SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Security in the age of
artificial intelligence
How A.I. will make our world more secure … or vulnerable
Filip Maertens (Faction XYZ) ● filip@faction.xyz
Artificial Intelligence
The various disciplines in
artificial intelligence (‘A.I.’)
Deep Belief Networks
Computer Vision
Audio Signal Processing
Natural Language
How intelligent is artificial
intelligence today ?
5 year old ?
How intelligent is artificial
intelligence today ?
Some of the things we are
working on. Our projects.
• Looking	at	sensors	on	a	wristband	and	learn	when	a	human	is	likely	to	show	signs	of	depression	or	PTSD
• Looking	at	car	data	(CANBUS)	and	predict	what	car	parts	are	likely	to	fail	in	the	foreseeable	future
• Building	a	transfer	learning	network	that	is	able	to	make	cooking	recipes	by	looking	at	YouTube	videos
• Based	on	smartphone	handling,	build	a	personal	profile	for	authentication	purposes
• Building	a	natural	language	processing	engine	that	is	capable	of	generating	natural	language	to	dialogue	with	
human	counterparts
• Learn	how	humans	handle	an	application	and	dynamically	change	the	flow	so	that	the	UX	evolves	and	becomes	
more	natural	without	additional	development	time
Basics in machine learning
The basics of learning
• Learning	is	the	process	of	improving with	experience at	some	task
• Improving over	task,	T
• With	respect	to	performance	measure,	P
• Based	on	experience, E
Learning how to filter spam
T =	Identify	spam	emails
P =	%	of	filtered	spam	emails	vs	%	of	filtered	ham	emails
E =	a	database	of	emails	that	were	labelled	by	users/experts
The basics of machine
learning
Sensors, cameras,
databases, firewall,
IDS, email, etc.
Measuring devices
Noise filtering,
Feature Extraction,
Normalization
Preprocessing
Feature selection,
feature projection
Dimensionality
reduction
Classification,
regression,
clustering,
description
Model learning
Cross validation,
bootstrap
Model testing
P
Supervised UnsupervisedVS
Target / outcome is known
classification – regression
probability distribution in statistics, P(X/Y)
Target / outcome is unknown
clustering – decomposition
density estimation in statistics, P(X,Y)
Introducing machine learning to cyber security
New computing paradigm
requires new approaches
New threats are rapidly
emerging
…
US$ 19
Trillion in global GDP
due to the Internet of
Everything by 2020
Cisco & GE
US$ 300
Billion incremental
revenue by 2020
Gartner
40.9
billion
connected devices by
2020
155
million
connected cars by
2020
100
million
connected light bulbs
by 2020
+1
trillion
connected sensors
by 2020
2.5
billion
smartphones
by 2020
$12
billion
wearable market size by
2020
New data paradigm is
growing exponentially
Observed, real time, signal data Declared, structured data
VS
An evolution towards
intelligent defenses
Computing & Data Paradigm
Detection Paradigm
1980s 1990s 2010 2016 +
Local
computing
environment
Networked
computing
environment
Big data and
batch
processing
Ubiquitous
data
streaming
Rule based
detection
Rule &
Heuristic
detection
Rule,
Heuristics
and ML
Deep
Learning, ML
and […]
More scalability
and adaptability is
required !
Applying machine learning
to security domains
Behavioral
analytics
SupervisedUnsupervised
Continuous
Batch
Insider
threat
detection
Network
anomaly
detection
C2
detection
Spam
Filtering
Malware
Detection
Ruleset
Generation
Network
Traffic
Profiling
IOT
security
Emerging security solutions
by machine learning
Detecting and blocking hacked IOT
devices
Preventing execution of malicious
software and files
Light-weight prediction and classification
models that can run on low powered
computing devices (“on-chip”) according
to edge computing principles.
Example: CyberX, PFP Cybersecurity, Dojo-Labs
High performance classification of multi-
dimensional data points.
Example: Phantom, Jask, Siemplify, Cyberlytic
Improving Security Operating Center
(SOC) Operational Efficiency
Extract new features from unknown files
and detect even the slightest code
mutations.
Example: Cylance, Deep Instinct, Invincea
Emerging security solutions
by machine learning
Quantifying Cyber Risks
Process and classify millions of data
points to build predictions on risk and
formulate the best possible mitigation
practices.
Example: Brightsight, myDRO, Security Scorecard
Network Traffic Anomaly Detection
Analyzing millions of meta-data points,
both of internal and external networks;
learn baseline patterns and uncover
breaking patterns.
Example: DarkTrace, BluVector, Vectra Networks
Data Leak Prevention
AI capabilities to automatically classify
information might, brings a new
generation of DLPs.
Example: Harvest.ai, NeoKami
Next generation security
solutions with deep learning
Context Aware Security
Use data enriching and profiling to identify
contradictory elements in a transaction of
a user.
Example: Brightwolf (Stealth)
Implicit Behavioral or Continuous
Authentication
Learning and analyzing how handling of a
smartphone or other device is considered
to be acceptable/normal or not.
Example: BioCatch, Bionym, BehavioSec
MANY MORE
The temporary state of
affairs
Unsupervised learning helps to cluster
new and emerging patterns
Human experts review, label and
classify this new intelligence
Supervised learning retrains models
with the new intelligence
General weaknesses of
machine learning
Find and exploit weaknesses before or during the feature
extraction or dimensionality reduction phase
Mimicry Attacks: Two different faces, yet OK result
Future attacks techniques might target human experts and
coerce them to “wrongly” train classification systems
Degrade the classification system by persistent feeding with
decoy data to decrease quality of training data
GDPR: When laws clash
with machine learning
Right to be forgotten
Right to
explanation
Automated individual
decision making
Hard to explain. How can decisions (predictions) be explained, when they
are the result of complex neural networks, which are black boxes ?
Beyond 2020
Tomorrow’s attackers may very
well be A.I. driven
Genetic Algorithms (GA) to
find best malware fitness
for maximum damage
Self Organizing Maps (SOM)
to remove centralized C&C
structures
Deep Fuzzing that
automatically finds complex
vulnerabilities
RNNs perform Mimicry
Attacks to bypass AI driven
behavioral detections
Use game theory principles to define
target outcome T, and use machine
learning techniques to maximize the
AUC (“Area Under ROC Curve”)
A.I. are better, faster and more
intelligent to engage in adversarial
activities, including warfare
Help. Autonomous systems!
Morality systems. An
answer to deep cyber
security challenges
Morality. Morality systems are required to keep A.I.
systems in check and provide a framework to match with
desirable outcomes.
Survivability. Even when an autonomous system is
hacked, we expect these degraded systems to be able to
still make potentially moral decisions by themselves.
Security in the age of
artificial intelligence
How A.I. will make our world more secure and vulnerable
Filip Maertens (Faction XYZ) ● filip@faction.xyz

