SlideShare a Scribd company logo
1 of 19
The European Commission’s
science and knowledge service
Joint Research Centre
Cybersecurity and artificial
intelligence
2
Cybersecurity and
artificial intelligence
Emerging trends
Dr. Ignacio Sanchez
The European Commission’s science and knowledge service
Joint Research Centre
3
The Joint Research Centre
(JRC) at a glance
JRC's Mission
"As the science and knowledge service
of the Commission our mission is to
support EU policies with independent
evidence throughout the whole policy
cycle"
3000 staff
Almost 75% are scientists
and researchers.
Headquarters in Brussels
and research facilities
located in 5 Member States.
4
Cyber & Digital Citizens’ Security Unit Mission
To strengthen trust and security of the European Citizen in a sustainable and
inclusive ICT-based European society by scientific research on how emerging
Information and Communication Technologies will impact on the security and
privacy of citizens’ daily life.
To work on risk mitigation, on cybersecurity, cybercrime, data
protection, privacy and on the associated legal and regulatory frameworks
aiming at a balance between European security needs and fundamental citizen
rights including from the perspective of the emerging Digital Single Market.
5
European Commission's Joint Research Centre
(JRC) flagship report on Artificial Intelligence
Joint Research Centre’s report on Artificial Intelligence
(5 December 2018)
URL: https://ec.europa.eu/jrc/en/publication/eur-scientific-and-technical-
research-reports/artificial-intelligence-european-perspective
ISBN: 978-92-79-97217-1 (online),978-92-79-97219-5 (print),978-92-79-98213-2
ISSN: 1831-9424 (online),1018-5593 (print),1831-9424
DOI: 10.2760/11251 (online); 10.2760/936974 (print);10.2760/91283
Coordinated Plan on Artificial Intelligence
(7 December 2018)
Communication from the Commission to the European Parliament, the European Council, the
Council, the European Economic and Social Committee and the Committee of the Regions -
Coordinated Plan on Artificial Intelligence (COM(2018) 795 final)
Communication Artificial Intelligence for Europe
(25 April 2018)
Communication from the Commission to the European Parliament, the European Council, the
Council, the European Economic and Social Committee and the Committee of the Regions on
Artificial Intelligence for Europe.
6
Artificial Intelligence
European Commission's High-level expert group on Artificial Intelligence. "A definition of AI: main
capabilities and scientific disciplines", 18 December 2018
“Artificial intelligence (AI) refers to systems designed by humans that,
given a complex goal, act in the physical or digital world by perceiving
their environment, interpreting the collected structured or unstructured
data, reasoning on the knowledge derived from this data and deciding the
best action(s) to take (according to pre-defined parameters) to achieve
the given goal. AI systems can also be designed to learn to adapt their
behaviour by analysing how the environment is affected by their previous
actions.
As a scientific discipline, AI includes several approaches and
techniques, such as machine learning (of which deep learning and
reinforcement learning are specific examples), machine reasoning (which
includes planning, scheduling, knowledge representation and reasoning,
search, and optimization), and robotics (which includes control,
perception, sensors and actuators, as well as the integration of all other
techniques into cyber-physical systems).”
7
Machine learning
AI
More
computing
power
More data
New
algorithms
What has changed?
A new paradigm
When using machine learning, human developers no longer program
an algorithm to tell the computer how to solve a given problem
but instead they program it to teach the computer to learn how
to solve the problem.
8
Cybersecurity and AI & DT: 4 angles of influence
Conceptual model depicting the logical links between the different components of the
cybersecurity risk in the context of the influence of AI and Digital Transformation
Opportunities Challenges
Resilience
1. AI to create smarter
cybersecurity
E.g. more effective security controls
(antivirus, intrusion detection and
prevention, email scanning),
automatic discovery of vulnerabilities,
automatic malware analysis, smarter
cyber defence, etc.
2. Robustness/Vulnerability
of AI algorithms
E.g. adversarial machine learning (i.e.
exploitation of weaknesses in AI
algorithms to change their behavior),
attacks against AI powered cyber-
physical systems, etc.
Deterrence
4. Use of AI to fight cyber
attackers & criminals
E.g. better biometrics, smarter
forensics, fraud analysis, encryption
challenge, fight against fake news,
etc.
3. Misuse of AI
E.g. creation of deep audio video
fakes, AI powered malware, smarter
social engineering attacks, etc.
3
4
2
1
9
ANGLE 1 | Smarter Cybersecurity
Smarter cybersecurity controls
• Better biometric controls
• Network Intrusion Detection and
Prevention systems
• Malware detection
• Email filters (spam, phishing, etc.)
Automatization in labour intensive tasks
• Automatic discovery of vulnerabilities
• Automatic exploitation of vulnerabilities
• AI applied to malware analysis
• Security logs and event correlation
• Automatization of security operations
(e.g. incident response)
• Cybersecurity exercises
(attack/defense) and training
