SlideShare a Scribd company logo
1 of 19
VENESEG S.A. DE C.V. The Information Warfare: Challenges and Risks of Social Networks (Researchfor Governments and Security Entities)
VENESEG : WHO ARE WE ? Associatedwith CANIAC EUROPE, wehaveanInternational Experts Network More than30 years of OperationnalExperiencein the French SecretServices Operating in 63 countries, Head Quarter in France, Panama, Mexico and soon in Brasil 56GovernmentsServedand SecuredwithoursServices (National Security Aspect) We are experts in: ,[object Object]
Advanced Access Control and Physical Security Aspect
Integral and Operationnal Security Solution
TelecommunicationsSystems
Electronics and Software EngineeringDedicatedtoGovernmentsEntities and LargeCorporateCompaniesin: ,[object Object]
Counter-Intelligence
Counter-Terrorism,[object Object]
SOCIAL NETWORK SECURITY CONTENT IN 3 POINTS ThreatsIdentification By Default: Private and Professional life violation risks  Cross Correlation of open (Public) information Confidential and Sensitive information revealed by advanced analysis  Informationwarfare (INFOWAR): Manipulation and DestabilizationConcepts The Security Aspect The Common Sense and Training Aspect How to Respond and Protect  The heuristic based security solution, a proactive protection  How to build a strong predictive information’s protection
THREATS IDENTIFICATION (1/3)
THREATS IDENTIFICATION (2/3) Justanexemple… Attackercollectsuserinformationson social networksites Sendfabricatedmessage / Constructapplicationswith personal details Thefabricatedmessage / Constructedapplicationtake place overthe social network
THREATS IDENTIFICATION (3/3) And…TheWorst  !
THE SECURITY ASPECT (1/2) Thebig and fundamental questionis:  CAN I TRUST THE INFORMATIONS I RECEIVED FROM THIS SOCIAL NETWORK ? And theanswermust be ever: NO, NEVER !!! Ifyouransweris yes, call me, i can helpyou Why ? Theanswerisyours, youhaveyourownreasons, well…i hope foryou ! Ok, so…howtoprotectusagainstthe social networksdangers ? EASY, USE YOUR COMMON SENSE AND AN ADAPTED TRAINING ! A simple exemple of myownlife
THE SECURITY ASPECT (2/2) Are youreadytoriskyourownlife in this cave ? No ???  Well, whywouldyouliketoriskyour image (Lifestyle) in a cybernetic cave without a good and adapted training  as well as cave  divers ? Itisthesame no ? Remenber:Thecommonsense and anadapted training will do thedifferencebetweenlife and  dead ! Well, at leastunderwater! Unfortunatly, the real lifeisnotworst !!! Youcouldlostyourjob, yourimage, yourfriends and family ! You can alsoput in real dangeryourcompany ! Do youreallywantthis ?
HOW TO RESPOND AND PROTECT Our approach to expect a true and effective proactive protection: ,[object Object]
The second approach: Heuristic functions and Fuzzy logic         Electronic Risk Patterns,[object Object]
THE SUPERVISED NEURAL NETWORK (2/2) RISK Outputs Out = 1, Yes Out = 0, No ExpertSystem Name Job AddressCompany Relationship Prof. Equipments Intelligence Manipulation Blackmail False Apps Virus / Worm / … Targets Inputs ,[object Object]
Theaverage time costlearningislessthan 6H to be effective, usingit in full time mode
Accordingtothetestswedidover 150 scenariosthe false positive ratio islessthan 0,21% !,[object Object]

More Related Content

Viewers also liked

Presentation Veneseg
Presentation VenesegPresentation Veneseg
Presentation Venesegc_herault
 
On Beyond (PostgreSQL) Data Types
On Beyond (PostgreSQL) Data TypesOn Beyond (PostgreSQL) Data Types
On Beyond (PostgreSQL) Data TypesJonathan Katz
 
Indexing Complex PostgreSQL Data Types
Indexing Complex PostgreSQL Data TypesIndexing Complex PostgreSQL Data Types
Indexing Complex PostgreSQL Data TypesJonathan Katz
 
