SlideShare a Scribd company logo
1 of 29
AI & ML in Cyber Security
Welcome Back To 1999 - Security Hasnโ€™t Changed
Raffael Marty
VP Security Analytics
BSides Vancouver
March 2017
Disclaimer
ยฉ Raffael Marty 2
"This presentation was prepared solely by Raffael
Marty in his personal capacity. The material, views,
and opinions expressed in this presentation are the
author's own and do not reflect the views of Sophos
Ltd. or its affiliates."
Raffael Marty
โ€ข Sophos
โ€ข PixlCloud
โ€ข Loggly
โ€ข Splunk
โ€ข ArcSight
โ€ข IBM Research
โ€ข SecViz
โ€ข Logging
โ€ข Big Data
โ€ข SIEM
โ€ข Leadership
โ€ข Zen
My Provocative Premise
โ€ข Cyber Defense / Monitoring / Analytics is still at the level of 1999
โ€ข We canโ€™t predict the weather and we have done it since 1 August 1861
o โ€œThe weather predicted by the BBC for four days time was just 30-40% accurateโ€
โ€ข Predicting election results anyone?
o โ€œ80% chance Clinton will win.โ€
Outline
5
โ€ข Nothing Has Changed in Security (Defense)
โ€ข Machine Learning & Artificial Intelligence
โ€ข Visualization
โ€ข Now What?
Nothing Has Changed in Security
Since 1999
Summary of Technologies
โ€ข Firewalls โ€“ policy management, auditing a challenge
โ€ข IDS/IPS โ€“ false positives
โ€ข Threat Intelligence โ€“ really the same as IDS signatures
โ€ข DLP โ€“ just an IDS engine
โ€ข Vulnerability Scanners โ€“ whatโ€™s up with those old user interfaces?
โ€ข SIEM โ€“ still the same issues: parsing, context, prioritization
โ€ข Security Analytics โ€“ can actually mostly be done with your SIEM
Machine
Learning
8http://theconversation.com/your-questions-answered-on-artificial-intelligence-49645
& Artificial
Intelligence
Is this the answer to all of our
security problems? Is ML and AI
what we have been waiting for?
Definitions
โ€ขStatistics - quantifies numbers
โ€ขData Mining - explains patterns
โ€ขMachine Learning - predicts with models
โ€ขArtificial Intelligence - behaves and reasons
Machine Learning / Data Mining
10
โ€ข Anomaly detection (outlier detection)
o Whatโ€™s โ€œnormalโ€?
โ€ข Association rule learning (e.g., items purchased together)
โ€ข Clustering
โ€ข Classification
โ€ข Regression (model the data)
โ€ข Summarization
Data Mining in Security
The graph shows an abstract
space with colors being machine
identified clusters.
Machine Learning in Security
โ€ขNeeds a corpus of data to learn from
โ€ขNetwork traffic analysis
still not working
oNo labeled data
o Not sure what the right
features should be
โ€ขWorks okay for SPAM
and malware
classification
Artificial Intelligence in Security
โ€ขJust calling something AI doesnโ€™t make it AI.
โ€A program that doesn't simply classify or compute model
parameters, but comes up with novel knowledge that a
security analyst finds insightful.โ€
Artificial Narrow Intelligence (ANI)
โ€ข Computer programs we have today that perform a specific, narrow task: Deep Blue, Amazon recommendations
Artificial General Intelligence (AGI)
โ€ข A program that could learn to complete any task
โ€ข What many of us imagine when we think of AI, but no one has managed to accomplish it yet
Artificial Superintelligence (ASI)
โ€ข Any computer program that is all-around smarter than a human (also see the singularity by Ray Kurzweil)
