AI in Cyber-security: Examples of Algorithms & Techniques

Slides:



Advertisements
Similar presentations
Learning Programs Danielle and Joseph Bennett (and Lorelei) 4 December 2007.
Advertisements

LLNL-PRES This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
Anomaly detection with Bayesian networks Website: John Sandiford.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Copyright © 2012, SAS Institute Inc. All rights reserved. ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY,
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
MICROSOFT SEMANTIC ENGINE Unified Search, Discovery and Insight.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Network Management Lecture 13. MACHINE LEARNING TECHNIQUES 2 Dr. Atiq Ahmed Université de Balouchistan.
Machine learning & object recognition Cordelia Schmid Jakob Verbeek.
DATA MINING and VISUALIZATION Instructor: Dr. Matthew Iklé, Adams State University Remote Instructor: Dr. Hong Liu, Embry-Riddle Aeronautical University.
Sparse Coding: A Deep Learning using Unlabeled Data for High - Level Representation Dr.G.M.Nasira R. Vidya R. P. Jaia Priyankka.
Introduction to Machine Learning, its potential usage in network area,
Brief Intro to Machine Learning CS539
Course Outline (6 Weeks) for Professor K.H Wong
Teck Chia Partner, Exponent.vc
2/13/2018 4:38 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Big data classification using neural network
4/19/ :02 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
TensorFlow CS 5665 F16 practicum Karun Joseph, A Reference:
Machine Learning, Bio-informatics and Weka
Machine Learning for Computer Security
Inter-experimental LHC Machine Learning Working Group Activities
Taking a Tour of Text Analytics
Sentiment analysis algorithms and applications: A survey
Machine Learning overview Chapter 18, 21
Deep Learning Amin Sobhani.
Machine Learning overview Chapter 18, 21
Natural Language and Text Processing Laboratory
Siemens Enables Digitalization: Data Analytics & Artificial Intelligence Dr. Mike Roshchin, CT RDA BAM.
A Personal Tour of Machine Learning and Its Applications
Chilimbi, et al. (2014) Microsoft Research
Making AI Walk The Talk Jegannathan Kannan
An Artificial Intelligence Approach to Precision Oncology
School of Computer Science & Engineering
It’s All About Me From Big Data Models to Personalized Experience
Alan D. Mead, Talent Algorithms Inc. Jialin Huang, Amazon
CH. 1: Introduction 1.1 What is Machine Learning Example:
Giuseppe Attardi Dipartimento di Informatica Università di Pisa
Accelerating intelligent automation for competitive advantage
Are End-to-end Systems the Ultimate Solutions for NLP?
Machine Learning Training Bootcamp
Modeling Cyberspace Operations
Threat Landscape for Data Security
What is Pattern Recognition?
Basic Intro Tutorial on Machine Learning and Data Mining
Implementing AI solutions using the cognitive services in Azure
Ganapathy Mani, Bharat Bhargava, Jason Kobes*
Research Areas Christoph F. Eick
Adversarial Evasion-Resilient Hardware Malware Detectors
Overview of Machine Learning
INTRODUCTION.
Supervised vs. unsupervised Learning
Data Science in Industry
Neural networks (3) Regularization Autoencoder
Presentation By: Eryk Helenowski PURE Mentor: Vincent Bindschaedler
Deep Learning Authors: Yann LeCun, Yoshua Bengio, Geoffrey Hinton
Applied Machine Learning For Quant Finance
Machine Learning for Space Systems: Are We Ready?
Machine Learning overview Chapter 18, 21
Image Processing and Multi-domain Translation
Modeling IDS using hybrid intelligent systems
Object Detection Implementations
Trusting Machine Learning Algorithms for Safeguards Applications
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Machine Learning in Business John C. Hull
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Huawei CBG AI Challenges
Fall Midwest IASA Conference
Presentation transcript:

AI in Cyber-security: Examples of Algorithms & Techniques Tapati Bandopadhyay

The world of AI Tools, Orchestration & Robotic Process Automation Complex task, Invasive (not ported across platforms), modifications requires changes in code, set of instructions to perform simple tasks Orchestration: work-flow driven, Semi-invasive (Needs integration) RPA: Fixed rules based, Non-invasive (works without customizations), Easily scalable, best fit for business process automation Cognitive (supervised machine learning) NLP – training with annotated/ labelled corpus, ontologies, basic sentiment analysis, bagging/ boosting, Bag of Words, Word2Vec Forecasting: ML toolboxes, predictive analytics, time-series- ARIMA, MDP, Bayesian networks, Semantic Knowledge Models Pattern recognition: Random forests, NN- CNN/ RNN, recommendation engines & classifiers [most common use-cases], clustering Deep learning, Unsupervised learning & other advanced ML Context Aware, Deep learning from observations, reasoning based advance decision makings and problem resolutions LSTM, GRU, HTM, reinforcement learning, transfer learning, explainable AI- LRP/ LIME, Meta-learning, GAN, TOMNet Machine vision, 3D extrapolation, Capsule networks, I2A algorithms

New types of Malware & Preventive Systems -1 Generative Adversarial Network MalGAN: Generate adversarial malware examples, to bypass black-box machine learning based detection models. Uses a substitute detector to fit the black-box malware detection system. Trained to minimize the generated adversarial examples’ malicious probabilities predicted by the substitute detector. Better than gradient based adversarial example generation algorithms - decrease the detection rate to nearly zero, make the retraining based defensive method against adversarial examples hard to work. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN, Weiwei Hu and Ying Tan fweiwei.hu, ytang@pku.edu.cn

New types of Malware & Preventive Systems - 2 Neural Network-based Example: MtNet multi-task, deep learning architecture for malware classification for the binary (i.e. malware versus benign) malware classification task. trained with data extracted from dynamic analysis of malicious and benign files. improvements using multiple layers in a deep neural network architecture trained on 4.5 million files and tested on a holdout test set of 2 million files MtNet: A Multi-Task Neural Network for Dynamic Malware Classification, Wenyi Huang and Jack W. Stokes Pennsylvania State University; Microsoft Research

Deep Sentinel: Deep learning in home security – Raw video streams Keep an eye on… AI2- MIT start-up: Unsupervised ML on raw data -detects abnormal activities- with human feedback, accuracy can reach >86% Deep Sentinel: Deep learning in home security – Raw video streams Cloudfare: IoT security – Orbit, Obert

NLP in Information Security To detect malicious code- source code vulnerability analysis To detect malicious DNS- Domain generation algorithms classifiers To detect phishing- Bag-of-Words model – phishing emails Malware family analysis- Topic Modelling