{"id":289,"date":"2016-04-19T06:29:49","date_gmt":"2016-04-19T14:29:49","guid":{"rendered":"https:\/\/www.aplacelikethis.com\/?p=289"},"modified":"2016-04-19T06:29:49","modified_gmt":"2016-04-19T14:29:49","slug":"mits-teaching-ai-how-to-help-stop-cyberattacks-wired","status":"publish","type":"post","link":"https:\/\/www.aplacelikethis.com\/index.php\/2016\/04\/19\/mits-teaching-ai-how-to-help-stop-cyberattacks-wired\/","title":{"rendered":"MIT\u2019s Teaching AI How to Help Stop Cyberattacks | WIRED"},"content":{"rendered":"<blockquote><p><iframe loading=\"lazy\" title=\"AI\u00b2: an AI-driven predictive cybersecurity platform\" width=\"474\" height=\"267\" src=\"https:\/\/www.youtube.com\/embed\/b6Hf1O_vpwQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><\/blockquote>\n<blockquote><p>A system called AI2, developed at MIT\u2019s Computer Science and Artificial Intelligence Laboratory, reviews data from tens of millions of log lines each day and pinpoints anything suspicious. A human takes it from there, checking for signs of a breach. The one-two punch identifies 86 percent of attacks while sparing analysts the tedium of chasing bogus leads.<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/www.wired.com\/2016\/04\/mits-teaching-ai-help-analysts-stop-cyberattacks\/\">MIT\u2019s Teaching AI How to Help Stop Cyberattacks | WIRED<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A system called AI2, developed at MIT\u2019s Computer Science and Artificial Intelligence Laboratory, reviews data from tens of millions of log lines each day and pinpoints anything suspicious. A human takes it from there, checking for signs of a breach. The one-two punch identifies 86 percent of attacks while sparing analysts the tedium of chasing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,6,15],"tags":[],"class_list":["post-289","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence","category-computers","category-security"],"_links":{"self":[{"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/posts\/289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":1,"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/posts\/289\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aplacelikethis.com\/index.php\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}