https://www.chemheritage.org/distillations/magazine/thinking-machines-the-search-for-artificial-intelligence
The Law of Accelerating Returns โ€“ Ray Kurzweil
http://waitbutwhy.com/2015/01/artificial-intelligence-revolution-1.html
ML Looses
15
โ€ข We have tried many thing:
o Social Network Analysis
o Seasonality detection
o Entropy over time
o Frequent pattern mining
o Clustering
โ€ข All kinds of challenges
o Characterize normal
o Extract what has been learned
o Statistical vs. domain anomalies
โ€ข Simple works!
Simple - Data Abstraction
16
Simple Works - Monitor Password Resets
17
threshold
outliers have different magnitudes
Approximate Curve
18
fitting a curve distance to curve
Data Mining Applied
19
โ€ข Some would sell this as AI
better
threshold
2
0
Simple Works โ€“
Visualization
S e c u r i t y . A n a l y t i c s . I n s i g h t .
โ€œHow Can We See,
Not To Confirm - But
To Learnโ€
- Edward Tufte
Why Visualization?
22
dport
time
Areas To Explore
โ€ข Environment specific rather than environment agnostic approaches
o Same IDS signatures for everyone? Same SIEM signatures?
o Real-time threat intel sharing
โ€ข Context
o Users donโ€™t think in IP addresses, they think about users
o Topology mapping anyone?
o User-based policies, not machine based
o Adaptive security
โ€ข Capture expert knowledge
o Collaborative efforts
โ€ข Forget about 3D visualization ๐Ÿ˜Š
Promising Approaches That Will โ€œChangeโ€ Security
โ€ข Continuous authentication
โ€ข Dynamic policy decisions โ€“ automation โ€“ really closing the loop
o But what products do this well? Open APIs, low f/p, etc.
โ€ข Micro segmentation (including SDN?)
โ€ข Real-time threat intelligence sharing
โ€ข Human assisted machine learning systems
โ€ข Crowd sourcing
โ€ข End-user involved / assisted decision making
โ€ข Eradicate phishing, please!
How Will ML / AI Help?
โ€ข Machine learning consists of algorithms that need data
o Garbage in - garbage out
o Data formats and semantics
โ€ข Deep learning is just another ML algorithm
o Malware classification (it isnโ€™t necessarily better than other ML algorithms)
o Basically eliminates the feature engineering step
โ€ข Many inherent challenges (see https://www.youtube.com/watch?v=CEAMF0TaUUU)
o Distance functions
o Context โ€“ need input from HR systems and others
o Choice of algorithm
o Etc.
โ€ข Where to use ML
o Classification problems (traffic, binaries, activities, etc.)
o There is good work being done on automating the level 1 analyst
o Look for systems that leverage humans in the loop (see topic of knowledge capture)
Security Visualization Community
26
โ€ข http://secviz.org
โ€ข List: secviz.org/mailinglist
โ€ข Twitter: @secviz
Share, discuss, challenge, and learn about security visualization.
27
Visual Analytics -
Delivering Actionable Security
Intelligence
July 22-25 2017, Las Vegas
big data | analytics | visualization
BlackHat Workshop
Sophos โ€“ Security Made Simple
28
โ€ข Products usable by non experts
delightful for the security analyst
โ€ข Consolidating security capabilities
โ€ข Data science to SOLVE problems
not to highlight issues
Analytics
UTM/Next-Gen Firewall
Wireless
Web
Email
Disk Encryption
File Encryption
Endpoint /
Next-Gen Endpoint
Mobile
Server
Sophos Central
Questions?
29
http://slideshare.net/zrlram
@raffaelmarty

