SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
SESSION ID:
#RSAC
Thomas Caldwell
EVOLUTION OF AI BOTS FOR REAL-TIME
ADAPTIVE SECURITY
MLN-R02
Senior Director Engineering
Webroot
Twitter: @cybersdtom
# R S A C
Swarms
# R S A C
BotNets – The Dark Side
2018 could be the year we see the first battle of the AI bots…
Cyber-Criminals build systems that can ‘learn’ and adapt to defenses…
o Nachi Worm – RPC vulnerability, Blaster removal and installed patches
o Mirai - a zombie malware strain that enslaved “Internet of Things” (IoT)
o Reaper and IoTroop - computer worms; built to spread automatically, still to
be unleashed…
o Artificial intelligence researchers warn re: internet-connected robots, with
hundreds calling on governments to ban weaponized robots.
Bots are becoming one of the fastest growing trends with intelligent
reasoning, messaging and conversational interfaces
# R S A C
Distributed BotNet Swarming
AI-Bots acting independently can’t coordinate
Require Command and Control from a
centralized source
Individual decisions are not coordinated, not
cooperative, and don’t result in consensus
AI-Bots need to interact so consensus is an
emergent property
This is an example of the fusion problem. No
fusion, no consensus.
# R S A C
AI-Bot Swarming
The AI-BotNet Swarm is a network
facilitating Communication, Collaboration,
Cooperation, and Consensus
Cognitive Contextual Awareness
Suspicious patterns of activity and
behaviors detected through ML models
Determines whether an intrusion is
beginning, present, active, or not.
Replaces legacy Rule-Based system
Infections spread faster than
humans can stop them
# R S A C
Swarming Algorithms: The Next Frontier
Vector = spatial heading
and velocity of robots
Swarms: Collective,
Collaborative, Cooperative
Can Vectors represent
cognitive behaviors and
discovered opinions?
Could Blockchain be used
for de-centralized sharing
and voting in swarms? Today’s robot Swarming Algorithms are focused
on physical spatial aspects of swarming
Heading and Velocity
y=u1 sinƟ
x=u1 cosƟ
y
x
Ɵ
u1
.
.
(speed) (heading)
collision
avoidance
Flocking
algorithms
Ant Colony
Optimizations
# R S A C
What is an AI-Bot?
o AI-Bot Capabilities
o Machine Learning
o Cyber Intelligence
o Behavioral Analysis
o Ontology
o Understands Entity State (Posture)
o Orchestration and Deception Tactics
o Reactive AI-Bots
o Reasoning AI-Bots
# R S A C
Imagine if “Alexa” is the talking knowledge base on your 3am Incident Response calls!!
Enable Increased Accuracy:
Type 1 Error - False Positive
Type 2 Error - False Negative
“Active Learning” Machine Learning asks for help
Unifies remotely distributed teams
Streamlined collaboration
Faster remediation times
Operational efficiencies
Underlying AI-Bots “Intelligently Automate”
ChatOps: Talk to your Software!
# R S A C
AI-Bot Specialists
Specialists required to build house: Electricians, Plumbers, Framers, Roofers…
Organized into squads (e.g. Navy Seal team) or police organizations
AI-Bot tools: Machine Learning, APIs to Threat Intelligence, Command & Control, Cooperative
Communication, Dialog with Human Experts
AI-Bots can use OODA loops for Contextualization (Observe, Orient, Understand, Decide, Act)
ChatOps
Observe
Orient
Decide
Act
OODA
Loop SecOps &
IR Teams
Reactive
Bots
Reasoning
Bots
End Point
Protection
Threat
Intelligence
Network
Surveillance
Active
Directory
SIEM
Human
Feedback
# R S A C
AI-Bot Demo
# R S A C
ChatOps: Security Automation
Lifecycle of an Alert Automation:
1. Your monitoring system notices
something suspicious
2. A bot sends the employee a message
in Slack:
3. “Did you do this $thing?” (2-factor
auth)
4. Employee confirms – Alert resolved
5. Employee denies or does not answer –
escalate the Alert!
6. If alert requires action, contact
employee & investigate
Automation Example 2:
1. Alice’s ssh key has been stolen
