SlideShare a Scribd company logo
1 of 16
[object Object],[object Object],[object Object],[object Object],ALADIN: Active Learning for Statistical Intrusion Detection NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
Motivation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
Active Learning ,[object Object],[object Object],[object Object],[object Object],[object Object],NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
ALADIN ,[object Object],[object Object],[object Object],12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
Choosing Samples for Labeling – Active Anomaly Detection ,[object Object],[object Object],[object Object],[object Object],[object Object],12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
Choosing Samples for Labeling – Active Learning ,[object Object],[object Object],[object Object],[object Object],12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
ALADIN: Combines Active Anomaly Detection and Active Learning NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
Classification Stage ,[object Object],[object Object],[object Object],[object Object],[object Object],12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
Modeling Stage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
Network Intrusion Detection Results ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
Results – Anomaly Detection 12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
Results – Prediction Accuracy 12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
FP/FN Per Class NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007 True Label Num Labeled Samples True Predicted Label TP Count Incorrectly Predicted Label FN Count FP Rate FN Rate normal 551 normal 55715 satan 3 4.12% 0.20% guess_passwd 10 ipsweep 67 back 2 neptune 57 neptune 20425 0.00% 0.00% smurf 82 smurf 18904 normal 7 0.00% 0.04% back 36 back 5 normal 1961 0.00% 99.75% ipsweep 58 ipsweep 675 normal 27 0.07% 3.85% satan 49 satan 470 normal 20 0.00% 4.08% portsweep 54 portsweep 223 normal 1 0.00% 0.45%
Malware Detection on Microsoft Network Logs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
[object Object],[object Object],[object Object],[object Object],ALADIN: Active Learning for Statistical Intrusion Detection NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

More Related Content

What's hot

Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringAshwini Almad
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyTommie Walls
 
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and FutureIDS - Fact, Challenges and Future
IDS - Fact, Challenges and Futureamiable_indian
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploitsamiable_indian
 
Advanced malware analysis training session6 malware sandbox analysis
Advanced malware analysis training session6 malware sandbox analysisAdvanced malware analysis training session6 malware sandbox analysis
Advanced malware analysis training session6 malware sandbox analysisCysinfo Cyber Security Community
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Data mining techniques for malware detection.pptx
Data mining techniques for malware detection.pptxData mining techniques for malware detection.pptx
Data mining techniques for malware detection.pptxAditya Deshmukh
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsRahul Mohandas
 
Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2Cysinfo Cyber Security Community
 
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...Microsoft Tech Community
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detectionChong-Kuan Chen
 
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...EndgameInc
 
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения..."Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...Yandex
 
The newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEHThe newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEHShirsendu Kar
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacksUltraUploader
 
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...BlueHat Security Conference
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxRahul Mohandas
 
White Paper - Are antivirus solutions enough to protect industrial plants?
White Paper - Are antivirus solutions enough to protect industrial plants?White Paper - Are antivirus solutions enough to protect industrial plants?
White Paper - Are antivirus solutions enough to protect industrial plants?TI Safe
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemIJRES Journal
 

What's hot (19)

Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and Clustering
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master Copy
 
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and FutureIDS - Fact, Challenges and Future
IDS - Fact, Challenges and Future
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploits
 
Advanced malware analysis training session6 malware sandbox analysis
Advanced malware analysis training session6 malware sandbox analysisAdvanced malware analysis training session6 malware sandbox analysis
Advanced malware analysis training session6 malware sandbox analysis
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Data mining techniques for malware detection.pptx
Data mining techniques for malware detection.pptxData mining techniques for malware detection.pptx
Data mining techniques for malware detection.pptx
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2
 
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
 
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения..."Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
 
The newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEHThe newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEH
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
 
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
White Paper - Are antivirus solutions enough to protect industrial plants?
White Paper - Are antivirus solutions enough to protect industrial plants?White Paper - Are antivirus solutions enough to protect industrial plants?
White Paper - Are antivirus solutions enough to protect industrial plants?
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
 

Viewers also liked

Itautec agencia futuro 19jun13
Itautec agencia futuro 19jun13Itautec agencia futuro 19jun13
Itautec agencia futuro 19jun13Antonio Bernardino
 
