Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
How do Blockchain and IOT work together? The focus of this presentation is to provide an introduction to Blockchain, review why IOT is critical to blockchain success and identify the leading projects you should be using
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
The year 2018 is the year of blockchain applications with several ongoing use-cases coming to realization and the vendor landscape also gained more depth and a better structure after years of press and vendor hype, fueled equally by commercial self-interest and a genuine desire for innovation.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
How do Blockchain and IOT work together? The focus of this presentation is to provide an introduction to Blockchain, review why IOT is critical to blockchain success and identify the leading projects you should be using
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
The year 2018 is the year of blockchain applications with several ongoing use-cases coming to realization and the vendor landscape also gained more depth and a better structure after years of press and vendor hype, fueled equally by commercial self-interest and a genuine desire for innovation.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
The slides from thecontinuing part of Pistoia Alliance's drive to improve education and communication around new technologies to life science professionals, this webinar explored how blockchain/DLT and IoT could come together to add even more trust to the GxP domain. If you want to know more about how these new technologies could help enhance GxP compliance, then this webinar will give you much food for thought.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
When it comes to the Internet of Things, a blockchain can be provide a platform to handle device authentication process and thereby prevent a spoofing attack by malicious parties who may impersonate some other device to launch an attack to steal data or cause some other mayhem.Blockchain will allowdirect communication between two or more devices so that they are able to transact without going through a third-party intermediary, and in effect make spoofing more cost prohibitive. This White Paper explains how blockchain can improve the security of IOT devices.
What do you get if you combine two over-hyped subjects, blockchain and IOT? At the Trusted IOT Alliance founders meeting, the answer was a surprisingly level headed conversation, and demonstrations of how IOT projects are currently being secured by blockchain.
Presentation outline:
- What is blockchain & distributed ledger technology? Why is it useful? (no hype overview)
- The work of the Trusted IOT Alliance (www.trusted-iot.org)?
- Stories about how blockchain is being used
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Network traffic analysis with cyber securityKAMALI PRIYA P
We are students from SRM University pursuing B.TECH in Computer Science Department. We took a small initiative to make a PPT about how network traffic can be analyzed through Cyber Security. We have also mentioned the known network analyzers and future scope for network traffic analysis with cyber security.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
The slides from thecontinuing part of Pistoia Alliance's drive to improve education and communication around new technologies to life science professionals, this webinar explored how blockchain/DLT and IoT could come together to add even more trust to the GxP domain. If you want to know more about how these new technologies could help enhance GxP compliance, then this webinar will give you much food for thought.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
When it comes to the Internet of Things, a blockchain can be provide a platform to handle device authentication process and thereby prevent a spoofing attack by malicious parties who may impersonate some other device to launch an attack to steal data or cause some other mayhem.Blockchain will allowdirect communication between two or more devices so that they are able to transact without going through a third-party intermediary, and in effect make spoofing more cost prohibitive. This White Paper explains how blockchain can improve the security of IOT devices.
What do you get if you combine two over-hyped subjects, blockchain and IOT? At the Trusted IOT Alliance founders meeting, the answer was a surprisingly level headed conversation, and demonstrations of how IOT projects are currently being secured by blockchain.
Presentation outline:
- What is blockchain & distributed ledger technology? Why is it useful? (no hype overview)
- The work of the Trusted IOT Alliance (www.trusted-iot.org)?
- Stories about how blockchain is being used
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Network traffic analysis with cyber securityKAMALI PRIYA P
We are students from SRM University pursuing B.TECH in Computer Science Department. We took a small initiative to make a PPT about how network traffic can be analyzed through Cyber Security. We have also mentioned the known network analyzers and future scope for network traffic analysis with cyber security.
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
Dell Performance Monitoring Network Management solutions can provide your IT department with the affordable, in-depth visibility and actionable monitoring needed to manage network infrastructure complexity.
