SlideShare a Scribd company logo
The European Commission’s
science and knowledge service
Joint Research Centre
Cybersecurity and artificial
intelligence
2
Cybersecurity and
artificial intelligence
Emerging trends
Dr. Ignacio Sanchez
The European Commission’s science and knowledge service
Joint Research Centre
3
The Joint Research Centre
(JRC) at a glance
JRC's Mission
"As the science and knowledge service
of the Commission our mission is to
support EU policies with independent
evidence throughout the whole policy
cycle"
3000 staff
Almost 75% are scientists
and researchers.
Headquarters in Brussels
and research facilities
located in 5 Member States.
4
Cyber & Digital Citizens’ Security Unit Mission
To strengthen trust and security of the European Citizen in a sustainable and
inclusive ICT-based European society by scientific research on how emerging
Information and Communication Technologies will impact on the security and
privacy of citizens’ daily life.
To work on risk mitigation, on cybersecurity, cybercrime, data
protection, privacy and on the associated legal and regulatory frameworks
aiming at a balance between European security needs and fundamental citizen
rights including from the perspective of the emerging Digital Single Market.
5
European Commission's Joint Research Centre
(JRC) flagship report on Artificial Intelligence
Joint Research Centre’s report on Artificial Intelligence
(5 December 2018)
URL: https://ec.europa.eu/jrc/en/publication/eur-scientific-and-technical-
research-reports/artificial-intelligence-european-perspective
ISBN: 978-92-79-97217-1 (online),978-92-79-97219-5 (print),978-92-79-98213-2
ISSN: 1831-9424 (online),1018-5593 (print),1831-9424
DOI: 10.2760/11251 (online); 10.2760/936974 (print);10.2760/91283
Coordinated Plan on Artificial Intelligence
(7 December 2018)
Communication from the Commission to the European Parliament, the European Council, the
Council, the European Economic and Social Committee and the Committee of the Regions -
Coordinated Plan on Artificial Intelligence (COM(2018) 795 final)
Communication Artificial Intelligence for Europe
(25 April 2018)
Communication from the Commission to the European Parliament, the European Council, the
Council, the European Economic and Social Committee and the Committee of the Regions on
Artificial Intelligence for Europe.
6
Artificial Intelligence
European Commission's High-level expert group on Artificial Intelligence. "A definition of AI: main
capabilities and scientific disciplines", 18 December 2018
“Artificial intelligence (AI) refers to systems designed by humans that,
given a complex goal, act in the physical or digital world by perceiving
their environment, interpreting the collected structured or unstructured
data, reasoning on the knowledge derived from this data and deciding the
best action(s) to take (according to pre-defined parameters) to achieve
the given goal. AI systems can also be designed to learn to adapt their
behaviour by analysing how the environment is affected by their previous
actions.
As a scientific discipline, AI includes several approaches and
techniques, such as machine learning (of which deep learning and
reinforcement learning are specific examples), machine reasoning (which
includes planning, scheduling, knowledge representation and reasoning,
search, and optimization), and robotics (which includes control,
perception, sensors and actuators, as well as the integration of all other
techniques into cyber-physical systems).”
7
Machine learning
AI
More
computing
power
More data
New
algorithms
What has changed?
A new paradigm
When using machine learning, human developers no longer program
an algorithm to tell the computer how to solve a given problem
but instead they program it to teach the computer to learn how
to solve the problem.
8
Cybersecurity and AI & DT: 4 angles of influence
Conceptual model depicting the logical links between the different components of the
cybersecurity risk in the context of the influence of AI and Digital Transformation
Opportunities Challenges
Resilience
1. AI to create smarter
cybersecurity
E.g. more effective security controls
(antivirus, intrusion detection and
prevention, email scanning),
automatic discovery of vulnerabilities,
automatic malware analysis, smarter
cyber defence, etc.
2. Robustness/Vulnerability
of AI algorithms
E.g. adversarial machine learning (i.e.
exploitation of weaknesses in AI
algorithms to change their behavior),
attacks against AI powered cyber-
physical systems, etc.
Deterrence
4. Use of AI to fight cyber
attackers & criminals
E.g. better biometrics, smarter
forensics, fraud analysis, encryption
challenge, fight against fake news,
etc.
3. Misuse of AI
E.g. creation of deep audio video
fakes, AI powered malware, smarter
social engineering attacks, etc.
3
4
2
1
9
ANGLE 1 | Smarter Cybersecurity
Smarter cybersecurity controls
• Better biometric controls
• Network Intrusion Detection and
Prevention systems
• Malware detection
• Email filters (spam, phishing, etc.)
Automatization in labour intensive tasks
• Automatic discovery of vulnerabilities
• Automatic exploitation of vulnerabilities
• AI applied to malware analysis
• Security logs and event correlation
• Automatization of security operations
(e.g. incident response)
• Cybersecurity exercises
(attack/defense) and training