Contenu connexe

Tendances

When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
Lior Rokach
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 

Tendances (20)

AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 

En vedette

En vedette (20)

The Age of Conversational Agents
The Age of Conversational AgentsThe Age of Conversational Agents
The Age of Conversational Agents
 
#BeBot Meetup - Chatbots & LUIS by Nick Trogh (Microsoft)
#BeBot Meetup - Chatbots & LUIS by Nick Trogh (Microsoft)#BeBot Meetup - Chatbots & LUIS by Nick Trogh (Microsoft)
#BeBot Meetup - Chatbots & LUIS by Nick Trogh (Microsoft)
 
#BeBot Meetup - Introduction to Chatbots by Alexis Safarikas (Springbok Agency)
#BeBot Meetup - Introduction to Chatbots by Alexis Safarikas (Springbok Agency)#BeBot Meetup - Introduction to Chatbots by Alexis Safarikas (Springbok Agency)
#BeBot Meetup - Introduction to Chatbots by Alexis Safarikas (Springbok Agency)
 
Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 
The Forecast // Artificial Intelligence
The Forecast // Artificial IntelligenceThe Forecast // Artificial Intelligence
The Forecast // Artificial Intelligence
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence
 
Robotics & Artificial Intelligence
Robotics &  Artificial  IntelligenceRobotics &  Artificial  Intelligence
Robotics & Artificial Intelligence
 
Enhancing the Retail Omnichannel Customer Experience
Enhancing the Retail Omnichannel Customer ExperienceEnhancing the Retail Omnichannel Customer Experience
Enhancing the Retail Omnichannel Customer Experience
 
Wearable Devices: (Really) Ready to Wear
Wearable Devices: (Really) Ready to WearWearable Devices: (Really) Ready to Wear
Wearable Devices: (Really) Ready to Wear
 
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best FriendCognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
 