2. Attacker logs into supportserver01,
runs flurb-export
3. Monitoring system alerts Bot and asks
Alice:
4. “Hi there, I see you ran a sensitive
command, Please acknowledge”
5. The attacker cannot verify the
message without Alice’s phone – Alert
escalates to Security Team
6. The security team takes action to
disable Alice’s accounts globally
Source: Distributed Security Alerting, Ryan Huber, 2016
# R S A C
How to Implement your own ChatOps
1. Set up a Slack Chat Room
2. Set up integration between Slack and Python apps:
o Create a Webhook in Slack for simple posting
o Create a “Slack App” for reading/writing to Slack chat room
3. Many open source Python examples for posting/reading in Slack Chat
Rooms
1. For Alexa Skill, modify Python Color Expert Example, add slack hooks
2. Use your Python apps as “specialists” to integrate your security
applications via API with Slack
# R S A C
How do Bots fit into Adaptive Security?
Traditional “prevent and detect” obsolete
From “Incident Response” to “Continuous
Response”
Humans work on more complex incidents
Enormous volume of data for advanced
analytics
By 2020, 40% of large organizations will
have a “Security Intelligence Warehouse”
Machine Learning will drive Adaptive
Security
Source: Gartner
# R S A C
Cyber Threat Intelligence (CTI)
Distributed Intelligence Model
Privacy and Legal implications (GDPR)
Actionable-Contextualized
Consumable via APIs
Visibility on Bad Actors/Victims
For ML it is all about the data!
Adaptive Security Platform + CTI + AI/ML = Adaptive Response
DRM
Tactical
Strategic
Process
People
Devices
Operational
Assets
# R S A C
AI drives Adaptive Security
Artificial Intelligence:
 Deep understanding of the
context of the prediction
(semantics)
 Causal analysis of what was
detected
 Recommendation of best
response in real-time
 Digital visibility into bad actors
# R S A C
Growth of AI is on Fire!
AI began in 1980’s stalled at End of Cold War
Darpa: Three Ages of AI
o Age of Handcrafted Knowledge
o Age of Statistical Learning
o Age of Contextual Adaptation
Deep Learning pioneered as neural networks
Back then… No ML Tools, Cloud, Lots of Data
Massive AI Adoption Today:
Large Community & Culture for ML
Shared Methodologies of ML Tools
Knowledge in ML reaches critical mass
Learn Perceive
Contextual
Model
Abstract Reason
Darpa: 3rd Wave of AI
Source: William Vorhies, The Three Ages of AI – Figuring Out Where We Are
# R S A C
Applying Bots to Cyber Security
Leverage Adaptive Security combining AI/ML/CTI in your security
stack – Come up the learning curve on AI and ML
Identify specialized AI-Bots for false positive filtering and other post-
ML automation and recommendations
Evaluate ChatOps, realize the efficiency, create intelligent integrated
AI-Bots to automate background tasks
Look to the near future where swarms of AI-Bots Collaborate,
Coordinate and connect with humans to reach the right decision in
real-time (Consensus)
# R S A C
Resources
How to get started with building your own Alexa ChatOps:
AWS Lambda: create function using blueprint “alexa-skills-kit-color-expert-python”
AWS Alexa Skills: Follow color picker instructions
Slack: create chat room and a webhook, embed python REST call using your webhook to slack
“Google releases machine learning crash course, other educational AI resources”
https://9to5google.com/2018/02/28/learn-with-google-ai-machine-learning-
course/
“Building Slack Apps” https://api.slack.com/slack-apps
Topbots: https://www.topbots.com/
https://www.darpa.mil/about-us/darpa-perspective-on-ai
Note: Appreciation to my colleague Dr. William Wright who has partnered with me
in assembling this content and presentation.
#RSAC
QUESTIONS?
Tom Caldwell, Sr. Director Engineering, Webroot
tcaldwell@webroot.com
Twitter: @cybersdtom
LinkedIn: https://www.linkedin.com/in/tcaldwell/

