Machine Learning. No: It Can t Do That! Hadi Nahari hadinahari. Copyright Cognomotiv 2016
|
|
- Hugh Elmer McDonald
- 6 years ago
- Views:
Transcription
1 Machine Learning No: It Can t Do That! Hadi Nahari hadi@cognomotiv.com hadinahari
2 Friends, Romans, countrymen, lend me your ears; I come to bury Caesar, not to praise him. The evil that men do lives after them Julius Caesar Act 3, Scene II
3 Setup ML + NetSec
4 National Academy of Engineering Grand Challenges for 21 st Century "The best minds of my generation are thinking about how to make people click ads. ---Jeff Hammerbacher
5 Agenda Motivations Machine Learning 101 ML & Network Security What Works, What Doesn t Conclusion 5 / 50
6 Agenda MOTIVATIONS
7 ML Is NOT New This is the 5 th round
8 ML is HOT!! VCs fund ML-companies like crazy Amazing new fields have opened Autonomous driving, behavior analytics, etc. Ton of existing fields have been revived Search, personalization/customization, audio processing, image processing, etc., etc.
9 Mainly because
10 Code Complexity Space Shuttle: ~400K LOC F22 Raptor fighter: ~2M LOC Linux kernel 2.2: ~2.5M LOC Hubble telescope: ~3M LOC Android core: ~12M LOC Future Combat Sys.: ~63M LOC Connected car: ~100M LOC Autonomous vehicle: ~300M LOC 10 / 50
11 Autonomous vehicle: ~300M LOC 50 M LOC Large Hadron Collider: 60 M LOC
12 Usecase Complexity service provider on avg. only five passwords per 40 online accounts per user where to store the tokens???
13 Data Procreation >2 billion GB of new data is created every day B GB to be exact Sparse data: mainly 0s In 93 the information on the internet surpassed all information that humanity had created before it
14 Stack Proliferation Applications HW Architecture(s)
15 Algorithms 15 / 50
16 Algorithms
17 Agenda ML 101
18 Machine Learning (ML) Study of pattern recognition & computational learning theory in Artificial Intelligence (AI) Algorithms to learn from, and make predictions on data As opposed to following strictly static program instructions
19 ML Models Supervised learning Unsupervised learning (Semi-supervised learning) Reinforcement learning
20 Supervised Learning {(labeled) Input} [map] {Expected Output} Find [map] 20 / 50
21 Supervised Learning Model
22 Unsupervised Learning {(unlabled) Input} [map] {Output} Find structure (patterns) in {Input}
23 Unsupervised Learning Model
24 Reinforcement Learning No correct {Input}/{Output} Action, environment, reward
25 Reinforcement Learning Model 25 / 50
26 Main ML Approaches Decision Tree Learning, Association Rule Learning Inductive Logic Programming, Support Vector Machines, Clustering, Bayesian Networks Representation Learning, Genetic Algorithms Similarity and Metric Learning, Sparse Dictionary Learning Artificial Neural Networks (ANN), Deep Learning (DL)
27 Neural Network Interpret an Artificial Intelligence (AI) task as the evaluation of complex functions Facial Recognition: Map a bunch of pixels to a name Handwriting Recognition: Image to a character NN: Network of interconnected simple neurons
28 The Neuron Feed-forward system, made up of two stages: Linear Transformation of data Point-wise application of non-linear function y i =F(ΣW i X i ) i W 1 W 2 W 3 F(x) =max(0,x) (also sigmoid, Rectified Linear Unit (ReLU), etc.) X X X 1 2 3
29 Artificial Neural Network (ANN) Layers and layers of neurons, with many connections Output: Input:
30 Deep Learning (DL) Branch of ML based on a set of algorithms that: Attempt to model high-level data abstractions Are based on learning representations of data Use complex architectures with multiple non-linear transformations Some representations make it easier to learn tasks from examples (e.g. Alpha Go) 30 / 50
31 DNN: Learning Feature Representation Input Result
32 DNN: Feature Engineering Images/video Image Vision features Detection Audio Audio Audio features Speaker ID Text Text Text features Anything humans can do in 0.1 sec, the right, big 10-layer network can do too Text classification, Machine translation, Information retrieval,...
