Técnicas de Inteligencia Artificial
Aplicadas en Ciberseguridad
Juan Carlos Olivares Rojas
November 2020
SCO
Introduction
CybersecurityAI + = AI Safety & Security
Outline
Motivation
Cybersecurity
AI
AI + Cybersecurity Examples
Motivation
Everything
becomes
software-based
Everything
generates
data
Everything
needs to be
secured
Everything
can be
automated
Everything
becomes
connected
Networking Programmability Security
Source: Cisco
Motivation
Source: Domo
Motivation
Source: Cisco
Cybercrime damage
estimated to hit $6
TRILLION BY 2021.
95% of cybersecurity
breaches are due to human
error.
25 billion connected things
will be in use by 2021.
Motivation
Source: Invertia
Hackers stole half a billion
personal records in 2018.
4.07 million cybersecurity
jobs are unfilled.
Network Security Professionals
Source: Cisco
Motivation
Source: Cisco
Outline
Motivation
Cybersecurity
AI
AI + Cybersecurity Examples
Cybersecurity
Zero Trust
Source: Among Us
Threats
Threats
Initial Code Red Worm Infection
Code Red Worm Infection 19 Hours
Later
Cyber Threats
Source: Cisco
Data Privacy
Cybersecurity in Healthcare
Source: Cisco
Cybersecurity Tools
Cybersecurity Tools
Contai
nment
Inoculation Quarantine
Treatment
Cybersecurity Tools
Cybersecurity Tools
Cybersecurity Tools
Cybersecurity Tools
Source: Cisco
Cybersecurity Tools
Source: Cisco
Cybersecurity Tools
Source: Cisco
Outline
Motivation
Cybersecurity
AI
AI + Cybersecurity Examples
AI Booming
1. Computing power
What makes AI credible this time around . . .
2. ML, deep learning
algorithms
3. Big data
4. Age of the customer/
digital demand
5. Huge investments
Source: “Artificial Intelligence Can Finally Unleash Your Business Applications' Creativity” Forrester report
AI is in Charge
Stock Market: 75+% of all trade orders
generated by Automated Trading Systems
Aviation: Uninterruptible Autopilot System
Military: Nuclear
Weapons
Energy: Nuclear
Power Plants
Utilities: Water
Plants/Electrical Grid
Communications: Satellites
AI Applications
Health
Personalized medicine, image analytics
Manufacturing
Predictive and prescriptive maintenance
Consumer tech
Chatbots
Financial services
Fraud detection, ID verification
Government
Cyber-security, smart cities and utilities
Energy
Seismic and reservoir modeling
Service providers
Media delivery
Retail
Video surveillance, shopping patterns
AI Financial Applications
Fraud Detection
• Real-Time
Transactions
• Credit Card
• Merchant
• Collusion
• Impersonation
• Social Engineering
Fraud
Risk Modeling &
Credit Worthiness
Check
• Loan Defaults
• Delayed Payments
• Liquidity
• Market & Currencies
• Purchases and
Payments
• Time Series
CLV
Prediction and
Recommendation
• Historical Purchase
View
• Pattern Recognition
• Retention Strategy
• Upsell
• Cross-Sell
• Nurturing
Customer
Segmentation
• Behavioral Analysis
• Understanding
Customer Quadrant
• Effective Messaging &
Improved Engagement
• Targeted Customer
Support
• Enhanced Retention
Other
• Image Recognition
• NLP
• Security
• Video Analysis
AI Development
AI
More
computing
power
More data
New
algorithms
What has changed?A new paradigm
AI Development Attacks
Cybersecurity Attacks in IA
AI Ecosystem
IT
Data
Data Platforms
Data Science and ML
/ DL Tools
Solutions
Genome Research Video SurveillanceCustomer 360
Example Industry Use Cases
Fraud Detection
HDFS/NFS
User Access Security Time to Deploy Multi-Tenant
Data DuplicationData Store Cloud
Infrastructure
AI
Big Data
Data Analytics
Machine Learning
Regression
Time Series
Clustering
Decission Threes