Contenu connexe

Similaire à Evolution of-ai-bots-for-real-time-adaptive-security

Similaire à Evolution of-ai-bots-for-real-time-adaptive-security (20)

Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virus
 
Artificial intelligence ppt
Artificial intelligence pptArtificial intelligence ppt
Artificial intelligence ppt
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Ai by vaibhav joshi
Ai by vaibhav joshiAi by vaibhav joshi
Ai by vaibhav joshi
 
unleshing the the Power Azure Open AI - MCT Summit middle east 2024 Riyhad.pptx
unleshing the the Power Azure Open AI - MCT Summit middle east 2024 Riyhad.pptxunleshing the the Power Azure Open AI - MCT Summit middle east 2024 Riyhad.pptx
unleshing the the Power Azure Open AI - MCT Summit middle east 2024 Riyhad.pptx
 
AI - PAST, PRESENT, FUTURE.pptx
AI - PAST, PRESENT, FUTURE.pptxAI - PAST, PRESENT, FUTURE.pptx
AI - PAST, PRESENT, FUTURE.pptx
 
CCMENA MasterClass on AI, IoT and Blockchain combined.
CCMENA MasterClass on AI, IoT and Blockchain combined.CCMENA MasterClass on AI, IoT and Blockchain combined.
CCMENA MasterClass on AI, IoT and Blockchain combined.
 
Artificial intelligence for Engineers unit1
Artificial intelligence for Engineers unit1Artificial intelligence for Engineers unit1
Artificial intelligence for Engineers unit1
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
Emerging Tech webinar
Emerging Tech webinarEmerging Tech webinar
Emerging Tech webinar
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Artificial intelligence tapan
Artificial intelligence tapanArtificial intelligence tapan
Artificial intelligence tapan
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Artificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New VenturesArtificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New Ventures
 
3-in-1 talk on Serverless Chatbots, Alexa skills & Voice UI best practices (t...
3-in-1 talk on Serverless Chatbots, Alexa skills & Voice UI best practices (t...3-in-1 talk on Serverless Chatbots, Alexa skills & Voice UI best practices (t...
3-in-1 talk on Serverless Chatbots, Alexa skills & Voice UI best practices (t...
 
Salesforce - AI for CRM
Salesforce - AI for CRMSalesforce - AI for CRM
Salesforce - AI for CRM
 
AI for CRM e-book
AI for CRM e-bookAI for CRM e-book
AI for CRM e-book
 

Plus de DESMOND YUEN

NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, MoreNASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
DESMOND YUEN
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 

Plus de DESMOND YUEN (20)

2022-AI-Index-Report_Master.pdf
2022-AI-Index-Report_Master.pdf2022-AI-Index-Report_Master.pdf
2022-AI-Index-Report_Master.pdf
 
Small Is the New Big
Small Is the New BigSmall Is the New Big
Small Is the New Big
 
Intel® Blockscale™ ASIC Product Brief
Intel® Blockscale™ ASIC Product BriefIntel® Blockscale™ ASIC Product Brief
Intel® Blockscale™ ASIC Product Brief
 
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
Cryptography Processing with 3rd Gen Intel Xeon Scalable ProcessorsCryptography Processing with 3rd Gen Intel Xeon Scalable Processors
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
 
Intel 2021 Product Security Report
Intel 2021 Product Security ReportIntel 2021 Product Security Report
Intel 2021 Product Security Report
 
How can regulation keep up as transformation races ahead? 2022 Global regulat...
How can regulation keep up as transformation races ahead? 2022 Global regulat...How can regulation keep up as transformation races ahead? 2022 Global regulat...
How can regulation keep up as transformation races ahead? 2022 Global regulat...
 
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, MoreNASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
PUTTING PEOPLE FIRST:  ITS IS SMART COMMUNITIES AND  CITIESPUTTING PEOPLE FIRST:  ITS IS SMART COMMUNITIES AND  CITIES
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
 
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPEBUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
 
An Introduction to Semiconductors and Intel
An Introduction to Semiconductors and IntelAn Introduction to Semiconductors and Intel
An Introduction to Semiconductors and Intel
 
Changing demographics and economic growth bloom
Changing demographics and economic growth bloomChanging demographics and economic growth bloom
Changing demographics and economic growth bloom
 
Intel’s Impacts on the US Economy
Intel’s Impacts on the US EconomyIntel’s Impacts on the US Economy
Intel’s Impacts on the US Economy
 
