SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
1 www.smartlearninguk.com
Wale Omolere
25/08/2020
2 www.smartlearninguk.com2 www.smartlearninguk.com
Role of Artificial Intelligence in Cyber
Security
Wale Omolere Role of Ai in cyber security
3 www.smartlearninguk.com3 www.smartlearninguk.com
What is Artificial Intelligence?
AI broadly refers to the ability of machines
to "think" like humans and perform tasks
considered "smart," without explicitly being
programmed to do so.
ML is a subset of AI. ML algorithms build a
mathematical model based on training
data, and they leverage the model to make
predictions when new data is provided
Source: pwc
Wale Omolere Role of Ai in cyber security
4 www.smartlearninguk.com4 www.smartlearninguk.com
Ochestrate
&
Automate
Process
&
structure
Orchestrate and Automate tasks
that humans can perform
without a problem to a much
larger volume we could ever
handle
Artificial Intelligence
Process and structure huge
volumes of data
including analysis of the
complex relationships within
it
Wale Omolere Role of Ai in cyber security
5 www.smartlearninguk.com5 www.smartlearninguk.com
Unsupervised
Supervised
Reinforcement
SUPERVISED
Machine learns by using labelled
data
Regressions & Classification
Labelled data
External supervision
Maps labelled inputs to known
outputs
UNSUPERVISED
Machine is trained on an unlabelled
data without any guidance
Association & Clustering
Unlabelled data
No supervision
Understands patterns & discovers the
outputs
REINFORCEMENT
Agent interacts with its environment by
performing actions & learning from errors or
reward
Reward-based
No predefined data
Follows the trial-and-error method
RN
LEA
ING
Machine Learning Algorithms – overview of ML underlaying technologies
Wale Omolere Role of Ai in cyber security
6 www.smartlearninguk.com6 www.smartlearninguk.com
Deep Learning
Data Requirement – Requires large data
Accuracy – Provider higher accuracy
Training Time – Takes longer to train
Hardware Dependency – Requires GPU to training
properly
Hyperparameter Tuning – Can be tuned in various
different ways
Learning
Machine Learning
Data Requirement – can train on lesser data
Accuracy – Gives lesser accuracy
Training Time – Takes less time to train
Hardware Dependency – Train on CPU
Hyperparameter Tuning – Limited tuning capabilities
Wale Omolere Role of Ai in cyber security
7 www.smartlearninguk.com7 www.smartlearninguk.com
Supervised learning is when a model learns from a labeled dataset with
guidance. And, Unsupervised learning is where the machine is given
training based on unlabeled data without any guidance. Whereas
Reinforcement learning is when a machine or an agent interacts with its
environment, performs actions, and learns by a trial-and-error method.
.
AI Learning Model – in a nutshell
Wale Omolere Role of Ai in cyber security
8 www.smartlearninguk.com8 www.smartlearninguk.com
AI is Math
Advanced and new
application of Statistics
Artificial General
Intelligence
Intelligence of a machine that
could successfully perform any
intellectual task
Machine Learning
Ability for (machines) to learn
without being explicitly
programmed – predictions
based on data sets
Deep Learning
“New ML” that recognizes
patterns - wider range of data
resources, less data pre-
processing by humans,
produce more accurate
results
Swarm technology
Collective behaviour of
decentralized, self-
organized systems,
natural or artificial -
Already used in drones
and fledgling robotics
devices
Overview of AI
Source : researchgate.com
Wale Omolere Role of Ai in cyber security
9 www.smartlearninguk.com9 www.smartlearninguk.com
AI in Cybersecurity
Wale Omolere Role of Ai in cyber security
10 www.smartlearninguk.com10 www.smartlearninguk.com
Network security
Application security
Information security
Operational security
Disaster recovery &
Business Continuity
End-user education
Cyber Security is the practice of
defending computers, servers,
mobile devices, electronic
systems, networks and data from
malicious attacks
What is Cyber Security?
Wale Omolere Role of Ai in cyber security
11 www.smartlearninguk.com11 www.smartlearninguk.com
Virus, Trojan,
Spyware,
Ransomware,
Adware, Botnets
Malware
Email phishing,
Spear phishing,
Whaling, Vishing &
Smishing
Phishing
Application-layer
flood, Distributed
Denial of Service
Attacks (DDoS)
Denial-of-service
attack
SQL injection
In-band SQLi
(Classic), Inferential
SQLi (Blind) and Out-
of-band SQLi
Man-in-the middle
attack
Man-in-the browser
(MitB)
01 02 03 04 05
Types of cyber threats
Wale Omolere Role of Ai in cyber security
12 www.smartlearninguk.com12 www.smartlearninguk.com
02 | Manual
Manual threat hunting—can be
expensive and time-consuming,
resulting in more unnoticed attacks.
04 | Hackers
Hackers often hide and change their
IP addresses—hackers use different
programs like Virtual Private Networks
(VPN), Proxy servers, Tor browsers, and
more. These programs help hackers
stay anonymous and undetected.
01 | Defence Paradigm
Defence paradigm based on
previous knowledge of attacks—
inefficient against zero-day and
variations
03 | Reactive
Reactive nature of cybersecurity—
companies can resolve problems
only after they have already
happened. Predicting threats before
they occur is a great challenge for
security experts.
Key flaws of Cyber Security