More Related Content

What's hot

How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
ย 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber SecurityRajathV2
ย 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackAlistair Gillespie
ย 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
ย 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
ย 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
ย 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
ย 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
ย 
The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?Raffael Marty
ย 
Security and Privacy of Machine Learning
Security and Privacy of Machine LearningSecurity and Privacy of Machine Learning
Security and Privacy of Machine LearningPriyanka Aash
ย 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
ย 
Microsoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine LearningMicrosoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine LearningSetu Chokshi
ย 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityDr. Umesh Rao.Hodeghatta
ย 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain BGA Cyber Security
ย 
Machine learning
Machine learningMachine learning
Machine learningeonx_32
ย 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecuritySmartlearningUK
ย 
Machine Learning
Machine LearningMachine Learning
Machine LearningRahul Kumar
ย 
Introduction to-machine-learning
Introduction to-machine-learningIntroduction to-machine-learning
Introduction to-machine-learningBabu Priyavrat
ย 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
ย 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptxAjit Wadhawan
ย 

What's hot (20)

How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
ย 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
ย 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
ย 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
ย 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
ย 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
ย 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
ย 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
ย 
The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?
ย 
Security and Privacy of Machine Learning
Security and Privacy of Machine LearningSecurity and Privacy of Machine Learning
Security and Privacy of Machine Learning
ย 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
ย 
Microsoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine LearningMicrosoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine Learning
ย 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
ย 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
ย 
Machine learning
Machine learningMachine learning
Machine learning
ย 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
ย 
Machine Learning
Machine LearningMachine Learning
Machine Learning
ย 
Introduction to-machine-learning
Introduction to-machine-learningIntroduction to-machine-learning
Introduction to-machine-learning
ย 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
ย 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
ย 

Viewers also liked

Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at ScaleRaffael Marty
ย 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
ย 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
ย 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big DataRaffael Marty
ย 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityRaffael Marty
ย 
Cyber Security โ€“ How Visual Analytics Unlock Insight
Cyber Security โ€“ How Visual Analytics Unlock InsightCyber Security โ€“ How Visual Analytics Unlock Insight
Cyber Security โ€“ How Visual Analytics Unlock InsightRaffael Marty
ย 
3Com 023-11705-0001
3Com 023-11705-00013Com 023-11705-0001
3Com 023-11705-0001savomir
ย 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRaffael Marty
ย 
Sisu - 2ยบ remanejamento UPE
Sisu - 2ยบ remanejamento UPESisu - 2ยบ remanejamento UPE
Sisu - 2ยบ remanejamento UPEPortal NE10
ย 
Arquitectura
ArquitecturaArquitectura
ArquitecturaMaria Camila
ย 
Suomi nyt
Suomi nytSuomi nyt
Suomi nytslidesharexi
ย 
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoTWSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoTWSO2
ย 
ะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพ
ะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพ
ะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพaliusia77
ย 
ะะตะทะฐะปะตะถะฝั–ัั‚ัŒ
ะะตะทะฐะปะตะถะฝั–ัั‚ัŒะะตะทะฐะปะตะถะฝั–ัั‚ัŒ
ะะตะทะฐะปะตะถะฝั–ัั‚ัŒaliusia77
ย 
In-Memory Computing Webcast. Market Predictions 2017
In-Memory Computing Webcast. Market Predictions 2017In-Memory Computing Webcast. Market Predictions 2017
In-Memory Computing Webcast. Market Predictions 2017SingleStore
ย 
Real-Time Analytics with Confluent and MemSQL
Real-Time Analytics with Confluent and MemSQLReal-Time Analytics with Confluent and MemSQL
Real-Time Analytics with Confluent and MemSQLSingleStore
ย 
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...Amazon Web Services
ย 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data VisualizationRaffael Marty
ย 

Viewers also liked (20)

Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
ย 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
ย 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
ย 
AfterGlow
AfterGlowAfterGlow
AfterGlow
ย 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
ย 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
ย 
Cyber Security โ€“ How Visual Analytics Unlock Insight
Cyber Security โ€“ How Visual Analytics Unlock InsightCyber Security โ€“ How Visual Analytics Unlock Insight
Cyber Security โ€“ How Visual Analytics Unlock Insight
ย 
3Com 023-11705-0001
3Com 023-11705-00013Com 023-11705-0001
3Com 023-11705-0001
ย 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event Analysis
ย 
Sisu - 2ยบ remanejamento UPE
Sisu - 2ยบ remanejamento UPESisu - 2ยบ remanejamento UPE
Sisu - 2ยบ remanejamento UPE
ย 
Arquitectura
ArquitecturaArquitectura
Arquitectura
ย 
Suomi nyt
Suomi nytSuomi nyt
Suomi nyt
ย 
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoTWSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
ย 
ะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพ
ะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพ
ะั–ะฝะฐ ะœะฐั‚ะฒั–ั”ะฝะบะพ
ย 
ะะตะทะฐะปะตะถะฝั–ัั‚ัŒ
ะะตะทะฐะปะตะถะฝั–ัั‚ัŒะะตะทะฐะปะตะถะฝั–ัั‚ัŒ
ะะตะทะฐะปะตะถะฝั–ัั‚ัŒ
ย 
In-Memory Computing Webcast. Market Predictions 2017
In-Memory Computing Webcast. Market Predictions 2017In-Memory Computing Webcast. Market Predictions 2017
In-Memory Computing Webcast. Market Predictions 2017
ย 
Real-Time Analytics with Confluent and MemSQL
Real-Time Analytics with Confluent and MemSQLReal-Time Analytics with Confluent and MemSQL
Real-Time Analytics with Confluent and MemSQL
ย 
Azure iot
Azure iotAzure iot
Azure iot
ย 
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...
ย 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
ย 