Developing and Deploying Apps with the Postgres FDW
Developing and Deploying Apps with the Postgres FDWDeveloping and Deploying Apps with the Postgres FDW
Developing and Deploying Apps with the Postgres FDWJonathan Katz
 
L methylfolate The New face of Folic Acid
L methylfolate The New face of Folic AcidL methylfolate The New face of Folic Acid
L methylfolate The New face of Folic AcidGul Nawaz
 
Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)Jonathan Katz
 
Webscale PostgreSQL - JSONB and Horizontal Scaling Strategies
Webscale PostgreSQL - JSONB and Horizontal Scaling StrategiesWebscale PostgreSQL - JSONB and Horizontal Scaling Strategies
Webscale PostgreSQL - JSONB and Horizontal Scaling StrategiesJonathan Katz
 
Tranexamic Acid "Maxna" (by gul nawaz khan)
Tranexamic Acid  "Maxna" (by gul nawaz khan)Tranexamic Acid  "Maxna" (by gul nawaz khan)
Tranexamic Acid "Maxna" (by gul nawaz khan)Gul Nawaz
 
Genmax (tribulus terrestris)
Genmax (tribulus terrestris)Genmax (tribulus terrestris)
Genmax (tribulus terrestris)Gul Nawaz
 
Amazon: Strategic Management
Amazon: Strategic ManagementAmazon: Strategic Management
Amazon: Strategic ManagementFarhaad Sheikh
 

Viewers also liked (12)

Presentation Veneseg
Presentation VenesegPresentation Veneseg
Presentation Veneseg
 
Adsii Slide Show
Adsii Slide ShowAdsii Slide Show
Adsii Slide Show
 
On Beyond (PostgreSQL) Data Types
On Beyond (PostgreSQL) Data TypesOn Beyond (PostgreSQL) Data Types
On Beyond (PostgreSQL) Data Types
 
Indexing Complex PostgreSQL Data Types
Indexing Complex PostgreSQL Data TypesIndexing Complex PostgreSQL Data Types
Indexing Complex PostgreSQL Data Types
 
Developing and Deploying Apps with the Postgres FDW
Developing and Deploying Apps with the Postgres FDWDeveloping and Deploying Apps with the Postgres FDW
Developing and Deploying Apps with the Postgres FDW
 
L methylfolate The New face of Folic Acid
L methylfolate The New face of Folic AcidL methylfolate The New face of Folic Acid
L methylfolate The New face of Folic Acid
 
Columnas Estructurales
Columnas EstructuralesColumnas Estructurales
Columnas Estructurales
 
Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)
 
Webscale PostgreSQL - JSONB and Horizontal Scaling Strategies
Webscale PostgreSQL - JSONB and Horizontal Scaling StrategiesWebscale PostgreSQL - JSONB and Horizontal Scaling Strategies
Webscale PostgreSQL - JSONB and Horizontal Scaling Strategies
 
Tranexamic Acid "Maxna" (by gul nawaz khan)
Tranexamic Acid  "Maxna" (by gul nawaz khan)Tranexamic Acid  "Maxna" (by gul nawaz khan)
Tranexamic Acid "Maxna" (by gul nawaz khan)
 
Genmax (tribulus terrestris)
Genmax (tribulus terrestris)Genmax (tribulus terrestris)
Genmax (tribulus terrestris)
 
Amazon: Strategic Management
Amazon: Strategic ManagementAmazon: Strategic Management
Amazon: Strategic Management
 

Similar to VENESEG: Neural Networks & Heuristics Protect Against Social Media Threats

Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017MLconf
 
coppin chapter 10e.ppt
coppin chapter 10e.pptcoppin chapter 10e.ppt
coppin chapter 10e.pptbutest
 
Hash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityHash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityIan Beckett
 
Intelligence control using fuzzy logic
Intelligence control using fuzzy logicIntelligence control using fuzzy logic
Intelligence control using fuzzy logicelakiyakishok
 
Information Theory
Information TheoryInformation Theory
Information TheorySou Jana
 
Avian Influenza (H5N1) Expert System using Dempster-Shafer Theory
Avian Influenza (H5N1) Expert System using Dempster-Shafer TheoryAvian Influenza (H5N1) Expert System using Dempster-Shafer Theory
Avian Influenza (H5N1) Expert System using Dempster-Shafer TheoryAndino Maseleno
 
