SlideShare a Scribd company logo
1 of 36
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
N-U Sigma U2 Analytics Lab web: www.businessanlyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093
Dr. Umesh R Hodeghatta
Application of Machine Learning in Cyber Security
October 9th, 2019
Artificial Intelligence (AI)
Machine Learning
Deep Learning
C
I
A
Confidentiality
Integrity
Availability
Outline
2
 Information Security
 Applying Machine Learning Techniques
 Cybersecurity Applications
 Machine Learning
 Case Study - Predicting Phishing Attack
 Summary
 Q & A
Denial of Service
Loss of IntegrityBankCustomer
Deposit $1000 Deposit $ 100
Security Threats
Loss of Privacy
m-y-p-a-s-s-w-o-r-d d-a-n
telnet company.org
username: dan
password:
Impersonation
I’m Bob.
Send Me All Corporate
Correspondence
with Cisco.
Bob
CPU
3
C
I
A
Confidentiality
Integrity
Availability
Information Security/Cyber Security
Implementing Information Security
Risk
Assessment
Planning &
Architecture
Gap Analysis
Integration &
Deployment
Operations
Legal
Compliance
And
Audit
Crisis
Management
Continuous
Monitoring
Implementing Information Security
Risk
Assessment
Planning &
Architecture
Gap Analysis
Integration &
Deployment
Operations
Legal
Compliance
And
Audit
Crisis
Management
Continuous
Monitoring
&
Learning
DATA
Detection
Correction
Prevention
• Servers
• Database
• Network Devices
- Firewall/IDS/IPS/
- Routers/switches
• Endpoint devices
Machine Learning
7
Detection/Monitoring Prevention Correction
Descriptive Analytics Predictive Analytics Prescriptive Analytics
Information Security
Analytics/
Machine Learning
• Detect Incidents
• Monitor Traffic
• Monitor Events
• Prevent Attacks
• Prevent Incidents
• Isolate Systems
Predict Attacks
Predict Risks
Predict
Vulnerabilities
Applying Machine Learning Techniques
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
8
 Network Level (Router, Switches, Firewall, IDS/IPS, Cloud)
 Endpoint (server, mobile, desktops, IoT)
 User Level (Authentication, Social behavior, domain)
 Application Level (Web, Applications, Database, ERP)
 Process Level (Industry process and standards)
Machine Learning
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
10
Method
 Supervised Machine
Learning
 Unsupervised Machine
Learning
 Reinforcement Learning
Tasks
 Regression
 Classification
 Clustering
 Association Rule
Other ML
Terms/Tasks
• Dimensionality
Reduction
• Discriminant Analysis
• Regularization, LASSO
• Boosting
• Generative Models
• Deep Learning
Descriptive Analytics
Descriptive Analytics
 Information and Awareness
 Recording Security Breach – how, why and when
 Monitoring
 Provide statistics
 Type of attacks
 Type of breaches
 Regions
12
Descriptive Anaytics - Examples
13
Total ransomware
Total Malware
Reference: Symantec 2019 Report
Ref: www.Symantec.com reports
Quiz 1
Is Data Visualization Machine Learning?
 A. TRUE
 B. FALSE
Predicting Future
Email Classification
 Categories as malware, spyware and ransomware
16
Machine
Learning Model
SPAM
Not SPAM
Predicting Fraud
 Determine a probability of fraudulent actions.
 Patterns of suspicious transactions,
 Suspicious Users
 Suspicious locations/hackers
 Predict/Classify different types of network attacks
 Spoofing, Phishing, TCP policy violations, etc
17
Network Behaviour
 Predicting network traffic behaviour
 Source (remote) IP address
 Open TCP port
 Packet content
 Packet size
 Or any of the hundreds of different attributes that network traffic can have
 Predict the next packet parameters
18
End point security
 Predict known types of attacks
 SQLi, XSS, etc.
 DDOS attacks
 Find Pattern of user activity
 On Social Media
 Servers/Database/Web access
 Authentications
 Detect anomalies in HTTP requests (auth failures or bypass proxies
or firewalls)
19
Machine Learning Models
 Classification types of attacks
 Exploits, Reconnaissance, DOS, Policy Violations
 Predict user behavior
 SIEM logs
20
Unsupervised Machine Learning (Clustering)
 Clustering of threat patterns on a network
 Clustering security risks/Security Incidents
 Clustering of user activity
 Cluster User groups
 Clustering Web traffic data
 Clustering Vulnerabilities/Segments
21
Quiz 2
Classifying email as SPAM or NOT-SPAM is an example of:
1. Supervised Machine Learning
2. Unsupervised Machine Learning
3. My company machine learning
4. Association of Machine Learning
PREDICTING PHISHING ATTACK S
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
Case Study
23
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
24
Dataset Reference: Canadian Institute for Cybersecurity; https://www.unb.ca/cic/datasets/url-2016.html
Exploring DATA
Data
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