• Awareness raising
AI to create smarter cybersecurity
10
DARPA Cyber Grand Challenge (CGC)
URL: https://www.darpa.mil/program/cyber-grand-challenge
ANGLE 1 Example | Smarter Cybersecurity
Autonomous security operations
Real time visualisation of a buffer overflow exploit in CGC
2016 Cyber Grand Challenge Final Event
11
Machine learning: a new paradigm
ANGLE 2 | Robustness/Vulnerability of AI algorithms
• AI cannot be made unconditionally safe, like
any other technology.
• AI software based on machine learning
techniques is found to not be robust against
malicious attacks that exploit a specific set of
AI vulnerabilities.
• Thus: AI itself will likely be exploited and
misused, for example by criminals.
• Of highest importance: securing cyber-
physical systems employing AI.
12
Classified as: ostrich.
Classified as: dog. Add crafted noise.
Fooling a state-of-the-art object recognition neural network through the simple act of
Introducing specially crafted noise (Szegedy et al. 2013)
Example of adversarial Machine Learning in image recognition
Adversarial Machine Learning
ANGLE 2 Example | Robustness/Vulnerability of AI algorithms
13
“Robust Physical World Attacks on Deep Learning Models” (Eykholt et al. 2018)
Left: real graffiti on STOP sign.
Right: designed stickers to mimic the situation and fool an object recognition AI.
>= 83 % success rate in fooling a state-of-the-art object recognition
system in real drive-by tests
Example of a real life adversarial attacks
Adversarial Machine Learning
ANGLE 2 Example| Robustness/Vulnerability of AI algorithms
14
New type of cyberattacks
• Usage of AI for the evasion of cybersecurity controls
(e.g. captcha solvers, antispam/antiphising filters,
malware detection)
• Autonomous / automatic decision making in
cyberattacks (e.g. autonomous lateral movements in
cyberattacks)
• Enhanced social engineering and identity theft (i.e.
realistic imitation of drafting style, voices and video)
• Abuse of AI limitations
Automatization of labour
• Some cybercrime labour intensive tasks can be
automated, enabling for example:
• Massive spear phishing attacks (highly targeted)
• Highly interactive and scalable social engineering
attacks (e.g. chat bots over IM, email or social media)
• Automatic botnet management
• Faster, more interactive and scalable attacks
• Automatization of cybercrime processes (e.g.
ransomware payments)
More effective
Scalable
Faster
More
interactive
More
autonomous
More targeted
More difficult
to attribute
Cheaper
AI can make
cyberattacks …
Influence of AI in cybersecurity threats
ANGLE 3 | Misuse of AI
15
Captchas
https://github.com/mwrlabs/captcha_cracking
AI applied to malware
Social Engineering, deception and Identity theft
AI-based attacks against authentication systems
Identity theft and social engineering
Phishing and cyber extortion
Automated interactive attacks
• More targeted (e.g. impersonation of friends;
location of targets in social media)
• More contextualized (e.g. language translation,
use of personal information)
Brundage, Miles, et al., "The malicious use of artificial intelligence: forecasting,
prevention, and mitigation”, arXiv preprint arXiv:1802.07228 (2018)
Sivakorn, Suphannee, Jason Polakis, and Angelos D. Keromytis, "I’m not a human:
Breaking the Google reCAPTCHA”, Black Hat (2016)
• Massive spear phishing
• Automatic ransom negotiation and assistance
• Deep video fakes
• Fake audio voice
• Fake news
• Autonomous decision making in malware (lower dependence on
remote control)
• Evasion of malware detection controls
• Self-maintained, self-protecting and evolving botnets
AI-enhanced cyberattacks
ANGLE 3 Examples | Misuse of AI
16
AI can help in:
• Reinforcing investigative capabilities
• Strengthen digital evidence-making in court
New AI based tools:
• Biometrics
• Image / audio / video analytics
• Localisation fingerprinting
• Evidence identification and correlation
• Encryption challenge
• Automatic scanning
• Digital forensics (data in transit, data at rest)
• Analysis of local and global context
AI will help not only in the fight against cybercrime but also cyber-dependant crime and more
generally crime
AI in Law Enforcement
ANGLE 4 | AI to fight (cyber)crime
WHO
WHERE
WHAT
17
From classical text-based search (keywords) …
To JRC ML / Deep Learning feature-based approach …
• Human image interpretation is subjective
• The process is tedious and therefore error-prone
• The precision of recognition depends on the tattoo description
Keyword DB
Keyword(s) Matches
Visual Tattoo Inspection
HUMAN/SKULL,
OBJECT/FIRE,
OBJECT/WEAPON
Tattoo Detection
Segmentation
Learnt
features
1st candidate 2nd 3rd
1st candidate 2nd 3rd
Tattoo
Description
Tattoo
Identification
Deep
Learning
Model
Real datasets used: FBI Tattoo Database (NIST/Tatt-C)
JRC's research on Automatic Tattoo recognition
Automatic Tattoo recognition
ANGLE 4 Example | AI to fight (cyber)crime
Deep
Learning
Model
Deep
Learning
or SVM
18
From picture to video
Camera fingerprinting
JRC's research on smarter image / audio / video forensics
Smarter image /audio/video forensics
ANGLE 4 Example | Camera identification
SPN extraction
19
Stay in touch
•EU Science Hub: ec.europa.eu/jrc
•Twitter: @EU_ScienceHub
•Facebook: EU Science Hub - Joint Research Centre
•LinkedIn: Joint Research Centre
•YouTube: EU Science Hub