Mc Culloch Pitts Neuron
Mc Culloch Pitts NeuronMc Culloch Pitts Neuron
Mc Culloch Pitts NeuronShajun Nisha
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection철 김
 
Anomaly Detection for Real-World Systems
Anomaly Detection for Real-World SystemsAnomaly Detection for Real-World Systems
Anomaly Detection for Real-World SystemsManojit Nandi
 
Hierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionHierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionIhor Bobak
 
Lect 2 basic ppt
Lect 2 basic pptLect 2 basic ppt
Lect 2 basic pptTao Hong
 
Introduction to soft computing V 1.0
Introduction to soft computing  V 1.0Introduction to soft computing  V 1.0
Introduction to soft computing V 1.0Dr. C.V. Suresh Babu
 
Convolutional neural network
Convolutional neural networkConvolutional neural network
Convolutional neural networkItachi SK
 
Ai demystified (dbe, south campus)
Ai  demystified (dbe, south campus)Ai  demystified (dbe, south campus)
Ai demystified (dbe, south campus)SaurabhKhanna31
 
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...Communication Systems & Networks
 

Similar to VENESEG: Neural Networks & Heuristics Protect Against Social Media Threats (20)

Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
 
coppin chapter 10e.ppt
coppin chapter 10e.pptcoppin chapter 10e.ppt
coppin chapter 10e.ppt
 
Hash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityHash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurity
 
Intelligence control using fuzzy logic
Intelligence control using fuzzy logicIntelligence control using fuzzy logic
Intelligence control using fuzzy logic
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
PyGotham 2016
PyGotham 2016PyGotham 2016
PyGotham 2016
 
Information Theory
Information TheoryInformation Theory
Information Theory
 
Avian Influenza (H5N1) Expert System using Dempster-Shafer Theory
Avian Influenza (H5N1) Expert System using Dempster-Shafer TheoryAvian Influenza (H5N1) Expert System using Dempster-Shafer Theory
Avian Influenza (H5N1) Expert System using Dempster-Shafer Theory
 
Neural_Network
Neural_NetworkNeural_Network
Neural_Network
 
Mc Culloch Pitts Neuron
Mc Culloch Pitts NeuronMc Culloch Pitts Neuron
Mc Culloch Pitts Neuron
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
Anomaly Detection for Real-World Systems
Anomaly Detection for Real-World SystemsAnomaly Detection for Real-World Systems
Anomaly Detection for Real-World Systems
 
Hierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionHierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly Detection
 
Lect 2 basic ppt
Lect 2 basic pptLect 2 basic ppt
Lect 2 basic ppt
 
11 Python CBSE Syllabus
11    Python CBSE Syllabus11    Python CBSE Syllabus
11 Python CBSE Syllabus
 
11 syllabus
11    syllabus11    syllabus
11 syllabus
 
Introduction to soft computing V 1.0
Introduction to soft computing  V 1.0Introduction to soft computing  V 1.0
Introduction to soft computing V 1.0
 
Convolutional neural network
Convolutional neural networkConvolutional neural network
Convolutional neural network
 
Ai demystified (dbe, south campus)
Ai  demystified (dbe, south campus)Ai  demystified (dbe, south campus)
Ai demystified (dbe, south campus)
 