Similar to AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed

influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in ISISACA Riyadh
ย 
Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)
Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)
Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)Agence du Numรฉrique (AdN)
ย 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
ย 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxyugandharadahiphale2
ย 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxyugandharadahiphale2
ย 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
ย 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actorsOWASP EEE
ย 
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
Defcon 21-pinto-defending-networks-machine-learning by pseudor00tDefcon 21-pinto-defending-networks-machine-learning by pseudor00t
Defcon 21-pinto-defending-networks-machine-learning by pseudor00tpseudor00t overflow
ย 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
ย 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTrupti Shiralkar, CISSP
ย 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
ย 
Emerging trends in Artificial intelligence - A deeper review
Emerging trends in Artificial intelligence - A deeper reviewEmerging trends in Artificial intelligence - A deeper review
Emerging trends in Artificial intelligence - A deeper reviewGopi Krishna Nuti
ย 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
ย 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
ย 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Kalilur Rahman
ย 
IT security for all. Bootcamp slides
IT security for all. Bootcamp slidesIT security for all. Bootcamp slides
IT security for all. Bootcamp slidesWallarm
ย 
SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...
SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...
SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...NUS-ISS
ย 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
ย 
20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentationTim Willoughby
ย 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelAlex Pinto
ย 

Similar to AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed (20)

influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
ย 
Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)
Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)
Prรฉsentation de Bruno Schroder au 20e #mforum (07/12/2016)
ย 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
ย 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
ย 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
ย 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
ย 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
ย 
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
Defcon 21-pinto-defending-networks-machine-learning by pseudor00tDefcon 21-pinto-defending-networks-machine-learning by pseudor00t
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
ย 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
ย 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
ย 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
ย 
Emerging trends in Artificial intelligence - A deeper review
Emerging trends in Artificial intelligence - A deeper reviewEmerging trends in Artificial intelligence - A deeper review
Emerging trends in Artificial intelligence - A deeper review
ย 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
ย 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
ย 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
ย 
IT security for all. Bootcamp slides
IT security for all. Bootcamp slidesIT security for all. Bootcamp slides
IT security for all. Bootcamp slides
ย 
SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...
SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...
SkillsFuture Festival at NUS 2019- Artificial Intelligence for Everyone - A P...
ย 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
ย 
20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentation
ย 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
ย 

More from Raffael Marty

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's AdvantageRaffael Marty
ย 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
ย 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
ย 
Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?Raffael Marty
ย 
Artificial Intelligence โ€“ Time Bomb or The Promised Land?
Artificial Intelligence โ€“ Time Bomb or The Promised Land?Artificial Intelligence โ€“ Time Bomb or The Promised Land?
Artificial Intelligence โ€“ Time Bomb or The Promised Land?Raffael Marty
ย 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIRaffael Marty
ย 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0Raffael Marty
ย 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
ย 
The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?Raffael Marty
ย 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxRaffael Marty
ย 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big DataRaffael Marty
ย 
Supercharging Visualization with Data Mining
Supercharging Visualization with Data MiningSupercharging Visualization with Data Mining
Supercharging Visualization with Data MiningRaffael Marty
ย 
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step BackSecurity Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step BackRaffael Marty
ย 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceRaffael Marty
ย 
Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Raffael Marty
ย 
Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006Raffael Marty
ย 
Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007Raffael Marty
ย 

More from Raffael Marty (17)