33 ML/DL Improve With Scale Past Present Future Performance ML / DL Many previous methods Data & Compute
34 Agenda ML & NETSEC
35 Intrusion & Intrusion Detection Intrusion is an attempt to compromise CIA (Confidentiality, Integrity, Availability), or to bypass the security mechanisms of a computer or network Intrusion detection is the process of monitoring the events occurring in a computer system or network, and analyzing them for signs of an intrusion 35 / 50
36 3 Main Detection Methodologies Signature-based Detection (SD) Signature: pattern corresponding to known attack or threat SD: process to compare patterns against captured events A.K.A Knowledge-based Detection Anomaly-based Detection (AD) Anomaly is a deviation to normal behavior Profile of normal is derived from monitoring network traffic AD compares normal profile with observed events Stateful Protocol Analysis (SPA) Vendor-developed generic profiles to specific protocols
37 Cybersecurity System Attacks evolve, ergo building defense systems is nontrivial Thus, higher-level & adaptive methodologies are required
38 Adaptive Cybersecurity Data-capturing tools (Libpcap, Winpcap, etc.) capture events from the audit trails of information sources (e.g. network) Data-preprocessing module filters out the attacks from which good signatures have been learned A feature-extractor derives basic features (sequence of syscalls, start time, NetFlow duration, src/dest IP/port, protocol, byte and packet counts Analysis engine implements detection methods for infrastructure anomalies, which may or may not have appeared before
39 Agenda WHAT WORKS WHAT DOESN T
40 Curse of Dimensionality Data volume is massive min. ~100M events per day Much of the data is streaming data Requires inline, real-time analysis Feature space is high dimensional 40 / 50
41 $/Detection Performance Abysmal Looking for every anomaly is cost prohibitive if at all [practically] possible Narrowing down the criteria too much results in false negative Reference data hard to gain due to privacy concerns Simulated data is useless ML was supposed to be better than signature era
42 Husky Recognition
43 Learned Features We built an effective snow recognition model
44 Models: Simple Correlations Simple models are also (usually) wrong
45 Network Anomalies Malicious data packets have a small variety (low type-count), but happen in high frequency Current models are not good at detecting this type of anomaly Anomaly/outlier varies among application domains Labeled anomalies are not available for training/validation 45 / 50
46 Baselining Using ML to detect anomaly is easy when baseline is well-defined and follows simple mathematical model (e.g. Normal Distribution) Most real-world systems don t render a simple baseline (i.e. their behavior is very complex) [!]Sanctity of baseline: nearly 100% of networks are compromised
47 Time Shifting Window problem : algos should be limited to ingest data in chunks that can be processed What if the anomaly is seeded outside that window? Network traffic diversity: usage varies in every session and with new applications window should also be shifted for recurring training Serious impact on performance, real-time, and security
48 There s More How do you trust what the model predicts? i.e. how do we know the model works correctly (husky)? Designing sound evaluation schemes can be more difficult than the detector itself We really don t know how ML works or how to reason about ML models or how to debug them For now it s just magic & voodoo
49 Agenda CONCLUSION
50 Summary ML is a great and necessary technology ML really shines for some classes of problems ML is NOT the best solution for every problem (e.g. NetSec) Obtaining (and training with) useful data remains a challenge ML is just one initial building block of Machine Cognition and Artificial Understanding: there are many more Still a long way before machines can replicate humans! 50 / 50
51 THANK YOU! Hadi Nahari hadinahari
52 Backup
53 References Prof. Karl Friston seminal works ( Why Should I Trust You? Explaining the Predictions of Any Classifier, Carlos Guestrin, et al ( Using Machine Learning in Network Intrusion Detection Systems, Omar Shaya ( Machine Learning Is Not The Answer To Better Network Security, Matt Harrigan ( Machine Learning Algorithm Cheat Sheet, Laura Diane Hamilton, ( Anomaly Detection Approaches for Communicating Networks ( A Survey on Machine Learning Techniques for Intrusion Detection Systems, J. Sing, N.J. Nene, ( Machine Learning Techniques for Anomaly Detection: An Overview, S. Omar, et al, ( Recent Advances in Predictive (Machine) Learning, J.H. Friedman, et al, ( Outside the Closed World: On Using Machine Learning For Network Intrusion Detection, R. Sommer, V. Paxson, (
54 Are Humans Getting Smarter? IQ scores are rising Underlying biological HW declining Intelligence is in decline
