SlideShare a Scribd company logo
AI & SECURITY
Anurag Sahay
Deep Learning, COE, Nagarro
ALL THINGS START WITH
PHILOSOPHY
Philosophically Fundamental Questions
Can a machine act
intelligently? Can it
solve any problem that
a person would solve
by thinking?
01
Are human intelligence
and machine
intelligence the same?
Is the human
brain essentially a
computer?
02
Can a machine have
a mind, mental states,
and consciousness in
the same way that a
human being can? Can
it feel how things are?
03
AI
impact on
Humanity
SOME BUSINESS CONTEXT
AI is the next digital frontier
In 2016 Companies invested
In artificial Intelligence
Tech Giants Startups
AI Adopters - 20%
in multiple technology areas
AI Partial Adopters - 40%
skeptical about Business Cases and ROI
Laggards - 40%
contemplators
Areas where AI creates significant Value
Smarter R&D
and
Forecasting
1
Optimized
Production and
Maintenance
2
Targeted Sales
and Marketing
3
Enhanced User
Experience
4
AI – THE BIG PICTURE
DEEP
LEARNING
AI – THE SCIENCE
MACHINE
LEARNING
STATISTICAL
SCIENCES
Maths Maths
Algorithms
Maths
Algorithms
Neural Net
AI – THE ENGINEERING
MODEL
WORKFLOW
INTEGRATION
MODEL
BUILDING
DATA
PROCESSING
Data Outcome Process
AI - USE CASE
PRESCRIPTIVE
W INTELLIGENCE
PREIDICTIVE
INTELLIGENCE
DESCRIPTIVE
INTELLIGENCE
Structure Prediction Action
AI – ORGANIZATIONAL MATURITY
AI BASED
ACTION ACTIONS
INSIGHTS
ORIENTED
DATA
BELIEF
Infrastructure Competency Product
AI – VARIOUS APPROACHES
FULLY CLOUD
BASED
Cloud Data APIs,
Model APIs,
Workflow APIs
SEMI CLOUD
BASED
Cloud Data APIs
Custom Model
Custom
Workflow
NON CLOUD
Custom Data APIs
Custom Model
Custom Workflow
SUPERVISED
MACHINE LEARNING
Learning with Examples!
THE LEARNING SPECTRUM
Human Beings learn from experience
We abstract our learning into a rule based
model which we then encode
algorithmically to program a machine
What if we could build a system that could
learn from DATA
Learning from experience Instructions
A system that learns from DATA
LINEAR REGRESSION
A simple way to learn from Data
Finding the right line is the important
problem
We solve it using the Gradient Descent
$100K
$500K
POLYNOMIAL REGRESSION
Linear Regression is more powerful than it
obviously seems. We can fit a lot of
different types of curves..
BAYES
Another interesting approach to
predicting the unknown is through the use
of Bayes Algorithm
cheap
If an email contains the word ‘cheap’ what is the
Probability that it is SPAM ?
3/4
SPAM HAM
Spelling mistake
Missing title
DECISION TREE
Decision Trees are a very simple and
intuitive way to solve a lot of different types
of problems
LOGISTIC REGRESSION
Use ‘misclassification errors’ instead of
‘distance’ to make a line that separates
two sets of data points
NEURAL NETWORK
Multiple ’decision lines’ that can help
separate the data
SUPPORT VECTOR
MACHINE
Instead of ‘gradient Descent’ use ‘Linear
Optimization’ to find the line that best
separates the two data sets
UNSUPERVISED
MACHINE LEARNING
Examples not included!
CLUSTERING
Find ‘ Cluster Structure’ in the Data
OUTLIER DETECTION
Find ‘ outliers’ in the Data
SECURITY AND AI
MALICIOUS URLS
Given a website ‘W’ and a list of
malicious/benign websites , identify
whether ‘W’ is malicious or not
Training Data = URLs of
benign/malicious sites
Use Whitelisted/Blacklisted Websites
URLs from well known sources
http://www.bfuduuioo1fp.mobi/ws/ebayisapi.dll
WHOIS registration 3/25/2008
Hosted from 208.76.89.91/22
IP hosted in Jaipur
Connection Speed T1
Has DNS PTR Record ? Yes
Registrant ”Anurag”
[ 0.56, 9.45, ……. 0 0 1 1 1 …. 1 0 .. 1 0 ]Feature
Building
Real
Valued
Host Based NLP Based
+
Feature Extraction from Website
Website DOM Structure
Advertising Categories
In/Out Links Type
Images on the Website
Now apply, one of the algorithms that we talked abo
and given a new website ‘W’ one can identify whethe
its malicious or not..
MALWARE DETECTION
Given a program code, identify whether
it is a malware/benign with some form
(virus, trojan, etc. )
How AV used to detect malware
Pattern matching on Static Files
Use techniques like emulation to decrypt code
How malwares evade AV
Polymorphic Malware metamorphoses to evade
signature identification
Why Machine Learning for Malware Detection
Too many malware/bots/trojan types
The malware code is very contextual
Mobiles, Networks, Devices..
Very processing heavy
AI oriented malware as well
Approach
Use multiple types of features to identify
Static and Behavioral
Exploit Context (Process, Runtime..)
Use layers of ML classifiers to increase confidence
Combine Supervised and Un-Supervised Learning
INTRUSION DETECTION
The presence of a ‘threat’ or a ‘risk’
within a system
Attacks can be ”Host based” or
“Network Based”
How we typically detect intrusions?
Look for signatures of known attacks, malicious activ
How threats evade IDS
Signature adaptation, new personalities etc.
Why Machine Learning for IDS
Can detect point intrusions, contextual intrusions and
even collective intrusions. This dramatically broadens
scope of different kinds of threat identification
Approach
Use Anomaly Detection which works on the idea
that the machine learns ‘what is normal’ and if there
is a deviation from the ‘normal’ an ‘attack’ is presume
‘What is Normal’ can be both spatial and temporal an
so quite sophisticated attacks can be easily thwarted
AI & SECURITY
AI enables better Security
Security enables better AI
Enforces Integrity
Enforces Privacy
Prevents Misuse
AI security