Harness digital platforms to accelerate R&D and drive proper adoption
Harness digital platforms to accelerate R&D and drive proper adoptionHarness digital platforms to accelerate R&D and drive proper adoption
Harness digital platforms to accelerate R&D and drive proper adoption
 
A roadmap to omnichannel championship
A roadmap to omnichannel championshipA roadmap to omnichannel championship
A roadmap to omnichannel championship
 
L'égo au travail - un gros piège abscons
L'égo au travail - un gros piège absconsL'égo au travail - un gros piège abscons
L'égo au travail - un gros piège abscons
 
Fundamentals of Omnichannel Content Strategy
Fundamentals of Omnichannel Content StrategyFundamentals of Omnichannel Content Strategy
Fundamentals of Omnichannel Content Strategy
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
"How to make a killer pitch" by Jean de la Rochebrochard from Kima Ventures
"How to make a killer pitch" by Jean de la Rochebrochard from Kima Ventures"How to make a killer pitch" by Jean de la Rochebrochard from Kima Ventures
"How to make a killer pitch" by Jean de la Rochebrochard from Kima Ventures
 
Artificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality CheckArtificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality Check
 
Designing Omnichannel Experiences - eTail West 2013
Designing Omnichannel Experiences - eTail West 2013Designing Omnichannel Experiences - eTail West 2013
Designing Omnichannel Experiences - eTail West 2013
 
Omnichannel Marketing
Omnichannel MarketingOmnichannel Marketing
Omnichannel Marketing
 

Similaire à Security in the age of Artificial Intelligence

icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
Jerry Lu
 

Similaire à Security in the age of Artificial Intelligence (20)

AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
Artificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New VenturesArtificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New Ventures
 
AI_DGV.pptx
AI_DGV.pptxAI_DGV.pptx
AI_DGV.pptx
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
 
Artificial intelligence
Artificial intelligence Artificial intelligence
Artificial intelligence
 
CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
 
[Srijan Wednesday Webinars] Artificial Intelligence & the Future of Business
[Srijan Wednesday Webinars] Artificial Intelligence & the Future of Business[Srijan Wednesday Webinars] Artificial Intelligence & the Future of Business
[Srijan Wednesday Webinars] Artificial Intelligence & the Future of Business
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
12 ai-digital-finance-overview
12 ai-digital-finance-overview12 ai-digital-finance-overview
12 ai-digital-finance-overview
 
Artificial intelligence: PwC Top Issues
Artificial intelligence: PwC Top IssuesArtificial intelligence: PwC Top Issues
Artificial intelligence: PwC Top Issues
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Security in the age of Artificial Intelligence