Demystifying Machine Learning
Demystifying Machine Learning Dmitry Figol, WW Enterprise Sales Systems Engineer - Programmability @dmfigol CTHRST-1002 Agenda Machine Learning examples What is Machine Learning Types of Machine Learning
More informationMachine Learning in WAN Research
Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network
More informationMachine Learning 13. week
Machine Learning 13. week Deep Learning Convolutional Neural Network Recurrent Neural Network 1 Why Deep Learning is so Popular? 1. Increase in the amount of data Thanks to the Internet, huge amount of
More informationMachine Learning in WAN Research
Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network
More informationKnowledge-Defined Networking: Towards Self-Driving Networks
Knowledge-Defined Networking: Towards Self-Driving Networks Albert Cabellos (UPC/BarcelonaTech, Spain) albert.cabellos@gmail.com 2nd IFIP/IEEE International Workshop on Analytics for Network and Service
More informationIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational
More informationFlowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert
Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data
More informationMachine Learning for User Behavior Anomaly Detection EUGENE NEYOLOV, HEAD OF R&D
Machine Learning for User Behavior Anomaly Detection EUGENE NEYOLOV, HEAD OF R&D 2 AUTHOR Eugene Neyolov HEAD OF R&D Security engineer and analyst leading applied research projects in security monitoring,
More informationMachine Learning with Python
DEVNET-2163 Machine Learning with Python Dmitry Figol, SE WW Enterprise Sales @dmfigol Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationNext Steps in Data Mining. Sistemas de Apoio à Decisão Cláudia Antunes
Next Steps in Data Mining Sistemas de Apoio à Decisão Cláudia Antunes Temporal Data Mining Cláudia Antunes Data Mining Knowledge Discovery is the nontrivial extraction of implicit, previously unknown,
More informationIntelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.
Intelligent Edge Computing and ML-based Traffic Classifier Kwihoon Kim, Minsuk Kim (ETRI) (kwihooi@etri.re.kr, mskim16@etri.re.kr) April 25. 2018 ITU Workshop on Impact of AI on ICT Infrastructures Cian,
More informationBig Data Analytics for Host Misbehavior Detection
Big Data Analytics for Host Misbehavior Detection Miguel Pupo Correia joint work with Daniel Gonçalves, João Bota (Vodafone PT) 2016 European Security Conference June 2016 Motivation Networks are complex,
More informationObject Detection Lecture Introduction to deep learning (CNN) Idar Dyrdal
Object Detection Lecture 10.3 - Introduction to deep learning (CNN) Idar Dyrdal Deep Learning Labels Computational models composed of multiple processing layers (non-linear transformations) Used to learn
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationData Mining. Neural Networks
Data Mining Neural Networks Goals for this Unit Basic understanding of Neural Networks and how they work Ability to use Neural Networks to solve real problems Understand when neural networks may be most
More informationMachine Learning. The Breadth of ML Neural Networks & Deep Learning. Marc Toussaint. Duy Nguyen-Tuong. University of Stuttgart
Machine Learning The Breadth of ML Neural Networks & Deep Learning Marc Toussaint University of Stuttgart Duy Nguyen-Tuong Bosch Center for Artificial Intelligence Summer 2017 Neural Networks Consider
More informationFighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities
Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques
More informationINTRODUCTION TO ARTIFICIAL INTELLIGENCE
v=1 v= 1 v= 1 v= 1 v= 1 v=1 optima 2) 3) 5) 6) 7) 8) 9) 12) 11) 13) INTRDUCTIN T ARTIFICIAL INTELLIGENCE DATA15001 EPISDE 7: MACHINE LEARNING TDAY S MENU 1. WHY MACHINE LEARNING? 2. KINDS F ML 3. NEAREST
More informationIntroduction Challenges with using ML Guidelines for using ML Conclusions
Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed
More informationThis document (including, without limitation, any product roadmap or statement of direction data) illustrates the planned testing, release and
It s an Event-Driven World Abram Van Der Geest Machine Learning Product Technologist Building a smarter edge with TensorFlow and Project Flogo 2 DISCLAIMER During the course of this presentation, TIBCO
More informationLecture 12. Application Layer. Application Layer 1
Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers
More informationSSL Automated Signatures
SSL Automated Signatures WilliamWilsonandJugalKalita DepartmentofComputerScience UniversityofColorado ColoradoSprings,CO80920USA wjwilson057@gmail.com and kalita@eas.uccs.edu Abstract In the last few years
More informationBig Data Security Internal Threat Detection. The Critical Role of Machine Learning.