2021 private networks infographics
2021 private networks infographics2021 private networks infographics
2021 private networks infographics
 
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
 
Accelerate Your AI Today
Accelerate Your AI TodayAccelerate Your AI Today
Accelerate Your AI Today
 
Increasing Throughput per Node for Content Delivery Networks
Increasing Throughput per Node for Content Delivery NetworksIncreasing Throughput per Node for Content Delivery Networks
Increasing Throughput per Node for Content Delivery Networks
 
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
 
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm.""Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
 
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
 

Dernier

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 

Evolution of-ai-bots-for-real-time-adaptive-security

  • 1. SESSION ID: #RSAC Thomas Caldwell EVOLUTION OF AI BOTS FOR REAL-TIME ADAPTIVE SECURITY MLN-R02 Senior Director Engineering Webroot Twitter: @cybersdtom
  • 2. # R S A C Swarms
  • 3. # R S A C BotNets – The Dark Side 2018 could be the year we see the first battle of the AI bots… Cyber-Criminals build systems that can ‘learn’ and adapt to defenses… o Nachi Worm – RPC vulnerability, Blaster removal and installed patches o Mirai - a zombie malware strain that enslaved “Internet of Things” (IoT) o Reaper and IoTroop - computer worms; built to spread automatically, still to be unleashed… o Artificial intelligence researchers warn re: internet-connected robots, with hundreds calling on governments to ban weaponized robots. Bots are becoming one of the fastest growing trends with intelligent reasoning, messaging and conversational interfaces
  • 4. # R S A C Distributed BotNet Swarming AI-Bots acting independently can’t coordinate Require Command and Control from a centralized source Individual decisions are not coordinated, not cooperative, and don’t result in consensus AI-Bots need to interact so consensus is an emergent property This is an example of the fusion problem. No fusion, no consensus.
  • 5. # R S A C AI-Bot Swarming The AI-BotNet Swarm is a network facilitating Communication, Collaboration, Cooperation, and Consensus Cognitive Contextual Awareness Suspicious patterns of activity and behaviors detected through ML models Determines whether an intrusion is beginning, present, active, or not. Replaces legacy Rule-Based system Infections spread faster than humans can stop them
  • 6. # R S A C Swarming Algorithms: The Next Frontier Vector = spatial heading and velocity of robots Swarms: Collective, Collaborative, Cooperative Can Vectors represent cognitive behaviors and discovered opinions? Could Blockchain be used for de-centralized sharing and voting in swarms? Today’s robot Swarming Algorithms are focused on physical spatial aspects of swarming Heading and Velocity y=u1 sinƟ x=u1 cosƟ y x Ɵ u1 . . (speed) (heading) collision avoidance Flocking algorithms Ant Colony Optimizations
  • 7. # R S A C What is an AI-Bot? o AI-Bot Capabilities o Machine Learning o Cyber Intelligence o Behavioral Analysis o Ontology o Understands Entity State (Posture) o Orchestration and Deception Tactics o Reactive AI-Bots o Reasoning AI-Bots
  • 8. # R S A C Imagine if “Alexa” is the talking knowledge base on your 3am Incident Response calls!! Enable Increased Accuracy: Type 1 Error - False Positive Type 2 Error - False Negative “Active Learning” Machine Learning asks for help Unifies remotely distributed teams Streamlined collaboration Faster remediation times Operational efficiencies Underlying AI-Bots “Intelligently Automate” ChatOps: Talk to your Software!
  • 9. # R S A C AI-Bot Specialists Specialists required to build house: Electricians, Plumbers, Framers, Roofers… Organized into squads (e.g. Navy Seal team) or police organizations AI-Bot tools: Machine Learning, APIs to Threat Intelligence, Command & Control, Cooperative Communication, Dialog with Human Experts AI-Bots can use OODA loops for Contextualization (Observe, Orient, Understand, Decide, Act) ChatOps Observe Orient Decide Act OODA Loop SecOps & IR Teams Reactive Bots Reasoning Bots End Point Protection Threat Intelligence Network Surveillance Active Directory SIEM Human Feedback
  • 10. # R S A C AI-Bot Demo
