The Real AI Threat?

adamv0025 at netconsultings.com adamv0025 at netconsultings.com
Thu Dec 10 13:31:10 UTC 2020


> Put them together, and the nightmare scenario is:
> - machine learning algorithm detects need for more resources
All good so far
 
> - machine learning algorithm makes use of vulnerability analysis library 
> to find other systems with resources to spare, and starts attaching
> those resources

Right so a company would built, trained and fine-tuned an AI, or would have bought such a product and implemented it as part of its NMS/DDoS mitigation suite, to do the above? 

What is the probability of anyone thinking that to be a good idea?

To me that does sound like an AI based virus rather than a tool one would want to develop or buy from a third party and then integrate into the day to day operations.

 

You can’t take for instance alpha-0 or GPT-3 and make it do the above. You’d have to train it to do so over millions of examples and trials. 

Oh and also these won’t “wake up” one day and “think” to themselves oh I’m fed up with Atari games I’m going to learn myself some chess and then do some reading on wiki about the chess rules. 

 

    

adam

 

 

From: NANOG <nanog-bounces+adamv0025=netconsultings.com at nanog.org> On Behalf Of Miles Fidelman
Sent: Wednesday, December 9, 2020 7:07 PM
To: NANOG <nanog at nanog.org>
Subject: The Real AI Threat?

 

Hi Folks,

It occurs to me that network & systems admins are the the folks who really have to worry about AI threats.
 
After watching yet another AI takes over the world show - you know, the 
same general theme, AI wipes out humans to preserve its existence - it 
occurred to me:
 
Perhaps the real AI threat is "self-healing systems" gone wild. Consider:
 
- automated system management
- automated load management
- automated resource management - spin up more instances of <whatever> 
as necessary
- automated threat detection & response
- automated vulnerability analysis & response
 
Put them together, and the nightmare scenario is:
- machine learning algorithm detects need for more resources
- machine learning algorithm makes use of vulnerability analysis library 
to find other systems with resources to spare, and starts attaching 
those resources
- unbounded demand for more resources
 
Kind of what spambots have done to the global email system.
 
"For Homo Sapiens, the telephone bell had tolled."
(Dial F for Frankenstein, Arthur C. Clarke)
 
I think I need to start putting whisky in my morning coffee.  And maybe not thinking 
about NOT replacing third shift with AI tools.
 
Miles Fidelman
-- 
In theory, there is no difference between theory and practice.
In practice, there is.  .... Yogi Berra
 
Theory is when you know everything but nothing works. 
Practice is when everything works but no one knows why. 
In our lab, theory and practice are combined: 
nothing works and no one knows why.  ... unknown
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20201210/c990569d/attachment.html>


More information about the NANOG mailing list