SlideShare a Scribd company logo
1 of 22
Download to read offline
1 www.smartlearninguk.com
Wale Omolere
25/08/2020
2 www.smartlearninguk.com2 www.smartlearninguk.com
Role of Artificial Intelligence in Cyber
Security
Wale Omolere Role of Ai in cyber security
3 www.smartlearninguk.com3 www.smartlearninguk.com
What is Artificial Intelligence?
AI broadly refers to the ability of machines
to "think" like humans and perform tasks
considered "smart," without explicitly being
programmed to do so.
ML is a subset of AI. ML algorithms build a
mathematical model based on training
data, and they leverage the model to make
predictions when new data is provided
Source: pwc
Wale Omolere Role of Ai in cyber security
4 www.smartlearninguk.com4 www.smartlearninguk.com
Ochestrate
&
Automate
Process
&
structure
Orchestrate and Automate tasks
that humans can perform
without a problem to a much
larger volume we could ever
handle
Artificial Intelligence
Process and structure huge
volumes of data
including analysis of the
complex relationships within
it
Wale Omolere Role of Ai in cyber security
5 www.smartlearninguk.com5 www.smartlearninguk.com
Unsupervised
Supervised
Reinforcement
SUPERVISED
Machine learns by using labelled
data
Regressions & Classification
Labelled data
External supervision
Maps labelled inputs to known
outputs
UNSUPERVISED
Machine is trained on an unlabelled
data without any guidance
Association & Clustering
Unlabelled data
No supervision
Understands patterns & discovers the
outputs
REINFORCEMENT
Agent interacts with its environment by
performing actions & learning from errors or
reward
Reward-based
No predefined data
Follows the trial-and-error method
RN
LEA
ING
Machine Learning Algorithms – overview of ML underlaying technologies
Wale Omolere Role of Ai in cyber security
6 www.smartlearninguk.com6 www.smartlearninguk.com
Deep Learning
Data Requirement – Requires large data
Accuracy – Provider higher accuracy
Training Time – Takes longer to train
Hardware Dependency – Requires GPU to training
properly
Hyperparameter Tuning – Can be tuned in various
different ways
Learning
Machine Learning
Data Requirement – can train on lesser data
Accuracy – Gives lesser accuracy
Training Time – Takes less time to train
Hardware Dependency – Train on CPU
Hyperparameter Tuning – Limited tuning capabilities
Wale Omolere Role of Ai in cyber security
7 www.smartlearninguk.com7 www.smartlearninguk.com
Supervised learning is when a model learns from a labeled dataset with
guidance. And, Unsupervised learning is where the machine is given
training based on unlabeled data without any guidance. Whereas
Reinforcement learning is when a machine or an agent interacts with its
environment, performs actions, and learns by a trial-and-error method.
.
AI Learning Model – in a nutshell
Wale Omolere Role of Ai in cyber security
8 www.smartlearninguk.com8 www.smartlearninguk.com
AI is Math
Advanced and new
application of Statistics
Artificial General
Intelligence
Intelligence of a machine that
could successfully perform any
intellectual task
Machine Learning
Ability for (machines) to learn
without being explicitly
programmed – predictions
based on data sets
Deep Learning
“New ML” that recognizes
patterns - wider range of data
resources, less data pre-
processing by humans,
produce more accurate
results
Swarm technology
Collective behaviour of
decentralized, self-
organized systems,
natural or artificial -
Already used in drones
and fledgling robotics
devices
Overview of AI
Source : researchgate.com
Wale Omolere Role of Ai in cyber security
9 www.smartlearninguk.com9 www.smartlearninguk.com
AI in Cybersecurity
Wale Omolere Role of Ai in cyber security
10 www.smartlearninguk.com10 www.smartlearninguk.com
Network security
Application security
Information security
Operational security
Disaster recovery &
Business Continuity
End-user education
Cyber Security is the practice of
defending computers, servers,
mobile devices, electronic
systems, networks and data from
malicious attacks
What is Cyber Security?
Wale Omolere Role of Ai in cyber security
11 www.smartlearninguk.com11 www.smartlearninguk.com
Virus, Trojan,
Spyware,
Ransomware,
Adware, Botnets
Malware
Email phishing,
Spear phishing,
Whaling, Vishing &
Smishing
Phishing
Application-layer
flood, Distributed
Denial of Service
Attacks (DDoS)
Denial-of-service
attack
SQL injection
In-band SQLi
(Classic), Inferential
SQLi (Blind) and Out-
of-band SQLi
Man-in-the middle
attack
Man-in-the browser
(MitB)
01 02 03 04 05
Types of cyber threats
Wale Omolere Role of Ai in cyber security
12 www.smartlearninguk.com12 www.smartlearninguk.com
02 | Manual
Manual threat hunting—can be
expensive and time-consuming,
resulting in more unnoticed attacks.
04 | Hackers
Hackers often hide and change their
IP addresses—hackers use different
programs like Virtual Private Networks
(VPN), Proxy servers, Tor browsers, and
more. These programs help hackers
stay anonymous and undetected.
01 | Defence Paradigm
Defence paradigm based on
previous knowledge of attacks—
inefficient against zero-day and
variations
03 | Reactive
Reactive nature of cybersecurity—
companies can resolve problems
only after they have already
happened. Predicting threats before
they occur is a great challenge for
security experts.
Key flaws of Cyber Security