  • 11. # R S A C ChatOps: Security Automation Lifecycle of an Alert Automation: 1. Your monitoring system notices something suspicious 2. A bot sends the employee a message in Slack: 3. “Did you do this $thing?” (2-factor auth) 4. Employee confirms – Alert resolved 5. Employee denies or does not answer – escalate the Alert! 6. If alert requires action, contact employee & investigate Automation Example 2: 1. Alice’s ssh key has been stolen 2. Attacker logs into supportserver01, runs flurb-export 3. Monitoring system alerts Bot and asks Alice: 4. “Hi there, I see you ran a sensitive command, Please acknowledge” 5. The attacker cannot verify the message without Alice’s phone – Alert escalates to Security Team 6. The security team takes action to disable Alice’s accounts globally Source: Distributed Security Alerting, Ryan Huber, 2016
  • 12. # R S A C How to Implement your own ChatOps 1. Set up a Slack Chat Room 2. Set up integration between Slack and Python apps: o Create a Webhook in Slack for simple posting o Create a “Slack App” for reading/writing to Slack chat room 3. Many open source Python examples for posting/reading in Slack Chat Rooms 1. For Alexa Skill, modify Python Color Expert Example, add slack hooks 2. Use your Python apps as “specialists” to integrate your security applications via API with Slack
  • 13. # R S A C How do Bots fit into Adaptive Security? Traditional “prevent and detect” obsolete From “Incident Response” to “Continuous Response” Humans work on more complex incidents Enormous volume of data for advanced analytics By 2020, 40% of large organizations will have a “Security Intelligence Warehouse” Machine Learning will drive Adaptive Security Source: Gartner
  • 14. # R S A C Cyber Threat Intelligence (CTI) Distributed Intelligence Model Privacy and Legal implications (GDPR) Actionable-Contextualized Consumable via APIs Visibility on Bad Actors/Victims For ML it is all about the data! Adaptive Security Platform + CTI + AI/ML = Adaptive Response DRM Tactical Strategic Process People Devices Operational Assets
  • 15. # R S A C AI drives Adaptive Security Artificial Intelligence:  Deep understanding of the context of the prediction (semantics)  Causal analysis of what was detected  Recommendation of best response in real-time  Digital visibility into bad actors
  • 16. # R S A C Growth of AI is on Fire! AI began in 1980’s stalled at End of Cold War Darpa: Three Ages of AI o Age of Handcrafted Knowledge o Age of Statistical Learning o Age of Contextual Adaptation Deep Learning pioneered as neural networks Back then… No ML Tools, Cloud, Lots of Data Massive AI Adoption Today: Large Community & Culture for ML Shared Methodologies of ML Tools Knowledge in ML reaches critical mass Learn Perceive Contextual Model Abstract Reason Darpa: 3rd Wave of AI Source: William Vorhies, The Three Ages of AI – Figuring Out Where We Are
  • 17. # R S A C Applying Bots to Cyber Security Leverage Adaptive Security combining AI/ML/CTI in your security stack – Come up the learning curve on AI and ML Identify specialized AI-Bots for false positive filtering and other post- ML automation and recommendations Evaluate ChatOps, realize the efficiency, create intelligent integrated AI-Bots to automate background tasks Look to the near future where swarms of AI-Bots Collaborate, Coordinate and connect with humans to reach the right decision in real-time (Consensus)
  • 18. # R S A C Resources How to get started with building your own Alexa ChatOps: AWS Lambda: create function using blueprint “alexa-skills-kit-color-expert-python” AWS Alexa Skills: Follow color picker instructions Slack: create chat room and a webhook, embed python REST call using your webhook to slack “Google releases machine learning crash course, other educational AI resources” https://9to5google.com/2018/02/28/learn-with-google-ai-machine-learning- course/ “Building Slack Apps” https://api.slack.com/slack-apps Topbots: https://www.topbots.com/ https://www.darpa.mil/about-us/darpa-perspective-on-ai Note: Appreciation to my colleague Dr. William Wright who has partnered with me in assembling this content and presentation.
  • 19. #RSAC QUESTIONS? Tom Caldwell, Sr. Director Engineering, Webroot tcaldwell@webroot.com Twitter: @cybersdtom LinkedIn: https://www.linkedin.com/in/tcaldwell/