  • 1. Security in the age of artificial intelligence How A.I. will make our world more secure … or vulnerable Filip Maertens (Faction XYZ) ● filip@faction.xyz
  • 3. The various disciplines in artificial intelligence (‘A.I.’) Deep Belief Networks Computer Vision Audio Signal Processing Natural Language
  • 4. How intelligent is artificial intelligence today ? 5 year old ?
  • 5. How intelligent is artificial intelligence today ?
  • 6.
  • 7. Some of the things we are working on. Our projects. • Looking at sensors on a wristband and learn when a human is likely to show signs of depression or PTSD • Looking at car data (CANBUS) and predict what car parts are likely to fail in the foreseeable future • Building a transfer learning network that is able to make cooking recipes by looking at YouTube videos • Based on smartphone handling, build a personal profile for authentication purposes • Building a natural language processing engine that is capable of generating natural language to dialogue with human counterparts • Learn how humans handle an application and dynamically change the flow so that the UX evolves and becomes more natural without additional development time
  • 8. Basics in machine learning
  • 9. The basics of learning • Learning is the process of improving with experience at some task • Improving over task, T • With respect to performance measure, P • Based on experience, E Learning how to filter spam T = Identify spam emails P = % of filtered spam emails vs % of filtered ham emails E = a database of emails that were labelled by users/experts
  • 10. The basics of machine learning Sensors, cameras, databases, firewall, IDS, email, etc. Measuring devices Noise filtering, Feature Extraction, Normalization Preprocessing Feature selection, feature projection Dimensionality reduction Classification, regression, clustering, description Model learning Cross validation, bootstrap Model testing P Supervised UnsupervisedVS Target / outcome is known classification – regression probability distribution in statistics, P(X/Y) Target / outcome is unknown clustering – decomposition density estimation in statistics, P(X,Y)
  • 11. Introducing machine learning to cyber security
  • 13. New threats are rapidly emerging …
  • 14. US$ 19 Trillion in global GDP due to the Internet of Everything by 2020 Cisco & GE US$ 300 Billion incremental revenue by 2020 Gartner 40.9 billion connected devices by 2020 155 million connected cars by 2020 100 million connected light bulbs by 2020 +1 trillion connected sensors by 2020 2.5 billion smartphones by 2020 $12 billion wearable market size by 2020
  • 15. New data paradigm is growing exponentially Observed, real time, signal data Declared, structured data VS
  • 16. An evolution towards intelligent defenses Computing & Data Paradigm Detection Paradigm 1980s 1990s 2010 2016 + Local computing environment Networked computing environment Big data and batch processing Ubiquitous data streaming Rule based detection Rule & Heuristic detection Rule, Heuristics and ML Deep Learning, ML and […] More scalability and adaptability is required !
  • 17. Applying machine learning to security domains Behavioral analytics SupervisedUnsupervised Continuous Batch Insider threat detection Network anomaly detection C2 detection Spam Filtering Malware Detection Ruleset Generation Network Traffic Profiling IOT security
  • 18. Emerging security solutions by machine learning Detecting and blocking hacked IOT devices Preventing execution of malicious software and files Light-weight prediction and classification models that can run on low powered computing devices (“on-chip”) according to edge computing principles. Example: CyberX, PFP Cybersecurity, Dojo-Labs High performance classification of multi- dimensional data points. Example: Phantom, Jask, Siemplify, Cyberlytic Improving Security Operating Center (SOC) Operational Efficiency Extract new features from unknown files and detect even the slightest code mutations. Example: Cylance, Deep Instinct, Invincea
  • 19. Emerging security solutions by machine learning Quantifying Cyber Risks Process and classify millions of data points to build predictions on risk and formulate the best possible mitigation practices. Example: Brightsight, myDRO, Security Scorecard Network Traffic Anomaly Detection Analyzing millions of meta-data points, both of internal and external networks; learn baseline patterns and uncover breaking patterns. Example: DarkTrace, BluVector, Vectra Networks Data Leak Prevention AI capabilities to automatically classify information might, brings a new generation of DLPs. Example: Harvest.ai, NeoKami
  • 20. Next generation security solutions with deep learning Context Aware Security Use data enriching and profiling to identify contradictory elements in a transaction of a user. Example: Brightwolf (Stealth) Implicit Behavioral or Continuous Authentication Learning and analyzing how handling of a smartphone or other device is considered to be acceptable/normal or not. Example: BioCatch, Bionym, BehavioSec MANY MORE
  • 21. The temporary state of affairs Unsupervised learning helps to cluster new and emerging patterns Human experts review, label and classify this new intelligence Supervised learning retrains models with the new intelligence
  • 22. General weaknesses of machine learning Find and exploit weaknesses before or during the feature extraction or dimensionality reduction phase Mimicry Attacks: Two different faces, yet OK result Future attacks techniques might target human experts and coerce them to “wrongly” train classification systems Degrade the classification system by persistent feeding with decoy data to decrease quality of training data
  • 23. GDPR: When laws clash with machine learning Right to be forgotten Right to explanation Automated individual decision making Hard to explain. How can decisions (predictions) be explained, when they are the result of complex neural networks, which are black boxes ?
  • 25. Tomorrow’s attackers may very well be A.I. driven Genetic Algorithms (GA) to find best malware fitness for maximum damage Self Organizing Maps (SOM) to remove centralized C&C structures Deep Fuzzing that automatically finds complex vulnerabilities RNNs perform Mimicry Attacks to bypass AI driven behavioral detections Use game theory principles to define target outcome T, and use machine learning techniques to maximize the AUC (“Area Under ROC Curve”) A.I. are better, faster and more intelligent to engage in adversarial activities, including warfare
  • 27. Morality systems. An answer to deep cyber security challenges Morality. Morality systems are required to keep A.I. systems in check and provide a framework to match with desirable outcomes. Survivability. Even when an autonomous system is hacked, we expect these degraded systems to be able to still make potentially moral decisions by themselves.
  • 28. Security in the age of artificial intelligence How A.I. will make our world more secure and vulnerable Filip Maertens (Faction XYZ) ● filip@faction.xyz