Join our webcast to learn how:
• Dynamic discovery of equipment provides the ability to map current location, configuration and interdependencies.
• Real-time visibility across network infrastructures can help ensure availability and performance.
• Actionable information about network health, faults, bandwidth hogs and performance issues reduces the mean-time-to-resolution.
• Proactive analysis can pinpoint the root cause of intermittent, hard to find problems.
Visualizing and optimizing your network is easier than you think
Enterprises have been trying to automate their networks for decades, but manual tasks continue to dominate operations. According to Enterprise Management Associates (EMA) research, only 34% of IT organizations have been able to automate more than half of their network provisioning and change management tasks. With so many commercial and open source network automation tools available, why aren’t organizations doing better?
These slides—based on the webinar featuring Shamus McGillicuddy (EMA Vice President of Research) and Jason Edelman (Founder and CTO of network automation solution provider Network to Code) —provide guidance on how to set a network automation strategy. You will also get insights on:
- Whether a network team should use open source, homegrown, or commercial network automation solutions
- How to establish a data-driven source of truth for your network
- How to build the right team for enabling your network automation strategy
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks,
Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network.
Cisco introduced its fog computing vision in January 2014 as a way of bringing cloud computing capabilities to the edge of the network .
As the result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data.
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
The difference between successfully defending an attack or failing to compromise is your ability to understand what’s happening in your network better than your adversary. Choosing the right network security monitoring (NSM) toolset is crucial to effectively monitor, detect, and respond to any potential threats in an organisation’s network.
In this webinar, we’ll uncover the best practices, trends, and challenges in network security monitoring (NSM) and how Elastic is being used as a core component to network security monitoring.
Highlights:
- What is network security monitoring (NSM)?
- Types of network data
- Common toolset
- Overcoming challenges with network security monitoring
- Using Machine Learning for network security monitoring
- Demo
Prensentation on packet sniffer and injection toolIssar Kapadia
The presentation is about scanning tools: packet sniffer and injection tools. how is this scanning tools are use which is describe in this presentation.
Visualizing Your Network Health - Know your NetworkDellNMS
An old adage states that you cannot manage what you don’t know. Do you know what devices are on your network, where they are located, how they are configured, what they are connected to, and how they are affected by changes and failures?
Today’s network infrastructure is becoming more and more complex, while demands on the Network Administrator to ensure network availability and performance are higher than ever. Business critical systems depend upon you managing your entire network infrastructure and delivering high-quality service 24/7, 365 days a year. So how do you keep the pace?
Learn how real-time visibility into your entire network infrastructure provides the power to manage your assets with greater control.
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
A presentation given in April 2019 in London during ICS Cyber Security Conference. I discuss an anonymized investigation conducted by our team to identify a real malware infection on a production network, the tools and techniques used to contain this threat and how to use threat intelligence and visibility to stay ahead of cyber adversaries.
Asset visibility and network baselining
Continuous network monitoring
Threat intelligence ingestion
Thorough incident response plans
Similar to Applicability of Machine learning in computer networks (20)
A talk presented at IEEE ComSoc workshop on Evolution of Data-centers in the context of 5G.
Discuss about what is edge computing and management issues in Edge Computing
Computational Intelligence and ApplicationsChetan Kumar S
Slides used at IEEE Computational Intelligence Society, Bangalore Chapter:
Winter School On Emerging Topics in Computational Intelligence -Theory and Applications
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. INDUSTRY EXPERTS SPEAK
• You might be surprised but what is going to drive
innovation in the enterprise and public cloud is machine
learning
--- Bill Coughran, Sequoia Capital
• Machine Learning is the way we are going to automate
your automation
--- Chris Wright, RedHat CTO
3. WHAT IS MACHINE LEARNING
• The complexity in traditional computer programming is in the
code (programs that people write). In machine learning, learning
algorithms are in principle simple and the complexity (structure) is
in the data. Is there a way that we can automatically learn that
structure? That is what is at the heart of machine learning.
