n<p>The only issue is having a powerful enough machine that can process all the data needed to train the AI model, something likely not too far off. \u201cWhen you create an AI model, it\u2019s like a baby, and the parents teach the baby,\u201d he says. \u201cIf we train this model with a large amount of data, then this model will be very powerful.\u201d<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Xudong Zhang, assistant professor of computer science, has explored how to apply AI models to cybersecurity. Typically a company or organization uses firewalls or intrusion detection systems that rely on a predefined pattern \u2013 a signature \u2013 that alerts them to potential criminal activity. But as attack techniques evolve to include AI, those systems may [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-14203","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-json\/wp\/v2\/pages\/14203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-json\/wp\/v2\/comments?post=14203"}],"version-history":[{"count":0,"href":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-json\/wp\/v2\/pages\/14203\/revisions"}],"wp:attachment":[{"href":"https:\/\/up.uscupstate.edu\/archive\/fall2024\/wp-json\/wp\/v2\/media?parent=14203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}