{"id":99648,"date":"2024-10-25T14:06:45","date_gmt":"2024-10-25T12:06:45","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=99648"},"modified":"2024-11-12T09:14:06","modified_gmt":"2024-11-12T08:14:06","slug":"machine-learning","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-inteligencia-artificial\/machine-learning\/","title":{"rendered":"Machine Learning: An Artificially (Almost) Human Intelligence"},"content":{"rendered":"<h2 class=\"gb-headline gb-headline-227e6fe4 gb-headline-text\"><strong>Artificial Intelligence<\/strong><\/h2>\n\n\n\n<p>Developments in Artificial Intelligence represent a giant leap in the way we approach complex problems, which require capabilities beyond human ability. After all, as early as the Industrial Revolution, machines were developed to expand human endeavor, to amplify the then-physical qualities of the workforce. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"729\" height=\"488\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16.png\" alt=\"Artificial intelligence\" class=\"wp-image-99653\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16.png 729w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16-300x201.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16-246x165.png 246w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16-123x82.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16-18x12.png 18w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16-500x335.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/image-16-200x134.png 200w\" sizes=\"(max-width: 729px) 100vw, 729px\" \/><\/figure>\n\n\n\n<p>In our digital, technological, hyperconnected age, machines (read: algorithms) are geared toward increasing our analytical speed and multiplying the possibilities of inferring information and making more agile decisions.<\/p>\n\n\n\n<p>Believe me, I don&#039;t know any cybersecurity analyst who can deal with huge amounts of information, hundreds of thousands of information sources per second... but I know a few algorithms that can do it (and do) as a result of their &quot;daily work&quot; (I will return to that concept and the ethical consequences of it later).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-1024x512.jpeg\" alt=\"\" class=\"wp-image-99654\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-1024x512.jpeg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-300x150.jpeg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-768x384.jpeg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-123x62.jpeg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-18x9.jpeg 18w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-500x250.jpeg 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-800x400.jpeg 800w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-1280x640.jpeg 1280w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610-200x100.jpeg 200w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-45610.jpeg 1408w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>It is important to highlight that Artificial Intelligence is the \u201csupra-discipline\u201d, the umbrella that contains five sub-disciplines, one of them being the best known, <strong>Machine Learning<\/strong> (machine learning). This dimension, clearly the most widely applied in the field of cybersecurity, has four modalities that deserve explanation: <strong>Supervised<\/strong> (<em>Supervised<\/em>), <strong>Unsupervised<\/strong> (<em>Unsupervised<\/em>), <strong>Reinforcement Learning<\/strong> (<em>Reinforcement Learning<\/em>) and <strong>Deep Learning<\/strong> (<em>Deep Learning<\/em>). While it&#039;s true that each one has its own particularities and I could (almost) write a book about them, for the purpose of this article\u2014the application of all of this to cybersecurity\u2014I&#039;ll focus on two: <strong>Unsupervised and Reinforcement Learning.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-f1fa572d gb-headline-text\"><strong>Unsupervised Machine Learning<\/strong>:<\/h2>\n\n\n\n<p>The first, <strong>Unsupervised Machine Learning<\/strong>, no longer requires a data scientist (<em>data scientist<\/em> in its English meaning) to \u201clabel\u201d the data set and the algorithm is able to decide \u201cautomagically\u201d (<em>sic<\/em>) the variables needed to test the hypothesis as correct or incorrect. This modality is ideal for finding anomalies and patterns of behavior, and thus, even being able to infer the next movements of the attacker and\/or any individual in the community. Unsupervised Machine Learning is the most widely used method at the moment due to its predictive capacity using volumes of information from different sources, with massive data loads, in (almost) real time and making extensive use of statistics.<\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-6865571e gb-headline-text\"><strong>Reinforcement Learning Machine Learning:<\/strong><\/h2>\n\n\n\n<p>With<strong> Reinforcement Learning Machine Learning<\/strong>, as its name suggests, the algorithm is capable of learning from its mistakes (!) and learning intensively, correcting its state and always being at the best version of itself (which, as a concept, is already tremendously interesting because it implies that it is in continuous improvement mode... always). In the world of cybersecurity, applying this concept to defense strategies where the machine can learn from its mistakes and (re)learn from, for example, false positives, seems to us to be a qualitative and quantitative leap. Can you imagine a solution that can predict the next step of an attack... because it has been trained and\/or seen different methods to exfiltrate information (what in English is known as TTP, <em>Tactics, Techniques and Procedures<\/em>, or Tactics, Techniques, and Procedures) and act accordingly before it happens? Stop imagining it, because it already exists and substantially changes human efforts in cybersecurity protection and defense.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-1024x512.jpeg\" alt=\"\" class=\"wp-image-99655\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-1024x512.jpeg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-300x150.jpeg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-768x384.jpeg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-123x62.jpeg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-18x9.jpeg 18w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-500x250.jpeg 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-800x400.jpeg 800w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-1280x640.jpeg 1280w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487-200x100.jpeg 200w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/10\/freepik-candid-image-photography-natural-textures-highly-r-77487.jpeg 1408w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>There are already different technologies on the market<strong> Machine Learning<\/strong> that complete and complement the developments already available to obtain full control and visibility of the environment. Engineers from around the world have developed detective, preventive, and corrective controls that capitalize on the concepts mentioned in this article. And they provide new angles for the deployment of a SOC (<em>Security Operation Center<\/em>) next-generation. An automated, orchestrated SOC that is capable of utilizing threat intelligence from diverse sources (including several <em>data lakes<\/em>, infer the next step of a cybercriminal and, consequently, provide greater robustness and solidity in the protection and defense of an environment.<\/p>\n\n\n\n<p>All of this, before reaching Deep Learning, whose conceptualization aims to emulate how the human brain works, the way in which the estimated 100 billion neurons in an adult&#039;s brain work in different layers to transmit information and make decisions like electromagnetic impulses or electrical currents. Therefore, we live in a fascinating time in cybersecurity where tools expand human capacity. We live in a magnificent time where artificial intelligence is becoming less artificial and more intelligence. Less machine and more human. Or almost.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity combined with AI improves threat detection, authentication and vulnerability analysis. Discover how artificial intelligence enhances this protection and its ethical challenges.<\/p>","protected":false},"author":2741,"featured_media":99656,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1489,332],"tags":[],"class_list":["post-99648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-inteligencia-artificial","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/99648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/2741"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=99648"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/99648\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/99656"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=99648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=99648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=99648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}