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
ย 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
ย 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
ย 
Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 โ€“ Will We Learn From Our Mistakes?
ย 
Artificial Intelligence โ€“ Time Bomb or The Promised Land?
Artificial Intelligence โ€“ Time Bomb or The Promised Land?Artificial Intelligence โ€“ Time Bomb or The Promised Land?
Artificial Intelligence โ€“ Time Bomb or The Promised Land?
ย 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
ย 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
ย 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
ย 
The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?The Heatmapโ€จ - Why is Security Visualization so Hard?
The Heatmapโ€จ - Why is Security Visualization so Hard?
ย 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization Linux
ย 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big Data
ย 
Supercharging Visualization with Data Mining
Supercharging Visualization with Data MiningSupercharging Visualization with Data Mining
Supercharging Visualization with Data Mining
ย 
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step BackSecurity Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
ย 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security Intelligence
ย 
Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006
ย 
Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006
ย 
Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007
ย 

Recently uploaded

Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...nirzagarg
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹nirzagarg
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...nilamkumrai
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
ย 

Recently uploaded (20)

Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 

AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed

  • 1. AI & ML in Cyber Security Welcome Back To 1999 - Security Hasnโ€™t Changed Raffael Marty VP Security Analytics BSides Vancouver March 2017
  • 2. Disclaimer ยฉ Raffael Marty 2 "This presentation was prepared solely by Raffael Marty in his personal capacity. The material, views, and opinions expressed in this presentation are the author's own and do not reflect the views of Sophos Ltd. or its affiliates."
  • 3. Raffael Marty โ€ข Sophos โ€ข PixlCloud โ€ข Loggly โ€ข Splunk โ€ข ArcSight โ€ข IBM Research โ€ข SecViz โ€ข Logging โ€ข Big Data โ€ข SIEM โ€ข Leadership โ€ข Zen
  • 4. My Provocative Premise โ€ข Cyber Defense / Monitoring / Analytics is still at the level of 1999 โ€ข We canโ€™t predict the weather and we have done it since 1 August 1861 o โ€œThe weather predicted by the BBC for four days time was just 30-40% accurateโ€ โ€ข Predicting election results anyone? o โ€œ80% chance Clinton will win.โ€
  • 5. Outline 5 โ€ข Nothing Has Changed in Security (Defense) โ€ข Machine Learning & Artificial Intelligence โ€ข Visualization โ€ข Now What?
  • 6. Nothing Has Changed in Security Since 1999
  • 7. Summary of Technologies โ€ข Firewalls โ€“ policy management, auditing a challenge โ€ข IDS/IPS โ€“ false positives โ€ข Threat Intelligence โ€“ really the same as IDS signatures โ€ข DLP โ€“ just an IDS engine โ€ข Vulnerability Scanners โ€“ whatโ€™s up with those old user interfaces? โ€ข SIEM โ€“ still the same issues: parsing, context, prioritization โ€ข Security Analytics โ€“ can actually mostly be done with your SIEM
  • 8. Machine Learning 8http://theconversation.com/your-questions-answered-on-artificial-intelligence-49645 & Artificial Intelligence Is this the answer to all of our security problems? Is ML and AI what we have been waiting for?
  • 9. Definitions โ€ขStatistics - quantifies numbers โ€ขData Mining - explains patterns โ€ขMachine Learning - predicts with models โ€ขArtificial Intelligence - behaves and reasons
  • 10. Machine Learning / Data Mining 10 โ€ข Anomaly detection (outlier detection) o Whatโ€™s โ€œnormalโ€? โ€ข Association rule learning (e.g., items purchased together) โ€ข Clustering โ€ข Classification โ€ข Regression (model the data) โ€ข Summarization
  • 11. Data Mining in Security The graph shows an abstract space with colors being machine identified clusters.