Big Data Security Internal Threat Detection The Critical Role of Machine Learning Objectives 1.Discuss internal user risk management challenges in Big Data Environment 2.Discuss why machine learning is
More informationSPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller
SPIDeR A Distributed Multi-Agent Intrusion Detection and Response Framework Patrick Miller patrick@spider.doriathproject.com Overview Goals Utilize new and existing sensors collaboratively to generate
More informationWHAT TYPE OF NEURAL NETWORK IS IDEAL FOR PREDICTIONS OF SOLAR FLARES?
WHAT TYPE OF NEURAL NETWORK IS IDEAL FOR PREDICTIONS OF SOLAR FLARES? Initially considered for this model was a feed forward neural network. Essentially, this means connections between units do not form
More informationData Mining and Analytics
Data Mining and Analytics Aik Choon Tan, Ph.D. Associate Professor of Bioinformatics Division of Medical Oncology Department of Medicine aikchoon.tan@ucdenver.edu 9/22/2017 http://tanlab.ucdenver.edu/labhomepage/teaching/bsbt6111/
More informationNetwork Defenses 21 JANUARY KAMI VANIEA 1
Network Defenses KAMI VANIEA 21 JANUARY KAMI VANIEA 1 Similar statements are found in most content hosting website privacy policies. What is it about how the internet works that makes this statement necessary
More informationWhy Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER
Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER Introduction Machine Learning (ML) is based around the idea machines can learn from data. ML techniques have been around
More informationBrainchip OCTOBER
Brainchip OCTOBER 2017 1 Agenda Neuromorphic computing background Akida Neuromorphic System-on-Chip (NSoC) Brainchip OCTOBER 2017 2 Neuromorphic Computing Background Brainchip OCTOBER 2017 3 A Brief History
More informationAnomaly Detection in Communication Networks
Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u
More informationDeep Learning. Deep Learning provided breakthrough results in speech recognition and image classification. Why?
Data Mining Deep Learning Deep Learning provided breakthrough results in speech recognition and image classification. Why? Because Speech recognition and image classification are two basic examples of
More informationConnecting relevant video content to audiences CREDENTIALS DECK
Connecting relevant video content to audiences CREDENTIALS DECK 1 Hello, We re Vilynx We've developed machine learning technology to drive video discovery and engagement. US company, headquarters in Palo
More informationMachine Learning (CSMML16) (Autumn term, ) Xia Hong
Machine Learning (CSMML16) (Autumn term, 28-29) Xia Hong 1 Useful books: 1. C. M. Bishop: Pattern Recognition and Machine Learning (2007) Springer. 2. S. Haykin: Neural Networks (1999) Prentice Hall. 3.
More informationCS 4510/9010 Applied Machine Learning. Deep Learning. Paula Matuszek Fall copyright Paula Matuszek 2016
CS 4510/9010 Applied Machine Learning 1 Deep Learning Paula Matuszek Fall 2016 Beyond Simple Neural Nets 2 In the last few ideas we have seen some surprisingly rapid progress in some areas of AI Image
More informationT O B C A T C A S E E U R O S E N S E D E T E C T I N G O B J E C T S I N A E R I A L I M A G E R Y
T O B C A T C A S E E U R O S E N S E D E T E C T I N G O B J E C T S I N A E R I A L I M A G E R Y Goal is to detect objects in aerial imagery. Each aerial image contains multiple useful sources of information.
