Presentation is loading. Please wait.

Presentation is loading. Please wait.

Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence.

Similar presentations


Presentation on theme: "Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence."— Presentation transcript:

1 Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence to adapt cybersecurity tools to the needs of (naïve) individual users.

2 Individual user differences Security needs - Data confidentiality - Data-loss tolerance - Recovery costs Usage patterns Computer knowledge Different users need different security tools.

3 Problem Inflexible engineered solutions with “too much security” - Too high security at high costs - Insufficient customization options “Advanced user” assumption - Complicated customization - Unclear security warnings

4 Examples Typical response of naïve users: Always no (too much security) Always yes (not enough security) Ask a techie if available

5 Population statistics Computer use by age and gender User naïveté correct answers

6 Population statistics Almost everyone uses a computer Most users are naïve, with very limited technical knowledge Many security problems are due to the user naïveté When an average user deals with security issues, she often needs basic advice and handholding.

7 Long-term goal We need an automated security assistant that learns the needs of the individual user and helps the user to apply security tools.

8 Research problems Learning about the user - Usage patterns - Technical knowledge - Security choices Elicitation of security needs - Understandable questions - Optimized question selection - Conversion of the elicited answers to appropriate security settings Understandable warnings - Not-Sure response option - Explanation customized to the user technical knowledge - Advice customized to the user needs - Optimization of yes/no decisions Learning across multiple users - Learning from observations - Integration of expert advice - Distributed processing of massive data

9 Architecture Model Const- ruction Model Evalu- ation Question Selection Security Decision Optimizer current model model utility and limitations questions answers and observations Top-Level Control Data Collection


Download ppt "Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence."

Similar presentations


Ads by Google