• Awareness raising
AI to create smarter cybersecurity
10
DARPA Cyber Grand Challenge (CGC)
URL: https://www.darpa.mil/program/cyber-grand-challenge
ANGLE 1 Example | Smarter Cybersecurity
Autonomous security operations
Real time visualisation of a buffer overflow exploit in CGC
2016 Cyber Grand Challenge Final Event
11
Machine learning: a new paradigm
ANGLE 2 | Robustness/Vulnerability of AI algorithms
• AI cannot be made unconditionally safe, like
any other technology.
• AI software based on machine learning
techniques is found to not be robust against
malicious attacks that exploit a specific set of
AI vulnerabilities.
• Thus: AI itself will likely be exploited and
misused, for example by criminals.
• Of highest importance: securing cyber-
physical systems employing AI.
12
Classified as: ostrich.
Classified as: dog. Add crafted noise.
Fooling a state-of-the-art object recognition neural network through the simple act of
Introducing specially crafted noise (Szegedy et al. 2013)
Example of adversarial Machine Learning in image recognition
Adversarial Machine Learning
ANGLE 2 Example | Robustness/Vulnerability of AI algorithms
13
“Robust Physical World Attacks on Deep Learning Models” (Eykholt et al. 2018)
Left: real graffiti on STOP sign.
Right: designed stickers to mimic the situation and fool an object recognition AI.
>= 83 % success rate in fooling a state-of-the-art object recognition
system in real drive-by tests
Example of a real life adversarial attacks
Adversarial Machine Learning
ANGLE 2 Example| Robustness/Vulnerability of AI algorithms
14
New type of cyberattacks
• Usage of AI for the evasion of cybersecurity controls
(e.g. captcha solvers, antispam/antiphising filters,
malware detection)
• Autonomous / automatic decision making in
cyberattacks (e.g. autonomous lateral movements in
cyberattacks)
• Enhanced social engineering and identity theft (i.e.
realistic imitation of drafting style, voices and video)
• Abuse of AI limitations
Automatization of labour
• Some cybercrime labour intensive tasks can be
automated, enabling for example:
• Massive spear phishing attacks (highly targeted)
• Highly interactive and scalable social engineering
attacks (e.g. chat bots over IM, email or social media)
• Automatic botnet management
• Faster, more interactive and scalable attacks
• Automatization of cybercrime processes (e.g.
ransomware payments)
More effective
Scalable
Faster
More
interactive
More
autonomous
More targeted
More difficult
to attribute
Cheaper
AI can make
cyberattacks …
Influence of AI in cybersecurity threats
ANGLE 3 | Misuse of AI
15
Captchas
https://github.com/mwrlabs/captcha_cracking
AI applied to malware
Social Engineering, deception and Identity theft
AI-based attacks against authentication systems
Identity theft and social engineering
Phishing and cyber extortion
Automated interactive attacks
• More targeted (e.g. impersonation of friends;
location of targets in social media)
• More contextualized (e.g. language translation,
use of personal information)
Brundage, Miles, et al., "The malicious use of artificial intelligence: forecasting,
prevention, and mitigation”, arXiv preprint arXiv:1802.07228 (2018)
Sivakorn, Suphannee, Jason Polakis, and Angelos D. Keromytis, "I’m not a human:
Breaking the Google reCAPTCHA”, Black Hat (2016)
• Massive spear phishing
• Automatic ransom negotiation and assistance
• Deep video fakes
• Fake audio voice
• Fake news
• Autonomous decision making in malware (lower dependence on
remote control)
• Evasion of malware detection controls
• Self-maintained, self-protecting and evolving botnets
AI-enhanced cyberattacks
ANGLE 3 Examples | Misuse of AI
16
AI can help in:
• Reinforcing investigative capabilities
• Strengthen digital evidence-making in court
New AI based tools:
• Biometrics
• Image / audio / video analytics
• Localisation fingerprinting
• Evidence identification and correlation
• Encryption challenge
• Automatic scanning
• Digital forensics (data in transit, data at rest)
• Analysis of local and global context
AI will help not only in the fight against cybercrime but also cyber-dependant crime and more
generally crime
AI in Law Enforcement
ANGLE 4 | AI to fight (cyber)crime
WHO
WHERE
WHAT
17
From classical text-based search (keywords) …
To JRC ML / Deep Learning feature-based approach …
• Human image interpretation is subjective
• The process is tedious and therefore error-prone
• The precision of recognition depends on the tattoo description
Keyword DB
Keyword(s) Matches
Visual Tattoo Inspection
HUMAN/SKULL,
OBJECT/FIRE,
OBJECT/WEAPON
Tattoo Detection
Segmentation
Learnt
features
1st candidate 2nd 3rd
1st candidate 2nd 3rd
Tattoo
Description
Tattoo
Identification
Deep
Learning
Model
Real datasets used: FBI Tattoo Database (NIST/Tatt-C)
JRC's research on Automatic Tattoo recognition
Automatic Tattoo recognition
ANGLE 4 Example | AI to fight (cyber)crime
Deep
Learning
Model
Deep
Learning
or SVM
18
From picture to video
Camera fingerprinting
JRC's research on smarter image / audio / video forensics
Smarter image /audio/video forensics
ANGLE 4 Example | Camera identification
SPN extraction
19
Stay in touch
•EU Science Hub: ec.europa.eu/jrc
•Twitter: @EU_ScienceHub
•Facebook: EU Science Hub - Joint Research Centre
•LinkedIn: Joint Research Centre
•YouTube: EU Science Hub

