<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>systems security Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/systems-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/systems-security/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Thu, 28 Nov 2019 09:18:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>MACHINE LEARNING FOR FRAUD PREVENTION</title>
		<link>https://www.aiuniverse.xyz/machine-learning-for-fraud-prevention/</link>
					<comments>https://www.aiuniverse.xyz/machine-learning-for-fraud-prevention/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Thu, 28 Nov 2019 09:18:28 +0000</pubDate>
				<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[Automated]]></category>
		<category><![CDATA[data analysis]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[systems security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=5445</guid>

					<description><![CDATA[<p>Source: analyticsinsight.net According to a report, fraud cost the worldwide economy £3.2 trillion in 2018. For certain organizations, misfortunes to fraud arrive at over 10% of their <a class="read-more-link" href="https://www.aiuniverse.xyz/machine-learning-for-fraud-prevention/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/machine-learning-for-fraud-prevention/">MACHINE LEARNING FOR FRAUD PREVENTION</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: analyticsinsight.net</p>



<p>According to a report, fraud cost the worldwide economy £3.2 trillion in 2018. For certain organizations, misfortunes to fraud arrive at over 10% of their total spending. Such enormous misfortunes push organizations to scan for new solutions to avoid, identify, and kill fraud. Machine Learning is the most encouraging innovative weapon to battle financial fraud.</p>



<p>The best innovation for battling fraud is one that can change and adjust as fast as the fraudster’s strategies. That is the thing that makes Machine Learning (ML) framework ideal for battling fraud. At the point when planned ideally, they learn, adjust, and reveal rising trends without the over-adaptation that can result in an excessive number of false positives.</p>



<p>Unmistakably, there’s a great deal of money at stake. But organizations have extra motivations to hold onto machine learning. As the web develops, fraudsters are uncovering more opportunities to dupe the two organizations and end-users. The huge data breaches of the recent past have overwhelmed the dark web with financial and individual data that can be utilized to commit account takeover and identity theft.&nbsp; And terrible on-screen characters are going to be deceitful user-generated content to commit scams, post spam, and malevolent attacks.</p>



<p>Meanwhile, fraudsters’ methods are developing progressively innovatively advanced. All of the software and hardware expected to commit fraud at scale are marked down, frequently for disturbingly low prices. Today’s online organizations are confronting an inexorably complex enemy that attacks, reacts, and changes strategies incredibly rapidly. With machine learning, organizations can remain ahead.</p>



<h4 class="wp-block-heading">Machine Learning is Effective</h4>



<p>The idea behind utilizing machine learning for fraud detection is that the deceitful transactions have explicit features that authentic transactions don’t. In view of this suspicion, machine learning algorithms are able to identify patterns in monetary activities and choose whether a given transaction is authentic. Machine learning fraud detection algorithms are far more successful than people. They can process a pile of data quicker than a group of the best analysts ever could. Also, ML algorithms can spot patterns that appear to be unrelated or go unnoticed by a human. By exploring and considering the huge amounts of instances of fraudulent behavior, ML algorithms decide the stealthiest fraudulent patterns and recollect them until the end of time.</p>



<h4 class="wp-block-heading">Being Probabilistic</h4>



<p>Across numerous enterprises, machine learning is dislodging legacy solutions that can’t keep pace or deliver a similar nature of results. In fraud detection, the obsolete way to deal with battling fraud is manually updated rules systems, which depend on if then-statements to apply choices. The framework goes through the guidelines, individually, and if it decides any rule is stumbled it will make the suitable move and avoid the various rules. Machine learning, then again, is probabilistic as opposed to deterministic. It utilizes statistical models to take a look at the past results and inconsistencies to anticipate future outcomes. A machine learning framework can learn, foresee, and settle on choices without being expressly program.</p>



<p>Similar to how email spam filters learn how to perceive which messages to deliver to your inbox, a machine learning framework can recognize the attributes of fraudulent purchases from genuine ones. Machine learning is frequently deployed as a major aspect of automated fraud screening systems, distinguishing high-risk transactions, accounts, and unsafe logins to forestall payment fraud, account misuse, content maltreatment, and account takeover. Machine learning can supplant even the most unpredictable rules set and produce higher precision, less false positives and savings through automation.</p>



<h4 class="wp-block-heading">Customer Experience and Detection</h4>



<p>Identifying nefarious transactions while delivering quality customer service is a delicate balancing act. A company that much of the time decreases real transactions or makes its authentication measures too unwieldy is well-suited to lose clients. ML systems are perfect for limiting this kind of friction.</p>



<p>For instance, one global financial institution as of late worked with SAS to modernize its rule-based fraud detection framework and help find some kind of harmony between oversight and customer service. To do this, the bank actualized an ML-based solution from SAS that uses a group of neural systems to make two diverse fraud scores:</p>



<p>•&nbsp; An essential fraud score, assessing the probability that an account is in a fake state.</p>



<p>•&nbsp; A transactional score, assessing the probability that an individual transaction is false.</p>



<p>Utilizing this dual score approach, the financial organization effectively-recognized about $1 million in month to month transactions that had been wrongly distinguished as a fraud. It was likewise ready to locate an extra $1.5 million every month in fraud that had previously gone undetected.</p>



<p>Capgemini claims their ML fraud detection system can decrease fraud examination time by 70% while expanding accuracy by 90%. Another ML fraud prevention solution provider, Feedzai, claims that a well-trained machine learning solution can identify and anticipate 95% of all fraud while limiting the amount of human work required during the examination stage.</p>