25
 80 different parameters
collected:
 1000 Data records
 Response Variable/Predictor:
BENIGN or PHISHING
Dataset Reference: Canadian Institute for Cybersecurity; https://www.unb.ca/cic/datasets/url-2016.html
Data Science /Machine Learning Framework
Requirements
DATA
Science
Deploy
Classifying PHISHING/BENIGN
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
27
 Applied Neural Network
Results
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
28
Dataset Reference: Canadian Institute for Cybersecurity; https://www.unb.ca/cic/datasets/url-2016.html
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
29
CORRECT I ON
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
Prescriptive Analytics
30
Prescriptive Analytics
 Automatically assign risk values for new vulnerabilities or
misconfigurations
 Automatically close inbox upond detection of ransomware attack
 Identification of specific threats and creating controls to counter
them
 Security patches
31
Summary
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
32
 Protecting data is critical to organization success
 Cyber security crime is increasing day by day
 Hackers are becoming smart
 AI and Machine Learning are new technologies to prevent frauds
by predicting future cyber attacks
NU-Sigma U2 Analytics Labs
 AI and Machine Learning Solutions
 Enable organizations with AI and Machine Learning Technology
 We have implemented projects for retail industry, Telecom, Healthcare and HR
organizations
 Conduct workshops: http://www.businessanalyticsr.com
 BrightTalk channel:
 https://www.brighttalk.com/channel/16781/umesh-hodeghatta
Reference
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093
 Business Analytics Using R; Dr. Umesh Hodeghatta and Umesha
Nayak, Springer Apress, USA, 2016
 Infosec Handbook: Introduction to Information Security; Dr.
Umesh Rao Hodeghatta and Umesha Nayak, Springer Apress, 2014
 Almseidin, M., Alzubi, M., Kovacs, S., & Alkasassbeh, M. (2017,
September). Evaluation of machine learning algorithms for
intrusion detection system. In 2017 IEEE 15th International
Symposium on Intelligent Systems and Informatics (SISY) (pp.
000277-000282). IEEE.
 Zamani, M., & Movahedi, M. (2013). Machine learning techniques
for intrusion detection. arXiv preprint arXiv:1312.2177.
34
References
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
35
 Juvonen, A., & Sipola, T. (2014). Anomaly Detection Framework Using Rule Extraction for
Efficient Intrusion Detection. arXiv preprint arXiv:1410.7709.
 Sun, L., Versteeg, S., Boztas, S., & Rao, A. (2016). Detecting anomalous user behavior using an
extended isolation forest algorithm: an enterprise case study. arXiv preprint
arXiv:1609.06676.
 Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari,
Natalia Stakhanova and Ali A. Ghorbani, "Detecting Malicious URLs Using Lexical Analysis",
Network and System Security, Springer International Publishing, P467--482, 2016.
 Shah, S. A. R., & Issac, B. (2018). Performance comparison of intrusion detection systems and
application of machine learning to Snort system. Future Generation Computer Systems, 80,
157-170.
 Radford, B. J., Richardson, B. D., & Davis, S. E. (2018). Sequence aggregation rules for anomaly
detection in computer network traffic. arXiv preprint arXiv:1805.03735.
Reference (contd..)
N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com
email: umesh@businessanalyticsr.com Ph: +1 408757 0093
36
 Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017, March). Deep
learning for unsupervised insider threat detection in structured cybersecurity data streams.
In Workshops at the Thirty-First AAAI Conference on Artificial Intelligence.
 Thi, N. N., & Le-Khac, N. A. (2017). One-class collective anomaly detection based on lstm-
rnns. In Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVI (pp.
73-85). Springer, Berlin, Heidelberg.
 Radford, B. J., Apolonio, L. M., Trias, A. J., & Simpson, J. A. (2018). Network traffic
anomaly detection using recurrent neural networks. arXiv preprint arXiv:1803.10769.
 Le, Q., Boydell, O., Mac Namee, B., & Scanlon, M. (2018). Deep learning at the shallow end:
Malware classification for non-domain experts. Digital Investigation, 26, S118-S126.
 Glander, S. (2017). Autoencoders and anomaly detection with machine learning in fraud
analytics. shiring. github. io/machine_learning/2017/05/01/fraud.
 Lotfollahi, M., Siavoshani, M. J., Zade, R. S. H., & Saberian, M. (2017). Deep packet: A novel
approach for encrypted traffic classification using deep learning. Soft Computing, 1-14.
THANK YOU
WEB: WWW.BUSINESSANALYTICSR.COM
UMESH@BUSINESSANALYTICSR.COM
PH: +1 408 757 0093