More Related Content

Similar to 16190734.ppt

Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
General studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxGeneral studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxHusseinKabaleke
 
KIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdfKIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdfSreyaseeDasBhattacha1
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET Journal
 
Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020BhanuSagar3
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AIamdigitalmark15
 
Edenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing AgencyEdenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing Agencylavishandmitteamg
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfFlyWly
 
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...Ethical Consultant Services
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecuritycyberprosocial
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET Journal
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
Teacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsTeacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsSonja Aits
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligenceguest45deb89
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentMOHAMMED SAQIB
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligencePrakhyath Rai
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 

Similar to 16190734.ppt (20)

Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
General studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxGeneral studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptx
 
KIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdfKIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdf
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020
 
Introducation to Artificial Intelligence
Introducation to Artificial IntelligenceIntroducation to Artificial Intelligence
Introducation to Artificial Intelligence
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
 
Edenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing AgencyEdenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing Agency
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
 
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Teacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsTeacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implications
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 

Recently uploaded

MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 

Recently uploaded (20)

MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 

16190734.ppt

  • 1. The European Commission’s science and knowledge service Joint Research Centre Cybersecurity and artificial intelligence
  • 2. 2 Cybersecurity and artificial intelligence Emerging trends Dr. Ignacio Sanchez The European Commission’s science and knowledge service Joint Research Centre
  • 3. 3 The Joint Research Centre (JRC) at a glance JRC's Mission "As the science and knowledge service of the Commission our mission is to support EU policies with independent evidence throughout the whole policy cycle" 3000 staff Almost 75% are scientists and researchers. Headquarters in Brussels and research facilities located in 5 Member States.
  • 4. 4 Cyber & Digital Citizens’ Security Unit Mission To strengthen trust and security of the European Citizen in a sustainable and inclusive ICT-based European society by scientific research on how emerging Information and Communication Technologies will impact on the security and privacy of citizens’ daily life. To work on risk mitigation, on cybersecurity, cybercrime, data protection, privacy and on the associated legal and regulatory frameworks aiming at a balance between European security needs and fundamental citizen rights including from the perspective of the emerging Digital Single Market.
  • 5. 5 European Commission's Joint Research Centre (JRC) flagship report on Artificial Intelligence Joint Research Centre’s report on Artificial Intelligence (5 December 2018) URL: https://ec.europa.eu/jrc/en/publication/eur-scientific-and-technical- research-reports/artificial-intelligence-european-perspective ISBN: 978-92-79-97217-1 (online),978-92-79-97219-5 (print),978-92-79-98213-2 ISSN: 1831-9424 (online),1018-5593 (print),1831-9424 DOI: 10.2760/11251 (online); 10.2760/936974 (print);10.2760/91283 Coordinated Plan on Artificial Intelligence (7 December 2018) Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions - Coordinated Plan on Artificial Intelligence (COM(2018) 795 final) Communication Artificial Intelligence for Europe (25 April 2018) Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions on Artificial Intelligence for Europe.
