New Whitepaper On How Wallarm AI Works

“Any sufficiently advanced technology is indistinguishable from magic,”
Arthur C. Clarke

Ever wanted to look under the covers of deep learning/artificial intelligence engine? While deep learning algorithms are generally based on neurons combined into a neural network and interacting with each other, just like in a human brain, to get good results with neural networks, it is critical to pick the right network topology, which has always been a difficult manual task.

One of the most interesting concepts in the modern AI architectures is using meta-AI to find out the best architecture for the task.

“Intelligence involves a great deal more than ability to follow rules… it is also the ability to make up the rules for oneself, when they are needed, or to learn new rules through trial and error.”
Steve Grand, author of Creation

This concept is called Reinforcement Learning, meaning that the parent AI reviews the efficiency of the child AI and makes adjustments to the neural networks, such as adjusting the number of layers, weights, regularization methods, etc. to improve efficiency. We have covered the details of the reinforcement learning implementation based on some of the code Google has open-sourced in an earlier blog.

Wallarm Reinforcement Learning

Wallarm applies the same AI concepts to profile applications and to decide what’s normal within the application profile. This is a major improvement over traditional protection methods, that become more cumbersome or break altogether as applications and attacks grow in complexity and sophistication.

Training neural networks, particularly in the case of reinforcement learning, can take some time. To speed up the process we are using NVIDIA GPUs. We are excited to work with NVIDIA and other advanced AI startups as a member if NVIDIA Inception program.

The main task of the run-time application security is to protect modern applications and APIs.

With AI, we can solve many of the application security challenges that plagued the legacy solution:

• Applications are different both in structure and in content. Things that are harmful to one application may be perfectly normal for another.

• User behavior varies between both the applications and the individual application functions.

For example several login calls every second may indicate a credential stuffing attack, while several data layer queries per second may be a normal function of building a correlated data set.

• The number of known attacks keeps growing, with attack patterns (or signatures) sometimes being hidden within nested protocols

• Straightforward implementation of attack detection based on signatures often results in a high rate of false positives and false negatives,

Wallarm has recently published a whitepaper in which we have taken an in-depth look at the inner workings of several stages of Wallarm AI both in Wallarm Cloud and locally on the Wallarm filtering node.

Download the whitepaper to learn more about Reinforcement Learning and Wallarm AI.

Recent Posts

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

1 week ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

1 week ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

3 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

4 weeks ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

1 month ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

1 month ago