Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence.

Slides:



Advertisements
Similar presentations
E-Science Data Information and Knowledge Transformation Thoughts on Education and Training for E-Science Based on edikt project experience Dr. Denise Ecklund.
Advertisements

Wincite Knowledge Warehousing and Networking Sophisticated Simplicity.
Market Research Ms. Roberts 10/12. Definition: The process of obtaining the information needed to make sound marketing decisions.
FT228/4 Knowledge Based Decision Support Systems Knowledge Engineering Ref: Artificial Intelligence A Guide to Intelligent Systems, Michael Negnevitsky.
CHAPTER 4 DECISION SUPPORT AND ARTIFICIAL INTELLIGENCE Brainpower for Your Business.
Clinical decision support system (CDSS). Knowledge-based systems Knowledge based systems are artificial intelligent tools working in a narrow domain to.
7-1 INTRODUCTION: SoA Introduced SoA in Chapter 6 Service-oriented architecture (SoA) - perspective that focuses on the development, use, and reuse of.
Scheduling with uncertain resources Elicitation of additional data Ulaş Bardak, Eugene Fink, Chris Martens, and Jaime Carbonell Carnegie Mellon University.
CHAPTER 4 ANALYTICS, DECISION SUPPORT, AND ARTIFICIAL INTELLIGENCE
Chapter 4 DECISION SUPPORT AND ARTIFICIAL INTELLIGENCE
Chapter 11 Artificial Intelligence and Expert Systems.
INDUSTRIAL & SYSTEMS ENGINEERING
1 SYS366 Week 1 - Lecture 2 How Businesses Work. 2 Today How Businesses Work What is a System Types of Systems The Role of the Systems Analyst The Programmer/Analyst.
Automated Changes of Problem Representation Eugene Fink LTI Retreat 2007.
Personalized Cybersecurity for Dummies Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Application of machine learning and crowdsourcing to adapt cybersecurity.
Preference Elicitation in Scheduling Problems Ulaş Bardak Ph.D. Thesis Proposal Committee Jaime Carbonell, Eugene Fink, Stephen Smith, Sven Koenig (University.
Scheduling with uncertain resources: Representation and utility function Ulas Bardak, Eugene Fink, and Jaime Carbonell Reflective Agent with Distributed.
Developing Intelligent Agents and Multiagent Systems for Educational Applications Leen-Kiat Soh Department of Computer Science and Engineering University.
Chapter 8 Management Support and Coordination Systems.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
DECISION SUPPORT FOR RE-PLANNING OF SOFTWARE PRODUCT RELEASES S. M. Didar-Al-Alam Dept. of Computer Science University of Calgary, Calgary, AB, Canada.
Who We Are We enable our customers to gain unprecedented insights to optimize their customer, channel partner, vendor and employee relationships. TheMindSuite.
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
INTELLIGENT SYSTEMS BUSINESS MOTIVATION BUSINESS INTELLIGENCE M. Gams.
Copyright © 2002 by The McGraw-Hill Companies, Inc. Information Technology & Management 2 nd Edition, Thompson Cats-Baril Chapter 8 I/S and Organizational.
operational-level system. management-level system.
11 C H A P T E R Artificial Intelligence and Expert Systems.
Unit 2: Engineering Design Process
Millions of points of measurement Dense spatial and temporal data Need visual analytic tools as conventional analyses are too inefficient Visualization.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Integration of Search and Learning Algorithms Eugene Fink.
Information knowledge based systems (IKBS) and expert systems.
Problem Paramount to the success of your effort stated precisely address an important question advance knowledge.
Intelligent Performance Management Empowering Your Enterprise Duane E. Presti, CEO PARIS Technologies, Inc.
Quantitative research – variables, measurement levels, samples, populations HEM 4112 – Research methods I Martina Vukasovic.
Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi.
Chapter 4 Decision Support System & Artificial Intelligence.
AUDIENCE ANALYSIS. Audience analysis- the study of specific audience for a speech Audience analysis- the study of specific audience for a speech Demographics-
Advanced MMBR Conjoint analysis (1). Advanced Methods and Models in Behavioral Research Conjoint analysis -> Multi-level models You have to understand:
RADAR May 5, RADAR /Space-Time Assistant: Crisis Allocation of Resources.
Of An Expert System.  Introduction  What is AI?  Intelligent in Human & Machine? What is Expert System? How are Expert System used? Elements of ES.
Unclassified//For Official Use Only 1 RAPID: Representation and Analysis of Probabilistic Intelligence Data Carnegie Mellon University PI : Prof. Jaime.
Analysis of Uncertain Data: Tools for Representation and Processing Bin Fu Eugene Fink Jaime G. Carbonell.
RADAR February 15, RADAR /Space-Time Learning.
Scheduling with Uncertain Resources Eugene Fink, Jaime G. Carbonell, Ulas Bardak, Alex Carpentier, Steven Gardiner, Andrew Faulring, Blaze Iliev, P. Matthew.
Which list of numbers is ordered from least to greatest? 10 –3, , 1, 10, , 1, 10, 10 2, 10 – , 10 –3, 1, 10, , 10 –3,
Reasoning under Uncertainty Eugene Fink LTI Seminar November 16, 2007.
Automated Assistant for Crisis Management (Reflective Agent with Distributed Adaptive Reasoning) RADAR.
Machine Learning Methods for Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi.
Scheduling with uncertain resources Collaboration with the user Eugene Fink, Ulaş Bardak, Brandon Rothrock, Jaime Carbonell Carnegie Mellon University.
AZURE MACHINE LEARNING Bringing New Value To Old Data SQL Saturday #
Decision Support and Business Intelligence Systems (9 th Ed., Prentice Hall) Chapter 12: Artificial Intelligence and Expert Systems.
Introduction to Machine Learning, its potential usage in network area,
Conducting Market Research
Conducting Market Research Surveys
Review of last class Software Engineering Modeling Problem Solving
Intelligent Systems Development
Decision Support Systems
The First Steps To A Knowledge Management Database
“Intelligent User Interfaces” by Hefley and Murray A 1993 Perspective
Pass AWS-Certified-Solutions-Architect-Professional Certification in First Attempt - AWS-Certified-Solutions-Architect-Professional Valid Questions Answers - Realexamdumps.com
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
Data Warehousing and Data Mining
Overview of Machine Learning
Expert Systems.
Copyright © JanBask Training. All rights reserved Top 10 Charming IT jobs that would be High in Demand in 2019.
Scheduling under Uncertainty
Introduction to Artificial Intelligence Lecture 15: Expert Systems
Unit 2: Fundamentals of Computer Systems
Conducting Market Research Surveys
Presentation transcript:

Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence to adapt cybersecurity tools to the needs of (naïve) individual users.

Individual user differences Security needs - Data confidentiality - Data-loss tolerance - Recovery costs Usage patterns Computer knowledge Different users need different security tools.

Problem Inflexible engineered solutions with “too much security” - Too high security at high costs - Insufficient customization options “Advanced user” assumption - Complicated customization - Unclear security warnings

Examples Typical response of naïve users: Always no (too much security) Always yes (not enough security) Ask a techie if available

Population statistics Computer use by age and gender User naïveté correct answers

Population statistics Almost everyone uses a computer Most users are naïve, with very limited technical knowledge Many security problems are due to the user naïveté When an average user deals with security issues, she often needs basic advice and handholding.

Long-term goal We need an automated security assistant that learns the needs of the individual user and helps the user to apply security tools.

Research problems Learning about the user - Usage patterns - Technical knowledge - Security choices Elicitation of security needs - Understandable questions - Optimized question selection - Conversion of the elicited answers to appropriate security settings Understandable warnings - Not-Sure response option - Explanation customized to the user technical knowledge - Advice customized to the user needs - Optimization of yes/no decisions Learning across multiple users - Learning from observations - Integration of expert advice - Distributed processing of massive data

Architecture Model Const- ruction Model Evalu- ation Question Selection Security Decision Optimizer current model model utility and limitations questions answers and observations Top-Level Control Data Collection