  • 6. 6 Artificial Intelligence European Commission's High-level expert group on Artificial Intelligence. "A definition of AI: main capabilities and scientific disciplines", 18 December 2018 “Artificial intelligence (AI) refers to systems designed by humans that, given a complex goal, act in the physical or digital world by perceiving their environment, interpreting the collected structured or unstructured data, reasoning on the knowledge derived from this data and deciding the best action(s) to take (according to pre-defined parameters) to achieve the given goal. AI systems can also be designed to learn to adapt their behaviour by analysing how the environment is affected by their previous actions. As a scientific discipline, AI includes several approaches and techniques, such as machine learning (of which deep learning and reinforcement learning are specific examples), machine reasoning (which includes planning, scheduling, knowledge representation and reasoning, search, and optimization), and robotics (which includes control, perception, sensors and actuators, as well as the integration of all other techniques into cyber-physical systems).”
  • 7. 7 Machine learning AI More computing power More data New algorithms What has changed? A new paradigm When using machine learning, human developers no longer program an algorithm to tell the computer how to solve a given problem but instead they program it to teach the computer to learn how to solve the problem.
  • 8. 8 Cybersecurity and AI & DT: 4 angles of influence Conceptual model depicting the logical links between the different components of the cybersecurity risk in the context of the influence of AI and Digital Transformation Opportunities Challenges Resilience 1. AI to create smarter cybersecurity E.g. more effective security controls (antivirus, intrusion detection and prevention, email scanning), automatic discovery of vulnerabilities, automatic malware analysis, smarter cyber defence, etc. 2. Robustness/Vulnerability of AI algorithms E.g. adversarial machine learning (i.e. exploitation of weaknesses in AI algorithms to change their behavior), attacks against AI powered cyber- physical systems, etc. Deterrence 4. Use of AI to fight cyber attackers & criminals E.g. better biometrics, smarter forensics, fraud analysis, encryption challenge, fight against fake news, etc. 3. Misuse of AI E.g. creation of deep audio video fakes, AI powered malware, smarter social engineering attacks, etc. 3 4 2 1
  • 9. 9 ANGLE 1 | Smarter Cybersecurity Smarter cybersecurity controls • Better biometric controls • Network Intrusion Detection and Prevention systems • Malware detection • Email filters (spam, phishing, etc.) Automatization in labour intensive tasks • Automatic discovery of vulnerabilities • Automatic exploitation of vulnerabilities • AI applied to malware analysis • Security logs and event correlation • Automatization of security operations (e.g. incident response) • Cybersecurity exercises (attack/defense) and training • Awareness raising AI to create smarter cybersecurity
  • 10. 10 DARPA Cyber Grand Challenge (CGC) URL: https://www.darpa.mil/program/cyber-grand-challenge ANGLE 1 Example | Smarter Cybersecurity Autonomous security operations Real time visualisation of a buffer overflow exploit in CGC 2016 Cyber Grand Challenge Final Event
  • 11. 11 Machine learning: a new paradigm ANGLE 2 | Robustness/Vulnerability of AI algorithms • AI cannot be made unconditionally safe, like any other technology. • AI software based on machine learning techniques is found to not be robust against malicious attacks that exploit a specific set of AI vulnerabilities. • Thus: AI itself will likely be exploited and misused, for example by criminals. • Of highest importance: securing cyber- physical systems employing AI.
  • 12. 12 Classified as: ostrich. Classified as: dog. Add crafted noise. Fooling a state-of-the-art object recognition neural network through the simple act of Introducing specially crafted noise (Szegedy et al. 2013) Example of adversarial Machine Learning in image recognition Adversarial Machine Learning ANGLE 2 Example | Robustness/Vulnerability of AI algorithms
