Sign In

Why data and analytics are the new defences against cyber threats

As the move to the cloud inten­si­fies, secu­ri­ty pro­fes­sion­als need ana­lyt­ics pack­ages to crunch the data to high­light where bad actors might be lying in wait


Close up stock image of a young asian woman sitting down at her desk where she’s surrounded by 3 large computer monitors displaying out of focus images of people as thumbnails; crowds; graphs & scrolling text.

Data and ana­lyt­ics have always been involved in the bat­tle against cyber­crime but with busi­ness­es mov­ing sys­tems to the cloud at the same time as attacks have become more advanced, data ana­lyt­ics is becom­ing firm­ly estab­lished on the front line of defences.

The sim­plest expla­na­tion for why they are now so impor­tant is to con­sid­er the major change that accom­pa­nies mov­ing to remote host­ing, accord­ing to Ryan Shel­drake, CTO at cyber­se­cu­ri­ty com­pa­ny Lace­work. When they host their own servers, busi­ness­es have phys­i­cal over­sight but once they have been moved to third par­ties, that lev­el of direct con­trol changes.

“In the past, you could find the serv­er affect­ed by an attack and even pull the plug on it,” he recalls. “With cloud providers, you may not even know where your servers are, and you cer­tain­ly can’t touch them. 

“Instead, cloud providers swap direct, phys­i­cal con­trol with moun­tains upon moun­tains of data, which is why analysing that data now is at the fore­front of tack­ling cyber­crime.”

Sophisticated cybercrime

Data and ana­lyt­ics are being giv­en a lead­ing role in defeat­ing cyber threats and this is not only because of cloud and the mass­es of data it makes avail­able to users. The new type of attacks from high­ly sophis­ti­cat­ed hack­ers makes threats hard­er to spot using tra­di­tion­al virus detec­tion tech­niques, accord­ing to Adri­an Nish, head of cyber at BAE Sys­tems Dig­i­tal Intel­li­gence.

“Virus­es used to have the same sig­na­ture code in them, so you could scan for them and then delete them,” he says. “But that’s no longer the case as attacks are now more advanced and one-off, so you can’t look for sig­na­tures. 

“Instead, you need to use data ana­lyt­ics to mon­i­tor – in par­tic­u­lar – net­work traf­fic. There will be mil­lions of pieces of data to look at but with the right ana­lyt­ics, you can see what doesn’t look nor­mal, such as some­thing on your sys­tems, pos­si­bly a bot, reg­u­lar­ly call­ing out or ‘bea­con­ing’ to a third par­ty for instruc­tions. It might not be any­thing to wor­ry about but with ana­lyt­ics, you can nar­row the field.”

This is incred­i­bly impor­tant to busi­ness­es oper­at­ing on the front line of the bat­tle against cyber­crime and, arguably, there is no indus­try where this is more press­ing than bank­ing and finan­cial ser­vices. A secu­ri­ty breach could lead to peo­ple los­ing their life sav­ings or sys­tems being down at the very moment a per­son is expect­ing their mort­gage to come through for their new dream home.

There will be mil­lions of pieces of data to look at but with the right ana­lyt­ics, you can see what doesn’t look nor­mal. It might not be any­thing to wor­ry about but with ana­lyt­ics, you can nar­row the field

James Fel­lows, CTO at Coven­try Build­ing Soci­ety, reveals that data ana­lyt­ics is now the only way to keep a track of net­work traf­fic because not only have the threats changed – but what ‘nor­mal’ looks like has altered dra­mat­i­cal­ly.

“Our cus­tomers have made a huge shift to ecom­merce dur­ing the pan­dem­ic, which means we are adapt­ing to new pay­ments leav­ing their accounts at all times,” he explains.

“And many of our employ­ees are work­ing from home and at dif­fer­ent times of the day, so we have to get used to a lot more unusu­al behav­iour, such as some­one log­ging on in the evening because they’re work­ing flex­i­bly. We need to learn what’s nor­mal by feed­ing data into ana­lyt­ics pack­ages that will flag up where we might need to inves­ti­gate fur­ther, per­haps call­ing a per­son to make sure it was them log­ging on. 

“You just can’t do that type of safe­guard­ing with­out using ana­lyt­ics to tar­get where you need to be dou­ble-check­ing.”

How AI can help

It is here that data ana­lyt­ics need pow­er­ful AI and machine learn­ing tools to start to build up a pic­ture of what every­day traf­fic looks like for the mil­lions of inter­ac­tions that flash across the aver­age company’s net­works every day. David Hoelz­er is direc­tor of research at Enclave Foren­sics and thinks that is why around half of the peo­ple who attend his cyber-secu­ri­ty lec­tures for the industry’s SANS insti­tute have a data back­ground.

“About half of my stu­dents are now data sci­en­tists who want to learn more about how to apply data to cyber­se­cu­ri­ty at their organ­i­sa­tions,” he says.

“The indus­try is mov­ing to a point where data ana­lyt­ics are like a triage sys­tem that flags areas of con­cern because humans just can­not wade through mil­lions of data points hop­ing to get lucky and find unknown mal­ware. 

“The trou­ble is, indus­try ven­dors have over­promised for many years, claim­ing they can spot unknown issues before they become a cyber threat, so many may be for­giv­en for think­ing they already have this cov­er – or not believ­ing what they are being promised.”

For Hoelz­er, the risk here is that just as the data ana­lyt­ics, AI and machine learn­ing tools are set to mature to a point where they can accu­rate­ly guide humans to areas of unusu­al activ­i­ty on net­works, invest­ment might be cut short. Giv­en the pow­er of data and ana­lyt­ics to focus the search for bad actors on net­works, this would be a mis­take.

In par­tic­u­lar, it would be a step back­wards in cyber­se­cu­ri­ty because, accord­ing to Ryan Shel­drake, the next wave of inno­va­tion will take com­pa­ny defences to the next lev­el where anom­alies are not only spot­ted, but fixed.

“We’re mov­ing to the point where AI is not just going to be able to use data ana­lyt­ics to guide secu­ri­ty teams to where unusu­al activ­i­ty is tak­ing place,” he says.

“The next stage is going to be using the data to find a prob­lem and then fix it. These self-heal­ing sys­tems will be able to spot issues and then fix sys­tems on the fly.”

That is the ulti­mate promise of data and ana­lyt­ics in defend­ing against cyber­crime. While they can cur­rent­ly be used to cut down the noise of net­work traf­fic to high­light where mal­ware and bad actors may be lurk­ing, the future will see them inves­ti­gat­ing anom­alies and then report­ing back to secu­ri­ty staff when a prob­lem has been detect­ed and dealt with.