More Related Content

Similar to 16190734.ppt

Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
General studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxGeneral studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptx
HusseinKabaleke
 
KIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdfKIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdf
SreyaseeDasBhattacha1
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET Journal
 
Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020
BhanuSagar3
 
Introducation to Artificial Intelligence
Introducation to Artificial IntelligenceIntroducation to Artificial Intelligence
Introducation to Artificial Intelligence
Makerere Unversity School of Public Health, Victoria University
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
amdigitalmark15
 
Edenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing AgencyEdenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing Agency
lavishandmitteamg
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
FlyWly
 
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
Ethical Consultant Services
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
cyberprosocial
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
Faction XYZ
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET Journal
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
Teacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsTeacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implications
Sonja Aits
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
guest45deb89
 

Similar to 16190734.ppt (20)

Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
General studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxGeneral studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptx
 
KIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdfKIVI Innovation Drinks - Presentation Philip Brey.pdf
KIVI Innovation Drinks - Presentation Philip Brey.pdf
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020Artificial intelligence dr bhanu ppt 13 09-2020
Artificial intelligence dr bhanu ppt 13 09-2020
 
Introducation to Artificial Intelligence
Introducation to Artificial IntelligenceIntroducation to Artificial Intelligence
Introducation to Artificial Intelligence
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
 
Edenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing AgencyEdenlav Affordable Digital Marketing Agency
Edenlav Affordable Digital Marketing Agency
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
 
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
The Unleashing the Power of AI & How Machine Learning is Revolutionizing Ever...
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Teacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsTeacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implications
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 

Recently uploaded

Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 

Recently uploaded (20)

Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 

16190734.ppt

  • 1. The European Commission’s science and knowledge service Joint Research Centre Cybersecurity and artificial intelligence
  • 2. 2 Cybersecurity and artificial intelligence Emerging trends Dr. Ignacio Sanchez The European Commission’s science and knowledge service Joint Research Centre
  • 3. 3 The Joint Research Centre (JRC) at a glance JRC's Mission "As the science and knowledge service of the Commission our mission is to support EU policies with independent evidence throughout the whole policy cycle" 3000 staff Almost 75% are scientists and researchers. Headquarters in Brussels and research facilities located in 5 Member States.
  • 4. 4 Cyber & Digital Citizens’ Security Unit Mission To strengthen trust and security of the European Citizen in a sustainable and inclusive ICT-based European society by scientific research on how emerging Information and Communication Technologies will impact on the security and privacy of citizens’ daily life. To work on risk mitigation, on cybersecurity, cybercrime, data protection, privacy and on the associated legal and regulatory frameworks aiming at a balance between European security needs and fundamental citizen rights including from the perspective of the emerging Digital Single Market.
  • 5. 5 European Commission's Joint Research Centre (JRC) flagship report on Artificial Intelligence Joint Research Centre’s report on Artificial Intelligence (5 December 2018) URL: https://ec.europa.eu/jrc/en/publication/eur-scientific-and-technical- research-reports/artificial-intelligence-european-perspective ISBN: 978-92-79-97217-1 (online),978-92-79-97219-5 (print),978-92-79-98213-2 ISSN: 1831-9424 (online),1018-5593 (print),1831-9424 DOI: 10.2760/11251 (online); 10.2760/936974 (print);10.2760/91283 Coordinated Plan on Artificial Intelligence (7 December 2018) Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions - Coordinated Plan on Artificial Intelligence (COM(2018) 795 final) Communication Artificial Intelligence for Europe (25 April 2018) Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions on Artificial Intelligence for Europe.
  • 6. 6 Artificial Intelligence European Commission's High-level expert group on Artificial Intelligence. "A definition of AI: main capabilities and scientific disciplines", 18 December 2018 “Artificial intelligence (AI) refers to systems designed by humans that, given a complex goal, act in the physical or digital world by perceiving their environment, interpreting the collected structured or unstructured data, reasoning on the knowledge derived from this data and deciding the best action(s) to take (according to pre-defined parameters) to achieve the given goal. AI systems can also be designed to learn to adapt their behaviour by analysing how the environment is affected by their previous actions. As a scientific discipline, AI includes several approaches and techniques, such as machine learning (of which deep learning and reinforcement learning are specific examples), machine reasoning (which includes planning, scheduling, knowledge representation and reasoning, search, and optimization), and robotics (which includes control, perception, sensors and actuators, as well as the integration of all other techniques into cyber-physical systems).”
  • 7. 7 Machine learning AI More computing power More data New algorithms What has changed? A new paradigm When using machine learning, human developers no longer program an algorithm to tell the computer how to solve a given problem but instead they program it to teach the computer to learn how to solve the problem.
  • 8. 8 Cybersecurity and AI & DT: 4 angles of influence Conceptual model depicting the logical links between the different components of the cybersecurity risk in the context of the influence of AI and Digital Transformation Opportunities Challenges Resilience 1. AI to create smarter cybersecurity E.g. more effective security controls (antivirus, intrusion detection and prevention, email scanning), automatic discovery of vulnerabilities, automatic malware analysis, smarter cyber defence, etc. 2. Robustness/Vulnerability of AI algorithms E.g. adversarial machine learning (i.e. exploitation of weaknesses in AI algorithms to change their behavior), attacks against AI powered cyber- physical systems, etc. Deterrence 4. Use of AI to fight cyber attackers & criminals E.g. better biometrics, smarter forensics, fraud analysis, encryption challenge, fight against fake news, etc. 3. Misuse of AI E.g. creation of deep audio video fakes, AI powered malware, smarter social engineering attacks, etc. 3 4 2 1
  • 9. 9 ANGLE 1 | Smarter Cybersecurity Smarter cybersecurity controls • Better biometric controls • Network Intrusion Detection and Prevention systems • Malware detection • Email filters (spam, phishing, etc.) Automatization in labour intensive tasks • Automatic discovery of vulnerabilities • Automatic exploitation of vulnerabilities • AI applied to malware analysis • Security logs and event correlation • Automatization of security operations (e.g. incident response) • Cybersecurity exercises (attack/defense) and training • Awareness raising AI to create smarter cybersecurity