  • 13. 13 “Robust Physical World Attacks on Deep Learning Models” (Eykholt et al. 2018) Left: real graffiti on STOP sign. Right: designed stickers to mimic the situation and fool an object recognition AI. >= 83 % success rate in fooling a state-of-the-art object recognition system in real drive-by tests Example of a real life adversarial attacks Adversarial Machine Learning ANGLE 2 Example| Robustness/Vulnerability of AI algorithms
  • 14. 14 New type of cyberattacks • Usage of AI for the evasion of cybersecurity controls (e.g. captcha solvers, antispam/antiphising filters, malware detection) • Autonomous / automatic decision making in cyberattacks (e.g. autonomous lateral movements in cyberattacks) • Enhanced social engineering and identity theft (i.e. realistic imitation of drafting style, voices and video) • Abuse of AI limitations Automatization of labour • Some cybercrime labour intensive tasks can be automated, enabling for example: • Massive spear phishing attacks (highly targeted) • Highly interactive and scalable social engineering attacks (e.g. chat bots over IM, email or social media) • Automatic botnet management • Faster, more interactive and scalable attacks • Automatization of cybercrime processes (e.g. ransomware payments) More effective Scalable Faster More interactive More autonomous More targeted More difficult to attribute Cheaper AI can make cyberattacks … Influence of AI in cybersecurity threats ANGLE 3 | Misuse of AI
  • 15. 15 Captchas https://github.com/mwrlabs/captcha_cracking AI applied to malware Social Engineering, deception and Identity theft AI-based attacks against authentication systems Identity theft and social engineering Phishing and cyber extortion Automated interactive attacks • More targeted (e.g. impersonation of friends; location of targets in social media) • More contextualized (e.g. language translation, use of personal information) Brundage, Miles, et al., "The malicious use of artificial intelligence: forecasting, prevention, and mitigation”, arXiv preprint arXiv:1802.07228 (2018) Sivakorn, Suphannee, Jason Polakis, and Angelos D. Keromytis, "I’m not a human: Breaking the Google reCAPTCHA”, Black Hat (2016) • Massive spear phishing • Automatic ransom negotiation and assistance • Deep video fakes • Fake audio voice • Fake news • Autonomous decision making in malware (lower dependence on remote control) • Evasion of malware detection controls • Self-maintained, self-protecting and evolving botnets AI-enhanced cyberattacks ANGLE 3 Examples | Misuse of AI
  • 16. 16 AI can help in: • Reinforcing investigative capabilities • Strengthen digital evidence-making in court New AI based tools: • Biometrics • Image / audio / video analytics • Localisation fingerprinting • Evidence identification and correlation • Encryption challenge • Automatic scanning • Digital forensics (data in transit, data at rest) • Analysis of local and global context AI will help not only in the fight against cybercrime but also cyber-dependant crime and more generally crime AI in Law Enforcement ANGLE 4 | AI to fight (cyber)crime WHO WHERE WHAT
  • 17. 17 From classical text-based search (keywords) … To JRC ML / Deep Learning feature-based approach … • Human image interpretation is subjective • The process is tedious and therefore error-prone • The precision of recognition depends on the tattoo description Keyword DB Keyword(s) Matches Visual Tattoo Inspection HUMAN/SKULL, OBJECT/FIRE, OBJECT/WEAPON Tattoo Detection Segmentation Learnt features 1st candidate 2nd 3rd 1st candidate 2nd 3rd Tattoo Description Tattoo Identification Deep Learning Model Real datasets used: FBI Tattoo Database (NIST/Tatt-C) JRC's research on Automatic Tattoo recognition Automatic Tattoo recognition ANGLE 4 Example | AI to fight (cyber)crime Deep Learning Model Deep Learning or SVM
  • 18. 18 From picture to video Camera fingerprinting JRC's research on smarter image / audio / video forensics Smarter image /audio/video forensics ANGLE 4 Example | Camera identification SPN extraction
  • 19. 19 Stay in touch •EU Science Hub: ec.europa.eu/jrc •Twitter: @EU_ScienceHub •Facebook: EU Science Hub - Joint Research Centre •LinkedIn: Joint Research Centre •YouTube: EU Science Hub