SVM
Outline
Motivation
Cybersecurity
AI
AI + Cybersecurity Examples
Evolution of security technology - three waves
CLOUD,
AI and ORCHESTRATION,
COLLABORATION
INTELLIGENCE
and INTEGRATION
LAYERED
DEFENSES
Cybersecurity using AI
AI on Attack Tools
Source: Cisco
AI and Cybersecurity
Security Analytics
• Data correlation
• Pattern identification
• Anomaly detection
• Prioritization
• Data visualization
• Workflow
AI: Cognitive
Security
• Unstructured analysis
• Natural language
• Question and answer
• Machine learning
• Bias elimination
• Tradeoff analytics
Human Expertise
• Common sense
• Morals
• Compassion
• Abstraction
• Dilemmas
• Generalization
Cybersecurity Tools
Source: Cisco
Cybersecurity Tools
Cybersecurity Standards
Cisco Security Intelligence Operations
Cybersecurity Tools
Source: Cisco
AI Cybersecurity Solutions
WildFire
DesktopsLaptopsPhone/Tablet Servers Cloud
Source: WildFire
Artificial Neural Networks
Chen, Y., Abraham, A., & Yang, B. (2007). Hybrid flexible neural-tree-based
intrusion detection systems. International Journal of Intelligent Systems, 22,
337–352.
Stein, G., Chen, B., Wu, A. S., & Hua, K. A. (2005). Decision tree classifier for network intrusion detection with GA-based feature selection. In
Paper presented at the proceedings of the 43rd annual Southeast regional conference. Kennesaw, Georgia.
Randomly
Generated
Population
Feature
Selection
Decision Tree
Constructor
Decision Tree
Evaluator
Fitness
Computation
Final Decision
Tree
Classifier
Training Data
Validation
Data
Testing
Data
Generate Next Generation
GA/Decision Tree Hybrid
Genetic Algorithms
Teache
r
Correct
(No Training)
Winner
(Decision)
w1 w2 w3 wn
Φ1 Φ2 Φ3 Φn
Y(1) Y(2) Y(3) Y(n)
X(1) X(2) X(3) X(4)
Incorrect
(Training Needed)
Chavan, Sampada, et al. "Adaptive neuro-fuzzy intrusion
detection systems. "Information Technology: Coding and
Computing, 2004. Proceedings. ITCC 2004. International
Conference on. Vol. 1. IEEE, 2004.
Neuro-fuzzing
Support Vector
Machine
Decision Trees
Intrusion
Detection
Data
Hybrid Decision Tree SVM Approach
Peddabachigari, Sandhya, et al. "Modeling intrusion detection system
using hybrid intelligent systems." Journal of network and computer
applications 30.1 (2007): 114-132.
Hybrid
Shon, T., & Moon, J. (2007). A hybrid machine learning approach to network anomaly detection. Information Sciences, 177, 3799–3821.
Hybrid ML NAD
Multiple Classifier System for Intrusion Detection
Intrusion Detection as a Pattern Recognition Problem
Giacinto, Giorgio, Fabio Roli, and Luca Didaci. "Fusion of multiple classifiers for intrusion detection in computer networks." Pattern recognition letters 24.12
(2003): 1795-1803.
Pattern Recognition
Neural Networks
(Backpropagation)
Neural Networks (Scale
Conjugate Gradient)
Neural Network (One Step
Secant)
Support Vector Machine
Multivariate Regression
Splines
Ensemble
Data
preprocessor
Mukkamala, Srinivas, Andrew H. Sung, and Ajith Abraham. "Intrusion detection using an ensemble of intelligent
paradigms." Journal of network and computer applications 28.2 (2005): 167-182.
Ensemble
SMS Cybersecurity
Questions?
Thanks you so much!
juan.or@morelia.tecnm.mx,
jcolivares@computer.org,
jcolivares@ieee.org

Ieee itmsb20

Editor's Notes

  • #2 1
  • #9 1.3.1.1 Network Security Professionals
  • #15 1.2.3.5 Worms
  • #19 1.2.3.2 Viruses
  • #26 6.1.1.1 Securing LAN Elements
  • #46 1.2.2.1 Introduction of Attack Tools
  • #48 1.2.2.1 Introduction of Attack Tools
  • #53 1.3.3.6 Cisco Security Intelligence Operations