Wale Omolere Role of Ai in cyber security
13 www.smartlearninguk.com13 www.smartlearninguk.com
The next generation of cyber security products are increasingly incorporating Artificial
Intelligence (AI) and Machine Learning (ML) technologies. By training AI software on large
datasets of cyber security, network, and even physical information, cyber security solutions
providers aim to detect and block abnormal behaviour.
There are different approaches to using AI for cyber security, and it is important first to
determine which is appropriate for the organization. Some software applications analyse
raw network data to spot an irregularity, while others focus on user/asset/entity behaviour to
detect patterns that deviate from normal. The types of data streams, how they are collected,
and the level of effort needed by analysts all vary by approach.
Artificial Intelligence for Cyber Security
Wale Omolere Role of Ai in cyber security
14 www.smartlearninguk.com14 www.smartlearninguk.com
Offensive security – is a proactive and adversarial approach to protecting
computer systems, networks and individuals from attacks
Defensive security – offensive security measures are focused on seeking
out the perpetrators and in some cases attempting to disable or at least
disrupt their operations.
AI in Cyber Security techniques
Wale Omolere Role of Ai in cyber security
15 www.smartlearninguk.com15 www.smartlearninguk.com
Vulnerability
Management
User and Entity
Behaviour Analytics
VM BA
Malware detection Anti Spam
M A
Data Classification
DC
Intrusion Detection &
Prevention
I
Defensive AI (Blue Team)
Cyber Threat
Intelligence (CTI)
CTI
Wale Omolere Role of Ai in cyber security
16 www.smartlearninguk.com16 www.smartlearninguk.com
04 Conditional attacks 05 Classifying victims
CA CV
01 Malware creations 02 Smart botnets
MC SB
06 Adversarial AI
AAI
03 Spear phishing
SP
Offensive AI (Red Team)
Wale Omolere Role of Ai in cyber security
17 www.smartlearninguk.com17 www.smartlearninguk.com
Data poisoning
Feedback
Weaponization
Adversarial Inputs
Model stealing
Adversarial AI
Wale Omolere Role of Ai in cyber security
18 www.smartlearninguk.com18 www.smartlearninguk.com
SAP NS2 CrowdStrike
S C
Cylance Carbon Black
C CB
Webroot
W
Darktrace
D
Cyber Security Application Using AI
Callsign
C
Wale Omolere Role of Ai in cyber security
19 www.smartlearninguk.com19 www.smartlearninguk.com
AI for Network
Threat Identification
AI-based Antivirus
Software
AI for Fighting AI
Threats
AI for Email
Monitoring
AI-based User
Behaviour
Modelling
01 02 03 04 05
AI Cyber Security Use Case
Wale Omolere Role of Ai in cyber security
20 www.smartlearninguk.com20 www.smartlearninguk.com
What Resources Does the
System Require?
What About Recurring and
Additive Costs?
Can the System Adapt as
Your Network Evolves and
Expands?
How does the AI learn?
What volume of data is
required?
How often is retraining
needed?
The considerations you should make
when choosing an AI-based platform
How to Choose an AI-based
Cyber Security Platform
Is the solution efficient? Is It Really Unsupervised?
What are the error rates? Is the error rate acceptable
to achieve detection?
Wale Omolere Role of Ai in cyber security
21 www.smartlearninguk.com21 www.smartlearninguk.com
https://www.researchgate.net/publication/236346414_AN_OVERVIEW_OF_ARTIFICIAL_INTELLIGENCE
https://www.techopedia.com/definition/30389/supervised-learning
https://www.kaspersky.co.uk/resource-center/definitions/what-is-cyber-security
https://cyberstartupobservatory.com/cyber-security-next-generation-challenges-threats-and-defense/
https://www.computer.org/publications/tech-news/trends/the-impact-of-ai-on-cybersecurity
https://mixmode.ai/wp-content/uploads/2020/08/MixMode-Guide-for-AI-based-Cybersecurity-Systems-2.pdf
Reference
Wale Omolere Role of Ai in cyber security
22 www.smartlearninguk.com22 www.smartlearninguk.com
THANK YOU for LISTENING its
QUESTION TIME

More Related Content

What's hot

What's hot (20)

Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
AI in security
AI in securityAI in security
AI in security
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 

Similar to Artificial Intelligence in cybersecurity

[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
DataScienceConferenc1
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 

Similar to Artificial Intelligence in cybersecurity (20)

Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
AI and Machine Learning in Cybersecurity.pdf
AI and Machine Learning in Cybersecurity.pdfAI and Machine Learning in Cybersecurity.pdf
AI and Machine Learning in Cybersecurity.pdf
 
Machine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdfMachine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdf
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
 
CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in Cybersecurity
 
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewRole of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
 
Emerging Tech webinar
Emerging Tech webinarEmerging Tech webinar
Emerging Tech webinar
 
Artificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillanceArtificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillance
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Artificial Intelligence in cybersecurity