<p>Huge enterprises like Airbnb, Yelp, and Jet.com are as of now utilizing AI solutions to get experiences from big data and counteract issues, for example, fake records, account takeover, payment fraud, and promotion misuse. Machine learning deals with all the dirty work of data analysis and predictive analytics and enables organizations to grow and be safe from fraud.</p>
<p>The post <a href="https://www.aiuniverse.xyz/machine-learning-for-fraud-prevention/">MACHINE LEARNING FOR FRAUD PREVENTION</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/machine-learning-for-fraud-prevention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why microservices are a security issue</title>
		<link>https://www.aiuniverse.xyz/why-microservices-are-a-security-issue/</link>
					<comments>https://www.aiuniverse.xyz/why-microservices-are-a-security-issue/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 24 Nov 2017 05:23:13 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[security issue]]></category>
		<category><![CDATA[systems architecture]]></category>
		<category><![CDATA[systems security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=1756</guid>

					<description><![CDATA[<p>Source &#8211; opensource.com I struggled with writing the title for this post, and I worry that it comes across as clickbait. If you&#8217;ve come to read this because <a class="read-more-link" href="https://www.aiuniverse.xyz/why-microservices-are-a-security-issue/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/why-microservices-are-a-security-issue/">Why microservices are a security issue</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>opensource.com</strong></p>
<p>I struggled with writing the title for this post, and I worry that it comes across as clickbait. If you&#8217;ve come to read this because it looked like clickbait, then sorry.<sup>1</sup> I hope you&#8217;ll stay anyway: there are lots of fascinating<sup>2</sup> points and many<sup>3</sup> footnotes. What I <em>didn&#8217;t</em> mean to suggest is that microservices cause security problems—though like any component, of course, they can—but that microservices are appropriate objects of interest to those involved with security. I&#8217;d go further than that: I think they are an excellent architectural construct for those concerned with security.</p>
<p>And why is that? Well, for those of us with a systems security bent, the world is an interesting place at the moment. We&#8217;re seeing a growth in distributed systems, as bandwidth is cheap and latency low. Add to this the ease of deploying to the cloud, and more architects are beginning to realise that they can break up applications, not just into multiple layers, but also into multiple components within the layer. Load balancers, of course, help with this when the various components in a layer are performing the same job, but the ability to expose different services as small components has led to a growth in the design, implementation, and deployment of <em>microservices</em>.</p>
<p>So, what exactly is a microservice? I quite like Wikipedia&#8217;s definition, though it&#8217;s interesting that security isn&#8217;t mentioned there.<sup>4</sup> One of the points that I like about microservices is that, when well-designed, they conform to the first two points of Peter H. Salus&#8217; description of the Unix philosophy:</p>
<ol>
<li>Write programs that do one thing and do it well.</li>
<li>Write programs to work together.</li>
<li>Write programs to handle text streams, because that is a universal interface.</li>
</ol>
<p>The last of the three is slightly less relevant, because the Unix philosophy is generally used to refer to standalone applications, which often have a command instantiation. It does, however, encapsulate one of the basic requirements of microservices: that they must have well-defined interfaces.</p>
<p>By &#8220;well-defined,&#8221; I don&#8217;t just mean a description of any externally accessible APIs&#8217; methods, but also of the normal operation of the microservice: inputs and outputs—and, if there are any, side-effects. As I described in a previous post, &#8220;5 traits of good systems architecture,&#8221; data and entity descriptions are crucial if you&#8217;re going to be able to design a system. Here, in our description of microservices, we get to see why these are so important, because, for me, the key defining feature of a microservices architecture is decomposability. And if you&#8217;re going to decompose<sup>5</sup> your architecture, you need to be very, very clear which &#8220;bits&#8221; (components) are going to do what.</p>
<p>And here&#8217;s where security starts to come in. A clear description of what a particular component should be doing allows you to:</p>
<ul>
<li>Check your design</li>
<li>Ensure that your implementation meets the description</li>
<li>Come up with reusable unit tests to check functionality</li>
<li>Track mistakes in implementation and correct them</li>
<li>Test for unexpected outcomes</li>
<li>Monitor for misbehaviour</li>
<li>Audit actual behaviour for future scrutiny</li>
</ul>
<p>Now, are all these things possible in a larger architecture? Yes, they are. But they become increasingly difficult where entities are chained together or combined in more complex configurations. Ensuring <em>correct</em> implementation and behaviour is much, much easier when you&#8217;ve got smaller pieces to work together. And deriving complex systems behaviours—and misbehaviours—is much more difficult if you can&#8217;t be sure that the individual components are doing what they ought to be.</p>
<p>It doesn&#8217;t stop here, however. As I&#8217;ve mentioned on many previous occasions, writing good security code is difficult.<sup>7</sup> Proving that it does what it should do is even more difficult. There is every reason, therefore, to restrict code that has particular security requirements—password checking, encryption, cryptographic key management, authorisation, etc.—to small, well-defined blocks. You can then do all the things that I&#8217;ve mentioned above to try to make sure it&#8217;s done correctly.</p>
<p>And yet there&#8217;s more. We all know that not everybody is great at writing security-related code. By decomposing your architecture such that all security-sensitive code is restricted to well-defined components, you get the chance to put your best security people on that and restrict the danger that J. Random Coder<sup>8</sup> will put something in that bypasses or downgrades a key security control.</p>
<p>It can also act as an opportunity for learning: It&#8217;s always good to be able to point to a design/implementation/test/monitoring tuple and say: &#8220;That&#8217;s how it should be done. Hear, read, mark, learn, and inwardly digest.<sup>9</sup>&#8221;</p>
<p>Should you go about decomposing all of your legacy applications into microservices? Probably not. But given all the benefits you can accrue, you might consider starting with your security functions.</p>
<p>The post <a href="https://www.aiuniverse.xyz/why-microservices-are-a-security-issue/">Why microservices are a security issue</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/why-microservices-are-a-security-issue/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
	</channel>
</rss>