  • 10. 10 DARPA Cyber Grand Challenge (CGC) URL: https://www.darpa.mil/program/cyber-grand-challenge ANGLE 1 Example | Smarter Cybersecurity Autonomous security operations Real time visualisation of a buffer overflow exploit in CGC 2016 Cyber Grand Challenge Final Event
  • 11. 11 Machine learning: a new paradigm ANGLE 2 | Robustness/Vulnerability of AI algorithms • AI cannot be made unconditionally safe, like any other technology. • AI software based on machine learning techniques is found to not be robust against malicious attacks that exploit a specific set of AI vulnerabilities. • Thus: AI itself will likely be exploited and misused, for example by criminals. • Of highest importance: securing cyber- physical systems employing AI.
  • 12. 12 Classified as: ostrich. Classified as: dog. Add crafted noise. Fooling a state-of-the-art object recognition neural network through the simple act of Introducing specially crafted noise (Szegedy et al. 2013) Example of adversarial Machine Learning in image recognition Adversarial Machine Learning ANGLE 2 Example | Robustness/Vulnerability of AI algorithms
  • 13. 13 “Robust Physical World Attacks on Deep Learning Models” (Eykholt et al. 2018) Left: real graffiti on STOP sign. Right: designed stickers to mimic the situation and fool an object recognition AI. >= 83 % success rate in fooling a state-of-the-art object recognition system in real drive-by tests Example of a real life adversarial attacks Adversarial Machine Learning ANGLE 2 Example| Robustness/Vulnerability of AI algorithms
  • 14. 14 New type of cyberattacks • Usage of AI for the evasion of cybersecurity controls (e.g. captcha solvers, antispam/antiphising filters, malware detection) • Autonomous / automatic decision making in cyberattacks (e.g. autonomous lateral movements in cyberattacks) • Enhanced social engineering and identity theft (i.e. realistic imitation of drafting style, voices and video) • Abuse of AI limitations Automatization of labour • Some cybercrime labour intensive tasks can be automated, enabling for example: • Massive spear phishing attacks (highly targeted) • Highly interactive and scalable social engineering attacks (e.g. chat bots over IM, email or social media) • Automatic botnet management • Faster, more interactive and scalable attacks • Automatization of cybercrime processes (e.g. ransomware payments) More effective Scalable Faster More interactive More autonomous More targeted More difficult to attribute Cheaper AI can make cyberattacks … Influence of AI in cybersecurity threats ANGLE 3 | Misuse of AI
  • 15. 15 Captchas https://github.com/mwrlabs/captcha_cracking AI applied to malware Social Engineering, deception and Identity theft AI-based attacks against authentication systems Identity theft and social engineering Phishing and cyber extortion Automated interactive attacks • More targeted (e.g. impersonation of friends; location of targets in social media) • More contextualized (e.g. language translation, use of personal information) Brundage, Miles, et al., "The malicious use of artificial intelligence: forecasting, prevention, and mitigation”, arXiv preprint arXiv:1802.07228 (2018) Sivakorn, Suphannee, Jason Polakis, and Angelos D. Keromytis, "I’m not a human: Breaking the Google reCAPTCHA”, Black Hat (2016) • Massive spear phishing • Automatic ransom negotiation and assistance • Deep video fakes • Fake audio voice • Fake news • Autonomous decision making in malware (lower dependence on remote control) • Evasion of malware detection controls • Self-maintained, self-protecting and evolving botnets AI-enhanced cyberattacks ANGLE 3 Examples | Misuse of AI
  • 16. 16 AI can help in: • Reinforcing investigative capabilities • Strengthen digital evidence-making in court New AI based tools: • Biometrics • Image / audio / video analytics • Localisation fingerprinting • Evidence identification and correlation • Encryption challenge • Automatic scanning • Digital forensics (data in transit, data at rest) • Analysis of local and global context AI will help not only in the fight against cybercrime but also cyber-dependant crime and more generally crime AI in Law Enforcement ANGLE 4 | AI to fight (cyber)crime WHO WHERE WHAT
  • 17. 17 From classical text-based search (keywords) … To JRC ML / Deep Learning feature-based approach … • Human image interpretation is subjective • The process is tedious and therefore error-prone • The precision of recognition depends on the tattoo description Keyword DB Keyword(s) Matches Visual Tattoo Inspection HUMAN/SKULL, OBJECT/FIRE, OBJECT/WEAPON Tattoo Detection Segmentation Learnt features 1st candidate 2nd 3rd 1st candidate 2nd 3rd Tattoo Description Tattoo Identification Deep Learning Model Real datasets used: FBI Tattoo Database (NIST/Tatt-C) JRC's research on Automatic Tattoo recognition Automatic Tattoo recognition ANGLE 4 Example | AI to fight (cyber)crime Deep Learning Model Deep Learning or SVM
  • 18. 18 From picture to video Camera fingerprinting JRC's research on smarter image / audio / video forensics Smarter image /audio/video forensics ANGLE 4 Example | Camera identification SPN extraction
  • 19. 19 Stay in touch •EU Science Hub: ec.europa.eu/jrc •Twitter: @EU_ScienceHub •Facebook: EU Science Hub - Joint Research Centre •LinkedIn: Joint Research Centre •YouTube: EU Science Hub