More Related Content

What's hot

AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAndrea Dal Pozzolo
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecuritySmartlearningUK
 
Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Andrea Dal Pozzolo
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine LearningScaleway
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningEng Teong Cheah
 
Machine Learning Using Python
Machine Learning Using PythonMachine Learning Using Python
Machine Learning Using PythonSavitaHanchinal
 
Machine learning presentation
Machine learning presentationMachine learning presentation
Machine learning presentationSaurav Prasad
 
Introduction To Machine Learning
Introduction To Machine LearningIntroduction To Machine Learning
Introduction To Machine LearningKnoldus Inc.
 

What's hot (20)

AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Machine Learning Using Python
Machine Learning Using PythonMachine Learning Using Python
Machine Learning Using Python
 
Machine learning presentation
Machine learning presentationMachine learning presentation
Machine learning presentation
 
Introduction To Machine Learning
Introduction To Machine LearningIntroduction To Machine Learning
Introduction To Machine Learning
 

Similar to Application of Machine Learning in Cyber Security

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUlf Mattsson
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsLinkurious
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedSounil Yu
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackAujas
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using MLIRJET Journal
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRhys A. Mossom
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Ce hv8 module 04 enumeration
Ce hv8 module 04 enumerationCe hv8 module 04 enumeration
Ce hv8 module 04 enumerationMehrdad Jingoism
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation PortalIRJET Journal
 

Similar to Application of Machine Learning in Cyber Security (20)

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using ML
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
C018131821
C018131821C018131821
C018131821
 
Ce hv8 module 04 enumeration
Ce hv8 module 04 enumerationCe hv8 module 04 enumeration
Ce hv8 module 04 enumeration
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation Portal
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Application of Machine Learning in Cyber Security