More Related Content

What's hot

Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Cybereason
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
Raffael Marty
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
NUS-ISS
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real World
geetachauhan
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
ShauryaGupta38
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
Tahseen Shabab
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
scoopnewsgroup
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
DLabs
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
Asif Iqbal
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
Sri Ambati
 
Blackbox Testing in AI Cybersecurity
Blackbox Testing in AI CybersecurityBlackbox Testing in AI Cybersecurity
Blackbox Testing in AI Cybersecurity
ShauryaGupta38
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
Raffael Marty
 

What's hot (20)

Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real World
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Blackbox Testing in AI Cybersecurity
Blackbox Testing in AI CybersecurityBlackbox Testing in AI Cybersecurity
Blackbox Testing in AI Cybersecurity
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
 

Similar to AI and Security

Artificial intelligence ( AI ) | Guide
Artificial intelligence ( AI )  |  GuideArtificial intelligence ( AI )  |  Guide
Artificial intelligence ( AI ) | Guide
To Sum It Up
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual Overview
Modex
 
Demystifying AI
Demystifying AIDemystifying AI
Demystifying AI
Anurag Sahay
 
Simplifying ai: What to use when?
Simplifying ai: What to use when?Simplifying ai: What to use when?
Simplifying ai: What to use when?
Tannistho Ghosh
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
Ben Johnson
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
 
Những điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thị
Những điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thịNhững điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thị
Những điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thị
Ureka Media Vietnam CO., LTD
 
IS & DSS.pptx
IS & DSS.pptxIS & DSS.pptx
IS & DSS.pptx
AnshumanNayak37
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
MobibizIndia1
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
BT Techsoft Pvt. Ltd
 
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Abdullah al Mamun
 
Classification with R
Classification with RClassification with R
Classification with R
Najima Begum
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
Securelogy
 
Main Menu
Main MenuMain Menu
Main Menu
Securelogy
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Nick Galbreath
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
Pixel Crayons
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
PriyadharshiniG41
 

Similar to AI and Security (20)

Artificial intelligence ( AI ) | Guide
Artificial intelligence ( AI )  |  GuideArtificial intelligence ( AI )  |  Guide
Artificial intelligence ( AI ) | Guide
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual Overview
 
Demystifying AI
Demystifying AIDemystifying AI
Demystifying AI
 
Simplifying ai: What to use when?
Simplifying ai: What to use when?Simplifying ai: What to use when?
Simplifying ai: What to use when?
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Những điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thị
Những điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thịNhững điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thị
Những điều cơ bản về AI - Hướng dẫn hiểu và ứng dụng AI cho nhà tiếp thị
 
IS & DSS.pptx
IS & DSS.pptxIS & DSS.pptx
IS & DSS.pptx
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
 
Classification with R
Classification with RClassification with R
Classification with R
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
 

Recently uploaded

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Fernanda Palhano
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 

Recently uploaded (20)