News Press Ireland Tsb Rc1
News Press Ireland Tsb Rc1News Press Ireland Tsb Rc1
News Press Ireland Tsb Rc1Alcantara
 
Internet es solo para jóvenes!!!
Internet es solo para jóvenes!!! Internet es solo para jóvenes!!!
Internet es solo para jóvenes!!! Alex Rodríguez
 
baby think it over rubric
baby think it over rubric baby think it over rubric
baby think it over rubric Meaghan Colardo
 
Tecnologia gestão aula 6
Tecnologia gestão aula 6Tecnologia gestão aula 6
Tecnologia gestão aula 6Fernanda Santos
 
Piratas Que Operan Como Empresas Power Point
Piratas Que Operan Como Empresas Power PointPiratas Que Operan Como Empresas Power Point
Piratas Que Operan Como Empresas Power Pointguestf68b60
 
Geometria 2
Geometria 2Geometria 2
Geometria 2DuarteRJ
 
El Estado Chileno y la justificación a su represión acusando a organismos de ...
El Estado Chileno y la justificación a su represión acusando a organismos de ...El Estado Chileno y la justificación a su represión acusando a organismos de ...
El Estado Chileno y la justificación a su represión acusando a organismos de ...Crónicas del despojo
 
Merged Marketing Plan
Merged Marketing PlanMerged Marketing Plan
Merged Marketing PlanJacob Cook
 
Планшет руководителя
Планшет руководителяПланшет руководителя
Планшет руководителяMOBILE DIMENSION LLC
 
Why we are what we eat? Sociocultural dimensions of food
Why we are what we eat? Sociocultural dimensions of foodWhy we are what we eat? Sociocultural dimensions of food
Why we are what we eat? Sociocultural dimensions of foodcomfoodforhealth
 
curiose immagini-pittoresche
curiose immagini-pittoreschecuriose immagini-pittoresche
curiose immagini-pittorescheIvan Consiglio
 

Viewers also liked (19)

Itautec agencia futuro 19jun13
Itautec agencia futuro 19jun13Itautec agencia futuro 19jun13
Itautec agencia futuro 19jun13
 
News Press Ireland Tsb Rc1
News Press Ireland Tsb Rc1News Press Ireland Tsb Rc1
News Press Ireland Tsb Rc1
 
I
II
I
 
Internet es solo para jóvenes!!!
Internet es solo para jóvenes!!! Internet es solo para jóvenes!!!
Internet es solo para jóvenes!!!
 
Introducing me
Introducing meIntroducing me
Introducing me
 
36742
3674236742
36742
 
Mi clase de tres
Mi clase de tresMi clase de tres
Mi clase de tres
 
33649
3364933649
33649
 
baby think it over rubric
baby think it over rubric baby think it over rubric
baby think it over rubric
 
Tecnologia gestão aula 6
Tecnologia gestão aula 6Tecnologia gestão aula 6
Tecnologia gestão aula 6
 
Piratas Que Operan Como Empresas Power Point
Piratas Que Operan Como Empresas Power PointPiratas Que Operan Como Empresas Power Point
Piratas Que Operan Como Empresas Power Point
 
Geometria 2
Geometria 2Geometria 2
Geometria 2
 
El Estado Chileno y la justificación a su represión acusando a organismos de ...
El Estado Chileno y la justificación a su represión acusando a organismos de ...El Estado Chileno y la justificación a su represión acusando a organismos de ...
El Estado Chileno y la justificación a su represión acusando a organismos de ...
 