More informationTRAFFIC SIGN CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK
TRAFFIC SIGN CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK Nemanja Veličković 1, Zeljko Stojković 2, Goran Dimić 2, Jelena Vasiljević 2 and Dhinaharan Nagamalai 3 1 University Union, School of Computing,
More informationCMU Lecture 18: Deep learning and Vision: Convolutional neural networks. Teacher: Gianni A. Di Caro
CMU 15-781 Lecture 18: Deep learning and Vision: Convolutional neural networks Teacher: Gianni A. Di Caro DEEP, SHALLOW, CONNECTED, SPARSE? Fully connected multi-layer feed-forward perceptrons: More powerful
More informationAnalyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer The Beautiful World of IoT 06.03.2018 garcia@tk.tu-darmstadt.de
More informationDetecting Malicious Hosts Using Traffic Flows
Detecting Malicious Hosts Using Traffic Flows Miguel Pupo Correia joint work with Luís Sacramento NavTalks, Lisboa, June 2017 Motivation Approach Evaluation Conclusion Outline 2 1 Outline Motivation Approach
More informationPopular SIEM vs aisiem
Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors
More informationFlow-based Anomaly Intrusion Detection System Using Neural Network
Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data
More informationLecture 2 Notes. Outline. Neural Networks. The Big Idea. Architecture. Instructors: Parth Shah, Riju Pahwa
Instructors: Parth Shah, Riju Pahwa Lecture 2 Notes Outline 1. Neural Networks The Big Idea Architecture SGD and Backpropagation 2. Convolutional Neural Networks Intuition Architecture 3. Recurrent Neural
More informationIT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA
IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market
More informationDeep Neural Networks for Hackers: Methods, Applications, and Open Source Tools. Joshua Saxe, Chief Data Scientist, Sophos
Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools Joshua Saxe, Chief Data Scientist, Sophos About your speaker Your speaker s team @ Sophos You Security Data Science Machine
More information! References: ! Computer eyesight gets a lot more accurate, NY Times. ! Stanford CS 231n. ! Christopher Olah s blog. ! Take ECS 174!
Exams ECS 189 WEB PROGRAMMING! If you are satisfied with your scores on the two midterms, you can skip the final! As soon as your Photobooth and midterm are graded, I can give you your course grade (so
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationAn advanced data leakage detection system analyzing relations between data leak activity
An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid
More informationOptimizing Out-of-Core Nearest Neighbor Problems on Multi-GPU Systems Using NVLink
Optimizing Out-of-Core Nearest Neighbor Problems on Multi-GPU Systems Using NVLink Rajesh Bordawekar IBM T. J. Watson Research Center bordaw@us.ibm.com Pidad D Souza IBM Systems pidsouza@in.ibm.com 1 Outline
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationNetwork Defenses 21 JANUARY KAMI VANIEA 1
Network Defenses KAMI VANIEA 21 JANUARY KAMI VANIEA 1 First, the news The Great Cannon of China https://citizenlab.org/2015/04/chinas-great-cannon/ KAMI VANIEA 2 Today Open System Interconnect (OSI) model
More informationPolytechnic University of Tirana
1 Polytechnic University of Tirana Department of Computer Engineering SIBORA THEODHOR ELINDA KAJO M ECE 2 Computer Vision OCR AND BEYOND THE PRESENTATION IS ORGANISED IN 3 PARTS : 3 Introduction, previous
More informationConvolutional Layer Pooling Layer Fully Connected Layer Regularization
Semi-Parallel Deep Neural Networks (SPDNN), Convergence and Generalization Shabab Bazrafkan, Peter Corcoran Center for Cognitive, Connected & Computational Imaging, College of Engineering & Informatics,
More informationKeras: Handwritten Digit Recognition using MNIST Dataset
Keras: Handwritten Digit Recognition using MNIST Dataset IIT PATNA February 9, 2017 1 / 24 OUTLINE 1 Introduction Keras: Deep Learning library for Theano and TensorFlow 2 Installing Keras Installation
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationContents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1
Preface xiii PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 1 Princi ples of Cloud Computing Systems 3 1.1 Elastic Cloud Systems for Scalable Computing 3 1.1.1 Enabling Technologies for Cloud Computing
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationUNSUPERVISED LEARNING FOR ANOMALY INTRUSION DETECTION Presented by: Mohamed EL Fadly
UNSUPERVISED LEARNING FOR ANOMALY INTRUSION DETECTION Presented by: Mohamed EL Fadly Outline Introduction Motivation Problem Definition Objective Challenges Approach Related Work Introduction Anomaly detection
More informationPouya Kousha Fall 2018 CSE 5194 Prof. DK Panda
Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda 1 Observe novel applicability of DL techniques in Big Data Analytics. Applications of DL techniques for common Big Data Analytics problems. Semantic indexing
