Machine Learning for Cyber Security at Network Speed & Scale
- 1,622 views
How will artificial intelligence impact global cyber security? ...
How will artificial intelligence impact global cyber security?
Or put another way: How to attack and defend cyber assets with a new generation of machine learning technologies?
This paper provides actionable technical insights for business, government and military executives seeking technologies that will provide a competitive advantage in cyber security. We believe the requirements for both military and civilian cyber defenses are similar enough to use published (public) military specifications as a common denominator for protecting cyber assets.
Based on more than 50 people-years of research and development, we believe that machine learning is transformational to the “cyber battlespace” – where computers and/or networks are intentionally disrupted to cause harm or further criminal, political, ideological, social, or similar objectives.
Our goal is inspire innovation: ai-one does not provide a solution or services. We only provide core machine learning technologies. We believe that a complete artificial intelligence solution to combat cyber security threats requires combining multiple tiers of technology – possibly including natural language processing (NLP), machine learning, signal processing, Bayesian decisioning tools, packet profile ontologies, etc.
Cyber warfare spans both military and civilian concerns. The US Department of Defense has defined cyber warfare as the “Fifth Battlespace” (after land, sea, air and submarine domains). As a result, all branches of the US military now have cyber-specific commands.
Similarly, the civilian world is justifiably obsessed with the protection of cyber assets. Groups such as Anonymous and WikiLeaks have wreaked havoc on financial institutions, markets and governments by disrupting mission critical networks and disseminating proprietary information.
Cyber security is essential for civil freedoms, economic opportunities and national security.
- Total Views
- Views on SlideShare
- Embed Views