Merged Marketing Plan
Merged Marketing PlanMerged Marketing Plan
Merged Marketing Plan
 
ملخص الدراسة
ملخص الدراسة ملخص الدراسة
ملخص الدراسة
 
Планшет руководителя
Планшет руководителяПланшет руководителя
Планшет руководителя
 
Why we are what we eat? Sociocultural dimensions of food
Why we are what we eat? Sociocultural dimensions of foodWhy we are what we eat? Sociocultural dimensions of food
Why we are what we eat? Sociocultural dimensions of food
 
curiose immagini-pittoresche
curiose immagini-pittoreschecuriose immagini-pittoresche
curiose immagini-pittoresche
 
Resume-Smita
Resume-SmitaResume-Smita
Resume-Smita
 

Similar to slides

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...IRJET Journal
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionDavid Perkins
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanningsai kiran
 
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosAutomatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosImma Valls Bernaus
 
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosAutomatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosImma Valls Bernaus
 
Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesAutomate threat detections and avoid false positives
Automate threat detections and avoid false positivesElasticsearch
 
Automatiza las detecciones de amenazas y evita los falsos positivos
Automatiza las detecciones de amenazas y evita los falsos positivosAutomatiza las detecciones de amenazas y evita los falsos positivos
Automatiza las detecciones de amenazas y evita los falsos positivosElasticsearch
 
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...Automatically Repairing Web Application Firewalls based on Successful SQL Inj...
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...Lionel Briand
 
Automatisez la détection des menaces et évitez les faux positifs
Automatisez la détection des menaces et évitez les faux positifsAutomatisez la détection des menaces et évitez les faux positifs
Automatisez la détection des menaces et évitez les faux positifsElasticsearch
 
Zentral combine power of osquery_santa
Zentral combine power of osquery_santaZentral combine power of osquery_santa
Zentral combine power of osquery_santaHenry Stamerjohann
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapEric Johansen, CISSP
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Priyanka Aash
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101ysurer
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
Automatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivosAutomatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivosElasticsearch
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesElasticsearch
 

Similar to slides (20)

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanning
 
ISSA Siem Fraud
ISSA Siem FraudISSA Siem Fraud
ISSA Siem Fraud
 
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosAutomatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivos
 
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosAutomatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivos
 
Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesAutomate threat detections and avoid false positives
Automate threat detections and avoid false positives
 
Automatiza las detecciones de amenazas y evita los falsos positivos
Automatiza las detecciones de amenazas y evita los falsos positivosAutomatiza las detecciones de amenazas y evita los falsos positivos
Automatiza las detecciones de amenazas y evita los falsos positivos
 
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...Automatically Repairing Web Application Firewalls based on Successful SQL Inj...
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...
 
Automatisez la détection des menaces et évitez les faux positifs
Automatisez la détection des menaces et évitez les faux positifsAutomatisez la détection des menaces et évitez les faux positifs
Automatisez la détection des menaces et évitez les faux positifs
 
Zentral combine power of osquery_santa
Zentral combine power of osquery_santaZentral combine power of osquery_santa
Zentral combine power of osquery_santa
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Automatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivosAutomatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivos
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
 

More from butest

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEbutest
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jacksonbutest
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer IIbutest
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.docbutest
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1butest
 
Facebook
Facebook Facebook
Facebook butest
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...butest
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTbutest
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docbutest
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docbutest
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.docbutest
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!butest
 

More from butest (20)

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBE
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jackson
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer II
 
PPT
PPTPPT
PPT
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.doc
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1
 
Facebook
Facebook Facebook
Facebook
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENT
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.doc
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.doc
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.doc
 
hier
hierhier
hier
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!
 

slides

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. ALADIN: Combines Active Anomaly Detection and Active Learning NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
  • 8.
  • 9.
  • 10.
  • 11. Results – Anomaly Detection 12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
  • 12. Results – Prediction Accuracy 12/8/2007 NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security
  • 13. FP/FN Per Class NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007 True Label Num Labeled Samples True Predicted Label TP Count Incorrectly Predicted Label FN Count FP Rate FN Rate normal 551 normal 55715 satan 3 4.12% 0.20% guess_passwd 10 ipsweep 67 back 2 neptune 57 neptune 20425 0.00% 0.00% smurf 82 smurf 18904 normal 7 0.00% 0.04% back 36 back 5 normal 1961 0.00% 99.75% ipsweep 58 ipsweep 675 normal 27 0.07% 3.85% satan 49 satan 470 normal 20 0.00% 4.08% portsweep 54 portsweep 223 normal 1 0.00% 0.45%
  • 14.
  • 15.
  • 16.