Presentation is loading. Please wait.

Presentation is loading. Please wait.

When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.

Similar presentations


Presentation on theme: "When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693."— Presentation transcript:

1 When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.?
ECE 693

2 AI & Security ML and AL have big overlap

3 What is ML / AI?

4

5 Supervised Learning Framework

6 Feature Extraction from URLs

7

8 Classification Methods

9

10

11

12

13

14

15

16 Secure AI

17 Why Secure AI

18 Deep Learning Systems can be easily fooled

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34 Classify s

35

36

37

38 Malware Detection Static – Analyze the program (code) –
–leverage structural information (e.g. sequence of bytes) –attempts to detect malware before the program under inspection executes Dynamic – Analyze the running process – –leverage runtime information (e.g. network usage) –attempts to detect malicious behavior during program execution or after program execution.

39 Active learning – the advantage

40 Dynamic Analysis for Malware Detection in Mobile Phones
Android.Dropdialer Malware A self-updating capabilities. –Applications hosted on the Google Play Store were absolutely benign and did not contain any malware. –The malicious payload was downloaded from the Internet, after the market application was installed on the device. The downloaded malicious package sent SMS messages to premium-rate numbers. Prompts to uninstall itself after sending out the premium SMS messages.

41 Feature Chains (FC)

42 Feature Chains – detection

43

44

45 Feature Engineering Examples : DNS query address exist or not
HTTP hostname zone HTTPS/SSL certificate Flow daytime Packets inter-arrival time Total number of ACKs Count of out-of-order packets

46 Feature Engineering

47 Feature Extractor

48

49

50

51

52

53 Social Networks Security Impact
Researches shows that 36% of the personal information is shared with all 1 billion Facebooks users. 26% of the children studied in an European study had their online social network’s profile set to “public”. Currently a huge amount of information can be extracted by many different attacks like phishing, hacking, data mining etc.

54 Social Networks Security

55 Identify Faked Profiles: Communities Connection Anomaly
Fake Profiles may look real but their social structure is usually different from real profiles. Fake Profiles tend to collect random users and connect to several communities.

56 Identify faked Profiles by Link Prediction
Link prediction algorithms can estimate whether two users in a social network are connected. Users with many connections that cannot be supported by link predication algorithms may deemed to be faked.


Download ppt "When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693."

Similar presentations


Ads by Google