More informationReview on Data Mining Techniques for Intrusion Detection System
Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,
More informationData Sources for Cyber Security Research
Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,
More informationNetwork Traffic Measurements and Analysis
DEIB - Politecnico di Milano Fall, 2017 Introduction Often, we have only a set of features x = x 1, x 2,, x n, but no associated response y. Therefore we are not interested in prediction nor classification,
More informationA Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection
Int'l Conf. on Advances on Applied Cognitive Computing ACC'17 25 A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection Kaiser Nahiyan,
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationDeep Learning for Embedded Security Evaluation
Deep Learning for Embedded Security Evaluation Emmanuel Prouff 1 1 Laboratoire de Sécurité des Composants, ANSSI, France April 2018, CISCO April 2018, CISCO E. Prouff 1/22 Contents 1. Context and Motivation
More informationECG782: Multidimensional Digital Signal Processing
ECG782: Multidimensional Digital Signal Processing Object Recognition http://www.ee.unlv.edu/~b1morris/ecg782/ 2 Outline Knowledge Representation Statistical Pattern Recognition Neural Networks Boosting
More informationThe data science behind Cognito AI threat detection models. White paper
The data science behind Cognito AI threat detection models White paper TABLE OF CONTENTS Introduction.... 3 Global learning.... 4 The human element.... 4 Supervised machine learning.... 4 Random forest...4
More informationCS Review. Prof. Clarkson Spring 2017
CS 5430 Review Prof. Clarkson Spring 2017 Recall: Audit logs Recording: what to log what not to log how to log locally remotely how to protect the log Reviewing: manual exploration automated analysis MANUAL
More informationNeural Nets & Deep Learning
Neural Nets & Deep Learning The Inspiration Inputs Outputs Our brains are pretty amazing, what if we could do something similar with computers? Image Source: http://ib.bioninja.com.au/_media/neuron _med.jpeg
More informationCSci530 Final Exam. Fall 2011
CSci530 Final Exam Fall 2011 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on
More informationLecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations
Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted
More informationKeras: Handwritten Digit Recognition using MNIST Dataset
Keras: Handwritten Digit Recognition using MNIST Dataset IIT PATNA January 31, 2018 1 / 30 OUTLINE 1 Keras: Introduction 2 Installing Keras 3 Keras: Building, Testing, Improving A Simple Network 2 / 30
More informationIntrusion Detection Systems
Intrusion Detection Systems Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 Outline 1 Introduction Overview History 2 Types
More informationNEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements
WHITEPAPER Version 1.1 May 1, 2018 Contents of the white paper are subject to changes and improvements ABSTRACT The Fourth Industrial revolution brings the implementation of such technologies like Big
More informationThink & Work like a Data Scientist with SQL 2016 & R DR. SUBRAMANI PARAMASIVAM (MANI)
Think & Work like a Data Scientist with SQL 2016 & R DR. SUBRAMANI PARAMASIVAM (MANI) About the Speaker Dr. SubraMANI Paramasivam PhD., MCT, MCSE, MCITP, MCP, MCTS, MCSA CEO, Principal Consultant & Trainer
More informationCSCI 5417 Information Retrieval Systems! What is Information Retrieval?
CSCI 5417 Information Retrieval Systems! Lecture 1 8/23/2011 Introduction 1 What is Information Retrieval? Information retrieval is the science of searching for information in documents, searching for
More informationNetwork Defenses KAMI VANIEA 1
Network Defenses KAMI VANIEA 26 SEPTEMBER 2017 KAMI VANIEA 1 First the news http://arstech nica.com/secu rity/2015/04/ meet-greatcannon-theman-in-themiddleweapon-chinaused-ongithub/ 2 First the news http://arstechni
More informationDefense Data Generation in Distributed Deep Learning System Se-Yoon Oh / ADD-IDAR
Defense Data Generation in Distributed Deep Learning System Se-Yoon Oh / 2017. 10. 31 syoh@add.re.kr Page 1/36 Overview 1. Introduction 2. Data Generation Synthesis 3. Distributed Deep Learning 4. Conclusions
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationCharacterization and Benchmarking of Deep Learning. Natalia Vassilieva, PhD Sr. Research Manager
Characterization and Benchmarking of Deep Learning Natalia Vassilieva, PhD Sr. Research Manager Deep learning applications Vision Speech Text Other Search & information extraction Security/Video surveillance
More informationUsing Machine Learning to Optimize Storage Systems
Using Machine Learning to Optimize Storage Systems Dr. Kiran Gunnam 1 Outline 1. Overview 2. Building Flash Models using Logistic Regression. 3. Storage Object classification 4. Storage Allocation recommendation