  • 12. Machine Learning in Security โ€ขNeeds a corpus of data to learn from โ€ขNetwork traffic analysis still not working oNo labeled data o Not sure what the right features should be โ€ขWorks okay for SPAM and malware classification
  • 13. Artificial Intelligence in Security โ€ขJust calling something AI doesnโ€™t make it AI. โ€A program that doesn't simply classify or compute model parameters, but comes up with novel knowledge that a security analyst finds insightful.โ€ Artificial Narrow Intelligence (ANI) โ€ข Computer programs we have today that perform a specific, narrow task: Deep Blue, Amazon recommendations Artificial General Intelligence (AGI) โ€ข A program that could learn to complete any task โ€ข What many of us imagine when we think of AI, but no one has managed to accomplish it yet Artificial Superintelligence (ASI) โ€ข Any computer program that is all-around smarter than a human (also see the singularity by Ray Kurzweil) https://www.chemheritage.org/distillations/magazine/thinking-machines-the-search-for-artificial-intelligence
  • 14. The Law of Accelerating Returns โ€“ Ray Kurzweil http://waitbutwhy.com/2015/01/artificial-intelligence-revolution-1.html
  • 15. ML Looses 15 โ€ข We have tried many thing: o Social Network Analysis o Seasonality detection o Entropy over time o Frequent pattern mining o Clustering โ€ข All kinds of challenges o Characterize normal o Extract what has been learned o Statistical vs. domain anomalies โ€ข Simple works!
  • 16. Simple - Data Abstraction 16
  • 17. Simple Works - Monitor Password Resets 17 threshold outliers have different magnitudes
  • 18. Approximate Curve 18 fitting a curve distance to curve
  • 19. Data Mining Applied 19 โ€ข Some would sell this as AI better threshold
  • 21. S e c u r i t y . A n a l y t i c s . I n s i g h t . โ€œHow Can We See, Not To Confirm - But To Learnโ€ - Edward Tufte
  • 23. Areas To Explore โ€ข Environment specific rather than environment agnostic approaches o Same IDS signatures for everyone? Same SIEM signatures? o Real-time threat intel sharing โ€ข Context o Users donโ€™t think in IP addresses, they think about users o Topology mapping anyone? o User-based policies, not machine based o Adaptive security โ€ข Capture expert knowledge o Collaborative efforts โ€ข Forget about 3D visualization ๐Ÿ˜Š
  • 24. Promising Approaches That Will โ€œChangeโ€ Security โ€ข Continuous authentication โ€ข Dynamic policy decisions โ€“ automation โ€“ really closing the loop o But what products do this well? Open APIs, low f/p, etc. โ€ข Micro segmentation (including SDN?) โ€ข Real-time threat intelligence sharing โ€ข Human assisted machine learning systems โ€ข Crowd sourcing โ€ข End-user involved / assisted decision making โ€ข Eradicate phishing, please!
  • 25. How Will ML / AI Help? โ€ข Machine learning consists of algorithms that need data o Garbage in - garbage out o Data formats and semantics โ€ข Deep learning is just another ML algorithm o Malware classification (it isnโ€™t necessarily better than other ML algorithms) o Basically eliminates the feature engineering step โ€ข Many inherent challenges (see https://www.youtube.com/watch?v=CEAMF0TaUUU) o Distance functions o Context โ€“ need input from HR systems and others o Choice of algorithm o Etc. โ€ข Where to use ML o Classification problems (traffic, binaries, activities, etc.) o There is good work being done on automating the level 1 analyst o Look for systems that leverage humans in the loop (see topic of knowledge capture)
  • 26. Security Visualization Community 26 โ€ข http://secviz.org โ€ข List: secviz.org/mailinglist โ€ข Twitter: @secviz Share, discuss, challenge, and learn about security visualization.
  • 27. 27 Visual Analytics - Delivering Actionable Security Intelligence July 22-25 2017, Las Vegas big data | analytics | visualization BlackHat Workshop
  • 28. Sophos โ€“ Security Made Simple 28 โ€ข Products usable by non experts delightful for the security analyst โ€ข Consolidating security capabilities โ€ข Data science to SOLVE problems not to highlight issues Analytics UTM/Next-Gen Firewall Wireless Web Email Disk Encryption File Encryption Endpoint / Next-Gen Endpoint Mobile Server Sophos Central

Editor's Notes

  1. Have a story ready as an intro! Link that to point B (investment)
  2. What is Data Mining?
  3. `