Wale Omolere Role of Ai in cyber security
13 www.smartlearninguk.com13 www.smartlearninguk.com
The next generation of cyber security products are increasingly incorporating Artificial
Intelligence (AI) and Machine Learning (ML) technologies. By training AI software on large
datasets of cyber security, network, and even physical information, cyber security solutions
providers aim to detect and block abnormal behaviour.
There are different approaches to using AI for cyber security, and it is important first to
determine which is appropriate for the organization. Some software applications analyse
raw network data to spot an irregularity, while others focus on user/asset/entity behaviour to
detect patterns that deviate from normal. The types of data streams, how they are collected,
and the level of effort needed by analysts all vary by approach.
Artificial Intelligence for Cyber Security
Wale Omolere Role of Ai in cyber security
14 www.smartlearninguk.com14 www.smartlearninguk.com
Offensive security – is a proactive and adversarial approach to protecting
computer systems, networks and individuals from attacks
Defensive security – offensive security measures are focused on seeking
out the perpetrators and in some cases attempting to disable or at least
disrupt their operations.
AI in Cyber Security techniques
Wale Omolere Role of Ai in cyber security
15 www.smartlearninguk.com15 www.smartlearninguk.com
Vulnerability
Management
User and Entity
Behaviour Analytics
VM BA
Malware detection Anti Spam
M A
Data Classification
DC
Intrusion Detection &
Prevention
I
Defensive AI (Blue Team)
Cyber Threat
Intelligence (CTI)
CTI
Wale Omolere Role of Ai in cyber security
16 www.smartlearninguk.com16 www.smartlearninguk.com
04 Conditional attacks 05 Classifying victims
CA CV
01 Malware creations 02 Smart botnets
MC SB
06 Adversarial AI
AAI
03 Spear phishing
SP
Offensive AI (Red Team)
Wale Omolere Role of Ai in cyber security
17 www.smartlearninguk.com17 www.smartlearninguk.com
Data poisoning
Feedback
Weaponization
Adversarial Inputs
Model stealing
Adversarial AI
Wale Omolere Role of Ai in cyber security
18 www.smartlearninguk.com18 www.smartlearninguk.com
SAP NS2 CrowdStrike
S C
Cylance Carbon Black
C CB
Webroot
W
Darktrace
D
Cyber Security Application Using AI
Callsign
C
Wale Omolere Role of Ai in cyber security
19 www.smartlearninguk.com19 www.smartlearninguk.com
AI for Network
Threat Identification
AI-based Antivirus
Software
AI for Fighting AI
Threats
AI for Email
Monitoring
AI-based User
Behaviour
Modelling
01 02 03 04 05
AI Cyber Security Use Case
Wale Omolere Role of Ai in cyber security
20 www.smartlearninguk.com20 www.smartlearninguk.com
What Resources Does the
System Require?
What About Recurring and
Additive Costs?
Can the System Adapt as
Your Network Evolves and
Expands?
How does the AI learn?
What volume of data is
required?
How often is retraining
needed?
The considerations you should make
when choosing an AI-based platform
How to Choose an AI-based
Cyber Security Platform
Is the solution efficient? Is It Really Unsupervised?
What are the error rates? Is the error rate acceptable
to achieve detection?
Wale Omolere Role of Ai in cyber security
21 www.smartlearninguk.com21 www.smartlearninguk.com
https://www.researchgate.net/publication/236346414_AN_OVERVIEW_OF_ARTIFICIAL_INTELLIGENCE
https://www.techopedia.com/definition/30389/supervised-learning
https://www.kaspersky.co.uk/resource-center/definitions/what-is-cyber-security
https://cyberstartupobservatory.com/cyber-security-next-generation-challenges-threats-and-defense/
https://www.computer.org/publications/tech-news/trends/the-impact-of-ai-on-cybersecurity
https://mixmode.ai/wp-content/uploads/2020/08/MixMode-Guide-for-AI-based-Cybersecurity-Systems-2.pdf
Reference
Wale Omolere Role of Ai in cyber security
22 www.smartlearninguk.com22 www.smartlearninguk.com
THANK YOU for LISTENING its
QUESTION TIME

Contenu connexe

Tendances

Tendances (20)

Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
AI in security
AI in securityAI in security
AI in security
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 

Similaire à Artificial Intelligence in cybersecurity

[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
DataScienceConferenc1
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 

Similaire à Artificial Intelligence in cybersecurity (20)

Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
 
AI and Machine Learning in Cybersecurity.pdf
AI and Machine Learning in Cybersecurity.pdfAI and Machine Learning in Cybersecurity.pdf
AI and Machine Learning in Cybersecurity.pdf
 
Machine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdfMachine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdf
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
 
CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in Cybersecurity
 
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewRole of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
 
Emerging Tech webinar
Emerging Tech webinarEmerging Tech webinar
Emerging Tech webinar
 
Artificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillanceArtificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillance
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Artificial Intelligence in cybersecurity