-- Andrew Ng
4. WHAT IS MACHINE LEARNING
Traditional
Programming
Machine
Learning
Data
Program
Output
Data
Output/Events/Nill
Program
5. MACHINE LEARNING TASKS
• Supervised learning is regarded as a machine learning task of inferring a function
from labelled training data.
• Unsupervised learning: This is regarded as the machine learning task of inferring a
function to describe hidden structures from unlabelled data.
• Reinforcement learning is an area of machine learning that is linked to how software
agents take actions in the environment so as to maximise some notion of
cumulative reward.
9. KNOWLEDGE PLANE FOR
NETWORKS
• Defined by Clark D and others, in 2003
• Subsequently re-defined by Albert Mestres et. al.,
Clark, D., et al. ”A knowledge plane for the internet,” Proceedings of the 2003
conference on Applications, technologies, architectures, and protocols for computer
communications. ACM, 2003
Albert Mestres., et al. “Knowledge-Defined Networking”, CoRR, 2016.
10. COMPONENTS OF KDN
• The PROBLEM: Networks are distributed and each node has partial view of network
• What made this happen ? From 2003 to 20017 ?
• Streaming telemetry from network devices, NetFlow, IPFIX among others
• Network data analytics platforms
• Centralized controller architecture for network, defined via SDN or it variants
14. BUILDING OPTIMIZED NETWORK
• Big enterprise typically setup a overlay networks, using some encapsulation
technique
• Underlay networks are owned by service providers
• Now if there are multiple links connecting to underlay network, how to make best
choice ?
16. HOW TO OPTIMIZE
• How can we detect which link the overlay network can take
• Can system learn the underlay network delay/reliability characteristics ?
• If one can predict the network parameters for underlay (which is not owned by
overlay), right policies can be applied
• Can perform many actions like, which link best for video services, database services
etc.
18. CONFIG AUDITS
• A system that can learn the network configuration
• Apply best practice to the configs
• Can audit configs
• For example, if the system can learn what is encrypted traffic, can do security audit
• Can recognize configs that caused misbehavior in network
19. CONFIG ERRORS
Users in green VLAN, cash registers in blue VLAN
Wrong config, cash register in wrong VLAN
20. CONFIG ERRORS
• More common in IOT and converged networks, due to shear numbers
• Can learn the traffic and identify the device
• Can alert wrong config
• Can correct the wrong config
• Helps in troubleshooting
22. NETWORK ANOMALY DETECTION
• A network anomaly is a sudden and short-lived deviation from the normal operation
of the network
• Anomaly caused due to an attack on network, malware flowing in network or pure
accident such as failure
• An intruder attacks the network
• Malware replicating in the network
• Interface down and traffic surges on backup link
• Bug that causes device to crash!
• Quick detection is needed to initiate a timely response,
23.
24. CISCO ETA
• ETA (Encrypted Traffic Analytics)
• Detect malware based on traffic pattern, rather than traffic content
• “Signature based” malware detection fails if malware is encrypted
• Need to identify the traffic pattern for a malware, now just look out for such a traffic
in your network
26. CISCO SLN
• SLN is fundamentally a hyper-distributed analytics platform ...
• Putting together analytics and networking ...
• Goldmine of untouched data on networking gear (sensing)
• Network learns and computes models on premise (analytics)
• The Network adapts, modifies its behavior (control)
• SLN for Security: attacks are incredibly sophisticated and targeted, exfiltration of
data being a major concern, requiring a next-generation approach => Stealthwatch
Learning Networks
29. OPEN SOURCE FRAMEWORK
• open source frame work from google https://www.tensorflow.org
• From facebook http://torch.ch
• Open source libraries
• http://scikit-learn.org/stable
• http://spark.apache.org/mllib/
• More on http://opensourceforu.com/2017/01/best-open-source-machine-learning-
frameworks/