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
 

VENESEG: Neural Networks & Heuristics Protect Against Social Media Threats

  • 1. VENESEG S.A. DE C.V. The Information Warfare: Challenges and Risks of Social Networks (Researchfor Governments and Security Entities)
  • 2.
  • 3. Advanced Access Control and Physical Security Aspect
  • 4. Integral and Operationnal Security Solution
  • 6.
  • 8.
  • 9. SOCIAL NETWORK SECURITY CONTENT IN 3 POINTS ThreatsIdentification By Default: Private and Professional life violation risks Cross Correlation of open (Public) information Confidential and Sensitive information revealed by advanced analysis Informationwarfare (INFOWAR): Manipulation and DestabilizationConcepts The Security Aspect The Common Sense and Training Aspect How to Respond and Protect The heuristic based security solution, a proactive protection How to build a strong predictive information’s protection
  • 11. THREATS IDENTIFICATION (2/3) Justanexemple… Attackercollectsuserinformationson social networksites Sendfabricatedmessage / Constructapplicationswith personal details Thefabricatedmessage / Constructedapplicationtake place overthe social network
  • 12. THREATS IDENTIFICATION (3/3) And…TheWorst !
  • 13. THE SECURITY ASPECT (1/2) Thebig and fundamental questionis: CAN I TRUST THE INFORMATIONS I RECEIVED FROM THIS SOCIAL NETWORK ? And theanswermust be ever: NO, NEVER !!! Ifyouransweris yes, call me, i can helpyou Why ? Theanswerisyours, youhaveyourownreasons, well…i hope foryou ! Ok, so…howtoprotectusagainstthe social networksdangers ? EASY, USE YOUR COMMON SENSE AND AN ADAPTED TRAINING ! A simple exemple of myownlife
  • 14. THE SECURITY ASPECT (2/2) Are youreadytoriskyourownlife in this cave ? No ??? Well, whywouldyouliketoriskyour image (Lifestyle) in a cybernetic cave without a good and adapted training as well as cave divers ? Itisthesame no ? Remenber:Thecommonsense and anadapted training will do thedifferencebetweenlife and dead ! Well, at leastunderwater! Unfortunatly, the real lifeisnotworst !!! Youcouldlostyourjob, yourimage, yourfriends and family ! You can alsoput in real dangeryourcompany ! Do youreallywantthis ?
  • 15.
  • 16.
  • 17.
  • 18. Theaverage time costlearningislessthan 6H to be effective, usingit in full time mode
  • 19.
  • 20. The proposed heuristics methods are based on certain factors and expected behaviors. The factors will be incorporated in the formulas and therefore values will be obtained.
  • 21. Based on a fuzzy criteria, we shall decide about the situation. In all the heuristic formulas, we try to use the most effective factors that might lead to a certain type of risk or threatExemple:SQL Injection Risk Detection (based on the research of Pr. N. Hewahi)
  • 22. HEURISTIC FUNCTIONS AND FUZZY LOGIC (2/4) H1 = Norm ( np + pd + it) np : is the number of used prohibited characters. pd : number of input parameters that do not match the input data type. it : number of trails for inputs (how many times try to give a correct input). The value of H1 will be 0<= H1 <= 1. Standard SQL Injection H2 = Norm (np + U + O ) U : is UNION exist in the input. The value is 1 if yes and 0 if no. O : Does ORDER BY in the input. The value is 1 for yes and 0 for no. The value of H2 will be 0 <= H2 <= 1 Union SQL Injection H3 = Norm (np + nl ) Where np is as defined Before and nl : number of times a trial have been done to get a link (the page might appear or not) Blind SQL Injection
  • 23. HEURISTIC FUNCTIONS AND FUZZY LOGIC (3/4) After obtaining the three values, we try to take a decision about the type of injection we are mostly suspicious of. This is done by specifying a fuzzy logic membership function such as: Where (FUN) could be thevalue of H1, H2 or H3
  • 24. HEURISTIC FUNCTIONS AND FUZZY LOGIC (4/4) We then construct fuzzy rules (SECURE POLICY) to decide which kind of injection we are mostly suspicious of. A sample of such rules are presented below: IF H1 is High and H2 is LOW then o1 is MORE IF H1 is High and H3 is LOW then o1 is MORE IF H1 is LOW and H2 is HIGH then o2 is MORE IF H3 is LOW and H1 is low and H2 is HIGH then o2 is MORE IF H1 is MED and H2 is MED then o1 is MED and o2 is MED. IF H1 is MED and H2 is HIGH THEN o2 is MED. IF H1 is LOW then o1 is LESS. And so on… MORE, MED and LESS are measures to scale the fuzzy values of the outputs through another membership function.
  • 25.
  • 26. Based on the above rules, we shall have three values for o1, o2 and o3. Those values can be computed by defuzzifications using center of gravity.
  • 27. The obtained values of o1, o2 and o3 will have values between 0 and 100. The one with the highest value will be the most suspicious SQL injection.
  • 28.
  • 29. THANKS THANK YOU FOR YOUR TIME Christophe HERAULT CEO – VENESEG christophe@veneseg.com http://www.veneseg.com