More informationPractical Applications of Machine Learning for Image and Video in the Cloud
Practical Applications of Machine Learning for Image and Video in the Cloud Shawn Przybilla, AWS Solutions Architect M&E @shawnprzybilla 2/27/18 There were 3.7 Billion internet users in 2017 1.2 Trillion
More informationCOMP90049 Knowledge Technologies
COMP90049 Knowledge Technologies Data Mining (Lecture Set 3) 2017 Rao Kotagiri Department of Computing and Information Systems The Melbourne School of Engineering Some of slides are derived from Prof Vipin
More informationDL Tutorial. Xudong Cao
DL Tutorial Xudong Cao Historical Line 1960s Perceptron 1980s MLP BP algorithm 2006 RBM unsupervised learning 2012 AlexNet ImageNet Comp. 2014 GoogleNet VGGNet ImageNet Comp. Rule based AI algorithm Game
More informationThe Fly & Anti-Fly Missile
The Fly & Anti-Fly Missile Rick Tilley Florida State University (USA) rt05c@my.fsu.edu Abstract Linear Regression with Gradient Descent are used in many machine learning applications. The algorithms are
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationArtificial Intelligence Introduction Handwriting Recognition Kadir Eren Unal ( ), Jakob Heyder ( )
Structure: 1. Introduction 2. Problem 3. Neural network approach a. Architecture b. Phases of CNN c. Results 4. HTM approach a. Architecture b. Setup c. Results 5. Conclusion 1.) Introduction Artificial
More informationDeep Learning. Architecture Design for. Sargur N. Srihari
Architecture Design for Deep Learning Sargur N. srihari@cedar.buffalo.edu 1 Topics Overview 1. Example: Learning XOR 2. Gradient-Based Learning 3. Hidden Units 4. Architecture Design 5. Backpropagation
More informationAn Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree
An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications
More informationAUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID
AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern
More informationDeep (1) Matthieu Cord LIP6 / UPMC Paris 6
Deep (1) Matthieu Cord LIP6 / UPMC Paris 6 Syllabus 1. Whole traditional (old) visual recognition pipeline 2. Introduction to Neural Nets 3. Deep Nets for image classification To do : Voir la leçon inaugurale
More informationApplying a data driven approach to machine learning
Andrew Hollister LogRhythm Applying a data driven approach to machine learning Definition - machine learning The science of enabling computers to learn without being explicitly programmed to do so. Machine
More informationLecture notes. Com Page 1
Lecture notes Com Page 1 Contents Lectures 1. Introduction to Computational Intelligence 2. Traditional computation 2.1. Sorting algorithms 2.2. Graph search algorithms 3. Supervised neural computation
More informationBattle between hackers and machine learning. Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019
Battle between hackers and machine learning Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019 Google: facts and numbers Real Cisco Big Data for Security Training Set Why is Machine Learning
More informationAI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI
SESSION ID: SPO2-T07 AI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI Sridhar Muppidi IBM Fellow and VP Technology IBM Security
More informationArcSight Activate Framework
ArcSight Activate Framework Petropoulos #HPProtect 44% Have trouble managing their SIEM eiqnetworks 2013 SIEM Survey #1 challenge Identification of key events SANS 2012 Log Management and Event Management
More informationSmall is the New Big: Data Analytics on the Edge
Small is the New Big: Data Analytics on the Edge An overview of processors and algorithms for deep learning techniques on the edge Dr. Abhay Samant VP Engineering, Hiller Measurements Adjunct Faculty,
More informationPractice Exam Sample Solutions
CS 675 Computer Vision Instructor: Marc Pomplun Practice Exam Sample Solutions Note that in the actual exam, no calculators, no books, and no notes allowed. Question 1: out of points Question 2: out of
More informationNeural Networks (pp )
Notation: Means pencil-and-paper QUIZ Means coding QUIZ Neural Networks (pp. 106-121) The first artificial neural network (ANN) was the (single-layer) perceptron, a simplified model of a biological neuron.
More informationF I G H T I N G D O M A I N G E N E R AT I O N A L G O R I T H M S ( D G A S ) W I T H M A C H I N E L E A R N I N G
F I G H T I N G D O M A I N G E N E R AT I O N A L G O R I T H M S ( D G A S ) W I T H M A C H I N E L E A R N I N G GPU Technical Conference: Spring 2018 San Jose, CA Speakers: Greg McCullough and Aaron
More informationFall 2017 ECEN Special Topics in Data Mining and Analysis
Fall 2017 ECEN 689-600 Special Topics in Data Mining and Analysis Nick Duffield Department of Electrical & Computer Engineering Teas A&M University Organization Organization Instructor: Nick Duffield,
More information