  • 1. N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 N-U Sigma U2 Analytics Lab web: www.businessanlyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 Dr. Umesh R Hodeghatta Application of Machine Learning in Cyber Security October 9th, 2019 Artificial Intelligence (AI) Machine Learning Deep Learning C I A Confidentiality Integrity Availability
  • 2. Outline 2  Information Security  Applying Machine Learning Techniques  Cybersecurity Applications  Machine Learning  Case Study - Predicting Phishing Attack  Summary  Q & A
  • 3. Denial of Service Loss of IntegrityBankCustomer Deposit $1000 Deposit $ 100 Security Threats Loss of Privacy m-y-p-a-s-s-w-o-r-d d-a-n telnet company.org username: dan password: Impersonation I’m Bob. Send Me All Corporate Correspondence with Cisco. Bob CPU 3
  • 5. Implementing Information Security Risk Assessment Planning & Architecture Gap Analysis Integration & Deployment Operations Legal Compliance And Audit Crisis Management Continuous Monitoring
  • 6. Implementing Information Security Risk Assessment Planning & Architecture Gap Analysis Integration & Deployment Operations Legal Compliance And Audit Crisis Management Continuous Monitoring & Learning DATA Detection Correction Prevention • Servers • Database • Network Devices - Firewall/IDS/IPS/ - Routers/switches • Endpoint devices
  • 7. Machine Learning 7 Detection/Monitoring Prevention Correction Descriptive Analytics Predictive Analytics Prescriptive Analytics Information Security Analytics/ Machine Learning • Detect Incidents • Monitor Traffic • Monitor Events • Prevent Attacks • Prevent Incidents • Isolate Systems Predict Attacks Predict Risks Predict Vulnerabilities
  • 8. Applying Machine Learning Techniques N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 8  Network Level (Router, Switches, Firewall, IDS/IPS, Cloud)  Endpoint (server, mobile, desktops, IoT)  User Level (Authentication, Social behavior, domain)  Application Level (Web, Applications, Database, ERP)  Process Level (Industry process and standards)
  • 9. Machine Learning N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 10 Method  Supervised Machine Learning  Unsupervised Machine Learning  Reinforcement Learning Tasks  Regression  Classification  Clustering  Association Rule Other ML Terms/Tasks • Dimensionality Reduction • Discriminant Analysis • Regularization, LASSO • Boosting • Generative Models • Deep Learning
  • 11. Descriptive Analytics  Information and Awareness  Recording Security Breach – how, why and when  Monitoring  Provide statistics  Type of attacks  Type of breaches  Regions 12
  • 12. Descriptive Anaytics - Examples 13 Total ransomware Total Malware Reference: Symantec 2019 Report Ref: www.Symantec.com reports
  • 13. Quiz 1 Is Data Visualization Machine Learning?  A. TRUE  B. FALSE
  • 15. Email Classification  Categories as malware, spyware and ransomware 16 Machine Learning Model SPAM Not SPAM
  • 16. Predicting Fraud  Determine a probability of fraudulent actions.  Patterns of suspicious transactions,  Suspicious Users  Suspicious locations/hackers  Predict/Classify different types of network attacks  Spoofing, Phishing, TCP policy violations, etc 17
  • 17. Network Behaviour  Predicting network traffic behaviour  Source (remote) IP address  Open TCP port  Packet content  Packet size  Or any of the hundreds of different attributes that network traffic can have  Predict the next packet parameters 18
  • 18. End point security  Predict known types of attacks  SQLi, XSS, etc.  DDOS attacks  Find Pattern of user activity  On Social Media  Servers/Database/Web access  Authentications  Detect anomalies in HTTP requests (auth failures or bypass proxies or firewalls) 19
  • 19. Machine Learning Models  Classification types of attacks  Exploits, Reconnaissance, DOS, Policy Violations  Predict user behavior  SIEM logs 20
  • 20. Unsupervised Machine Learning (Clustering)  Clustering of threat patterns on a network  Clustering security risks/Security Incidents  Clustering of user activity  Cluster User groups  Clustering Web traffic data  Clustering Vulnerabilities/Segments 21
  • 21. Quiz 2 Classifying email as SPAM or NOT-SPAM is an example of: 1. Supervised Machine Learning 2. Unsupervised Machine Learning 3. My company machine learning 4. Association of Machine Learning
  • 22. PREDICTING PHISHING ATTACK S N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 Case Study 23
  • 23. N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 24 Dataset Reference: Canadian Institute for Cybersecurity; https://www.unb.ca/cic/datasets/url-2016.html Exploring DATA
