Concerns about data security also increase with the ownership of more connected devices. At present, American Broadband households have an average of 10.4 connected devices - including entertainment, smart home, smart speakers and connected health devices.
Enterprise security applications have been using advanced artificial intelligence for some time, but the financial constraints of the consumer market make it challenging to bear the cost of enterprise security solutions.
Data security solutions companies such as Cujo AI and Dojo have recently expanded their direct consumer oriented products through operator level cloud supported security solutions. These solutions include a software agent designed for residential gateways / routers provided by operators to provide network security for consumers
These powerful emerging solutions for connected families apply machine learning technology to identify devices in home networks, detect abnormal endpoint behavior, monitor and detect incoming threats, identify unreliable phishing websites, and achieve more powerful digital parenting.
AI for device identification
Device identification on home network is the basis of providing endpoint security, network security and digital parenting. Solutions vary in recognition capabilities, from identifying only basic MAC addresses to detailed device types, models, brands and operating system classifiers.
When the security agent runs on the network and takes advantage of cloud intelligence, it can connect with each endpoint and view the header information of each protocol handshake with the device.
In the best architecture, such as Comcast's cooperation with ASUS and Cujo AI, router hardware and firmware are optimized for network security applications to ensure that throughput, latency, memory and CPU utilization will not be reduced to the extent that users are eroded. Like all machine learning, the more data a software application can use to process, the smarter it is.
AI for endpoint and network security
Then, the device information notifies the device configuration file, which enables the security software to identify unreliable device behavior without decrypting and checking data packets. Such IOT device behavior analysis can identify deviations from acceptable device behavior, alert users, and isolate infected devices from the network.
Some categories of devices (such as networked cameras) have unique attack profiles, usually starting with remote access to the camera. AI can learn unique attack profiles, detect them in real time by viewing the target URLs and protocols used, and formulate blocking strategies, such as remote access protection.
AI for parental control
Parental controls typically enable parents to set schedules, restrict access to popular services, limit screen time, and block inappropriate content. AI can also be used for web content filtering. It can use advanced text analysis to detect threats from cyber bullying and sexual predators. Some comprehensive parental controls, such as f-securesafe, can be extended to mobile devices even outside the home network.
For network security, it is very important for the user experience. Consumers are interested in buying more powerful security solutions that can protect home networks and Internet of things devices.
We know from consumer data that people are paying more and more attention to security. Consumers believe that security is an obstacle to buying Internet of things products. Due to security and privacy issues, 32% of American Broadband households will not buy smart home devices.
Consumer reluctance may be due to a lack of understanding and awareness of security solutions. In addition, some consumers have found previous solutions inconvenient to use.
In terms of business model, advanced embedded security functions can distinguish operators and improve the value of their products, so as to help sell services. This value-added function helps to maintain price positioning in fierce competition. Visibility into the home network and its equipment creates operational efficiency for support services and reduces expensive truck transportation.
At present, most embedded network security is used in this way. Embedded security solutions will provide future opportunities for incremental revenue, in which operators can include value-added services as advanced services, but sell them to lower layers as additional subscriptions.
For these reasons, home network security is developing from terminal solutions and secondary security hardware to embedded security provided by operators.