Hyderabad: While artificial intelligence (AI), is being extensively used for disruptions in technology, it is much harder to use for protecting technology. This is due to the nature of the prompts required, making it challenging to apply AI effectively in cybersecurity, cite experts.
They say designing and deploying AI for protection is complex because cybersecurity prompts must be carefully crafted to detect subtle, often obfuscated patterns in massive datasets. Unlike disruptive AI applications, where more generic prompts may suffice, defensive AI requires a deep understanding of the systems involved and the potential threats.
Prompts are foundation for using AI-based models in both disruptive and protective measures. While cybercriminals exploit vast amounts of mined data already available on dark web, the use of AI for disruptive practices is relatively easy. “For instance, attackers, through phishing or mined data, can pinpoint specific application vulnerabilities to exploit. However, when it comes to using AI for defense, firms can’t afford to provide exact data—this information could end up in the AI’s history, which attackers could later exploit. On the other hand, if firms provide slightly altered data, AI hallucinations come into play, leading to inaccurate predictions and undermining defensive efforts,” said expert, Prasad Patibandla.
“As attackers find even the smallest weaknesses, defenders must protect against an ever-expanding perimeter of vulnerabilities.However, there is a looming revolution in cybersecurity—the Cyber Dome—a next-generation digital shield similar to advanced missile defense systems, designed to protect an organization’s cyber landscape,” said Piyush Somani, CEO of ESDS Software Solution.
They say designing and deploying AI for protection is complex because cybersecurity prompts must be carefully crafted to detect subtle, often obfuscated patterns in massive datasets. Unlike disruptive AI applications, where more generic prompts may suffice, defensive AI requires a deep understanding of the systems involved and the potential threats.
Prompts are foundation for using AI-based models in both disruptive and protective measures. While cybercriminals exploit vast amounts of mined data already available on dark web, the use of AI for disruptive practices is relatively easy. “For instance, attackers, through phishing or mined data, can pinpoint specific application vulnerabilities to exploit. However, when it comes to using AI for defense, firms can’t afford to provide exact data—this information could end up in the AI’s history, which attackers could later exploit. On the other hand, if firms provide slightly altered data, AI hallucinations come into play, leading to inaccurate predictions and undermining defensive efforts,” said expert, Prasad Patibandla.
“As attackers find even the smallest weaknesses, defenders must protect against an ever-expanding perimeter of vulnerabilities.However, there is a looming revolution in cybersecurity—the Cyber Dome—a next-generation digital shield similar to advanced missile defense systems, designed to protect an organization’s cyber landscape,” said Piyush Somani, CEO of ESDS Software Solution.