  • 24. Data N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 25  80 different parameters collected:  1000 Data records  Response Variable/Predictor: BENIGN or PHISHING Dataset Reference: Canadian Institute for Cybersecurity; https://www.unb.ca/cic/datasets/url-2016.html
  • 25. Data Science /Machine Learning Framework Requirements DATA Science Deploy
  • 26. Classifying PHISHING/BENIGN N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 27  Applied Neural Network
  • 27. Results N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 28 Dataset Reference: Canadian Institute for Cybersecurity; https://www.unb.ca/cic/datasets/url-2016.html
  • 28. N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 29
  • 29. CORRECT I ON N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 Prescriptive Analytics 30
  • 30. Prescriptive Analytics  Automatically assign risk values for new vulnerabilities or misconfigurations  Automatically close inbox upond detection of ransomware attack  Identification of specific threats and creating controls to counter them  Security patches 31
  • 31. Summary N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 32  Protecting data is critical to organization success  Cyber security crime is increasing day by day  Hackers are becoming smart  AI and Machine Learning are new technologies to prevent frauds by predicting future cyber attacks
  • 32. NU-Sigma U2 Analytics Labs  AI and Machine Learning Solutions  Enable organizations with AI and Machine Learning Technology  We have implemented projects for retail industry, Telecom, Healthcare and HR organizations  Conduct workshops: http://www.businessanalyticsr.com  BrightTalk channel:  https://www.brighttalk.com/channel/16781/umesh-hodeghatta
  • 33. Reference N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093  Business Analytics Using R; Dr. Umesh Hodeghatta and Umesha Nayak, Springer Apress, USA, 2016  Infosec Handbook: Introduction to Information Security; Dr. Umesh Rao Hodeghatta and Umesha Nayak, Springer Apress, 2014  Almseidin, M., Alzubi, M., Kovacs, S., & Alkasassbeh, M. (2017, September). Evaluation of machine learning algorithms for intrusion detection system. In 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY) (pp. 000277-000282). IEEE.  Zamani, M., & Movahedi, M. (2013). Machine learning techniques for intrusion detection. arXiv preprint arXiv:1312.2177. 34
  • 34. References N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 35  Juvonen, A., & Sipola, T. (2014). Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection. arXiv preprint arXiv:1410.7709.  Sun, L., Versteeg, S., Boztas, S., & Rao, A. (2016). Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study. arXiv preprint arXiv:1609.06676.  Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova and Ali A. Ghorbani, "Detecting Malicious URLs Using Lexical Analysis", Network and System Security, Springer International Publishing, P467--482, 2016.  Shah, S. A. R., & Issac, B. (2018). Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Generation Computer Systems, 80, 157-170.  Radford, B. J., Richardson, B. D., & Davis, S. E. (2018). Sequence aggregation rules for anomaly detection in computer network traffic. arXiv preprint arXiv:1805.03735.
  • 35. Reference (contd..) N-U Sigma U2 Analytics Lab web: www.businessanalyticsr.com email: umesh@businessanalyticsr.com Ph: +1 408757 0093 36  Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017, March). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In Workshops at the Thirty-First AAAI Conference on Artificial Intelligence.  Thi, N. N., & Le-Khac, N. A. (2017). One-class collective anomaly detection based on lstm- rnns. In Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVI (pp. 73-85). Springer, Berlin, Heidelberg.  Radford, B. J., Apolonio, L. M., Trias, A. J., & Simpson, J. A. (2018). Network traffic anomaly detection using recurrent neural networks. arXiv preprint arXiv:1803.10769.  Le, Q., Boydell, O., Mac Namee, B., & Scanlon, M. (2018). Deep learning at the shallow end: Malware classification for non-domain experts. Digital Investigation, 26, S118-S126.  Glander, S. (2017). Autoencoders and anomaly detection with machine learning in fraud analytics. shiring. github. io/machine_learning/2017/05/01/fraud.  Lotfollahi, M., Siavoshani, M. J., Zade, R. S. H., & Saberian, M. (2017). Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing, 1-14.