Machine Learning in Information Security by Mohammed Zuber

Security Researcher at Adobe, Chapter Leader at OWASP & null
Sep. 26, 2016
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
1 of 20

More Related Content

Slideshows for you

CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceJacklynTsai
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityTahseen Shabab
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurityscoopnewsgroup
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseInfocyte
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Infocyte

Slideshows for you(20)

Viewers also liked

When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
Mr201306 machine learning for computer securityMr201306 machine learning for computer security
Mr201306 machine learning for computer securityFFRI, Inc.
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Alex Pinto
Computer security using machine learningComputer security using machine learning
Computer security using machine learningSandeep Sabnani
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityAlex Pinto

Viewers also liked(20)

Similar to Machine Learning in Information Security by Mohammed Zuber

Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Alex Pinto
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
Azure Operation Management Suite - security and complianceAzure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAsaf Nakash
Computer SecurityComputer Security
Computer SecurityGreater Noida Institute Of Technology
Defcon 21-pinto-defending-networks-machine-learning by pseudor00tDefcon 21-pinto-defending-networks-machine-learning by pseudor00t
Defcon 21-pinto-defending-networks-machine-learning by pseudor00tpseudor00t overflow
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber SecurityDeep Shankar Yadav

Similar to Machine Learning in Information Security by Mohammed Zuber(20)

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

GDSC_Info_Session_KITTiptur.pptxGDSC_Info_Session_KITTiptur.pptx
GDSC_Info_Session_KITTiptur.pptxRadhikaNA
Workshop on IoT and Basic Home Automation_BAIUST.pptxWorkshop on IoT and Basic Home Automation_BAIUST.pptx
Workshop on IoT and Basic Home Automation_BAIUST.pptxRedwan Ferdous
AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...
AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...DianaGray10
Diogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdfDiogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdf
Diogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdfDiogoMonteiro786960
Carrom Pool Mod APK.docxCarrom Pool Mod APK.docx
Carrom Pool Mod APK.docxRayJ12
GDSC INFO.pptxGDSC INFO.pptx
GDSC INFO.pptxAshishChanchal1

Machine Learning in Information Security by Mohammed Zuber

  1. Machine Learning in Information Security Mohammed Zuber
  2. Agenda • Definitions – Big Data – Data Science – Machine Learning • Kinds of Machine Learning • Machine Learning and Infosec • MLSec Project
  3. As Usual
  4. Big Data Four V’s of Big Data • Volume – Data Quality • Velocity – Data Speed • Variety – Data Types • Veracity – Messiness
  5. Data Science • Data science is an interdisciplinary field about processes and systems to extract knowledge or insights from data in various forms, either structured or unstructured. • “Data Scientist (n.): Person who is better at statistics than any software engineer and better at software engineering than any statistician.” -- Josh Willis, Cloudera.
  6. Data Science Venn Diagram by Drew Conway
  7. Machine Learning • “Machine learning systems automatically learn programs from data” * • You don’t really code the program, but it is inferred from data. • Intuition of trying to mimic the way the brain learns: that’s where terms like artificial intelligence come from. * CACM 55(10) - A Few Useful Things to Know about Machine Learning
  8. Machine Learning
  9. Applications of Machine Learning Sales Trading Audio & Video Recognitions
  10. Security Applications of Machine Learning • Fraud detection systems – Is what he just did consistent with past behavior? • Network anomaly detection – More like statistical analysis. • Predicting likelihood of attack actors – Create different predictive models and chain them to gain more confidence in each step. • SPAM Filters
  11. Types of Machine Learning Supervised Learning • Classification – (NN, SVM, Naïve Bayes) • Regression – (linear, logistic) Unsupervised Learning • Clustering – (k-means) • Decomposition – (PCA, SVD)
  12. Machine Learning in InfoSec • SIEM and Log Monitoring tools are just vertical BI applications (from the 90’s) • How many logs you think there are in your organization?
  13. Kinds of Network Security Monitoring • Alert-based: • “Traditional” log management • SIEM • Using “Threat Intelligence” (i.e blacklists) • Lack of context • Low effectiveness • You get the results handed over to you • Exploration-based: • Network Forensics tools • Elastic Search based LM systems • High effectiveness • Lots of highly trained people necessary • Big Data Security Analytics: • Run exploration-based monitoring on Hadoop • More like Big Data Security Monitoring (BDSM)
  14. MLSec Project • Sign up, send logs, receive reports generated by machine learning models! • Working with several companies on trying out these models on their environment with their data • Visit https://www.mlsecproject.org
  15. How do I get started on this? • Programming is a must (Python / R) • Statistical knowledge keeps you from making dumb mistakes • Specific machine learning courses and books: – Coursera (ML/ Data Analysis / Data Science) • Practice, Practice, Practice: – – Explore your data – Security Onion – Kaggle
  16. Thank You Most of the information is taken from http://www.slideshare.net/AlexandrePinto10/