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 

AI and Security

  • 1. AI & SECURITY Anurag Sahay Deep Learning, COE, Nagarro
  • 2. ALL THINGS START WITH PHILOSOPHY
  • 3. Philosophically Fundamental Questions Can a machine act intelligently? Can it solve any problem that a person would solve by thinking? 01 Are human intelligence and machine intelligence the same? Is the human brain essentially a computer? 02 Can a machine have a mind, mental states, and consciousness in the same way that a human being can? Can it feel how things are? 03
  • 6. AI is the next digital frontier In 2016 Companies invested In artificial Intelligence Tech Giants Startups AI Adopters - 20% in multiple technology areas AI Partial Adopters - 40% skeptical about Business Cases and ROI Laggards - 40% contemplators
  • 7. Areas where AI creates significant Value Smarter R&D and Forecasting 1 Optimized Production and Maintenance 2 Targeted Sales and Marketing 3 Enhanced User Experience 4
  • 8. AI – THE BIG PICTURE
  • 9. DEEP LEARNING AI – THE SCIENCE MACHINE LEARNING STATISTICAL SCIENCES Maths Maths Algorithms Maths Algorithms Neural Net
  • 10. AI – THE ENGINEERING MODEL WORKFLOW INTEGRATION MODEL BUILDING DATA PROCESSING Data Outcome Process
  • 11. AI - USE CASE PRESCRIPTIVE W INTELLIGENCE PREIDICTIVE INTELLIGENCE DESCRIPTIVE INTELLIGENCE Structure Prediction Action
  • 12. AI – ORGANIZATIONAL MATURITY AI BASED ACTION ACTIONS INSIGHTS ORIENTED DATA BELIEF Infrastructure Competency Product
  • 13. AI – VARIOUS APPROACHES FULLY CLOUD BASED Cloud Data APIs, Model APIs, Workflow APIs SEMI CLOUD BASED Cloud Data APIs Custom Model Custom Workflow NON CLOUD Custom Data APIs Custom Model Custom Workflow
  • 15. THE LEARNING SPECTRUM Human Beings learn from experience We abstract our learning into a rule based model which we then encode algorithmically to program a machine What if we could build a system that could learn from DATA Learning from experience Instructions A system that learns from DATA
  • 16. LINEAR REGRESSION A simple way to learn from Data Finding the right line is the important problem We solve it using the Gradient Descent $100K $500K
  • 17. POLYNOMIAL REGRESSION Linear Regression is more powerful than it obviously seems. We can fit a lot of different types of curves..
  • 18. BAYES Another interesting approach to predicting the unknown is through the use of Bayes Algorithm cheap If an email contains the word ‘cheap’ what is the Probability that it is SPAM ? 3/4 SPAM HAM Spelling mistake Missing title
  • 19. DECISION TREE Decision Trees are a very simple and intuitive way to solve a lot of different types of problems
  • 20. LOGISTIC REGRESSION Use ‘misclassification errors’ instead of ‘distance’ to make a line that separates two sets of data points
  • 21. NEURAL NETWORK Multiple ’decision lines’ that can help separate the data
  • 22. SUPPORT VECTOR MACHINE Instead of ‘gradient Descent’ use ‘Linear Optimization’ to find the line that best separates the two data sets
  • 24. CLUSTERING Find ‘ Cluster Structure’ in the Data
  • 25. OUTLIER DETECTION Find ‘ outliers’ in the Data
  • 27. MALICIOUS URLS Given a website ‘W’ and a list of malicious/benign websites , identify whether ‘W’ is malicious or not Training Data = URLs of benign/malicious sites Use Whitelisted/Blacklisted Websites URLs from well known sources http://www.bfuduuioo1fp.mobi/ws/ebayisapi.dll WHOIS registration 3/25/2008 Hosted from 208.76.89.91/22 IP hosted in Jaipur Connection Speed T1 Has DNS PTR Record ? Yes Registrant ”Anurag” [ 0.56, 9.45, ……. 0 0 1 1 1 …. 1 0 .. 1 0 ]Feature Building Real Valued Host Based NLP Based + Feature Extraction from Website Website DOM Structure Advertising Categories In/Out Links Type Images on the Website Now apply, one of the algorithms that we talked abo and given a new website ‘W’ one can identify whethe its malicious or not..
  • 28. MALWARE DETECTION Given a program code, identify whether it is a malware/benign with some form (virus, trojan, etc. ) How AV used to detect malware Pattern matching on Static Files Use techniques like emulation to decrypt code How malwares evade AV Polymorphic Malware metamorphoses to evade signature identification Why Machine Learning for Malware Detection Too many malware/bots/trojan types The malware code is very contextual Mobiles, Networks, Devices.. Very processing heavy AI oriented malware as well Approach Use multiple types of features to identify Static and Behavioral Exploit Context (Process, Runtime..) Use layers of ML classifiers to increase confidence Combine Supervised and Un-Supervised Learning
  • 29. INTRUSION DETECTION The presence of a ‘threat’ or a ‘risk’ within a system Attacks can be ”Host based” or “Network Based” How we typically detect intrusions? Look for signatures of known attacks, malicious activ How threats evade IDS Signature adaptation, new personalities etc. Why Machine Learning for IDS Can detect point intrusions, contextual intrusions and even collective intrusions. This dramatically broadens scope of different kinds of threat identification Approach Use Anomaly Detection which works on the idea that the machine learns ‘what is normal’ and if there is a deviation from the ‘normal’ an ‘attack’ is presume ‘What is Normal’ can be both spatial and temporal an so quite sophisticated attacks can be easily thwarted
  • 30. AI & SECURITY AI enables better Security Security enables better AI Enforces Integrity Enforces Privacy Prevents Misuse AI security

Editor's Notes

  1. http://www.rosebt.com/blog/predictive-descriptive-prescriptive-analytics